Share
Fr. 259.00
Paul De Hert, Paul De Hert et al, Cécile de Terwangne, Serge Gutwirth, Paul de Hert, Sjaak Nouwt...
Reinventing Data Protection?
English · Hardback
Shipping usually within 3 to 5 weeks (title will be specially ordered)
Description
data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.
List of contents
Fundamental Concepts.- Data Protection in the Case Law of Strasbourg and Luxemburg: Constitutionalisation in Action.- The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy.- Data Protection as a Fundamental Right.- Consent in Data Protection Law: Privacy, Fair Processing and Confidentiality.- The Concepts of Identity and Identifiablity: Legal and Technical Deadlocks for Protecting Human Beings in the Information Society?.- The Actors.- Role of Trade Associations: Data Protection as a Negotiable Issue.- The Role of Data Protection Authorities.- The Role of Citizens: What Can Dutch, Flemish and English Students Teach Us About Privacy?.- Regulation.- Consent, Proportionality and Collective Power.- Is a Global Data Protection Regulatory Model Possible?.- Technical Standards as Data Protection Regulation.- Privacy Actors, Performances and the Future of Privacy Protection.- Specific Issues.- First Pillar and Third Pillar: Need for a Common Approach on Data Protection?.- Who is Profiling Who? Invisible Visibility.- Challenges in Privacy Advocacy.- Developing an Adequate Legal Framework for International Data Transfers.- Towards a Common European Approach to Data Protection: A Critical Analysis of Data Protection Perspectives of the Council of Europe and the European Union.- Freedom of Information Versus Privacy: Friends or Foes?.- Privacy Protection on the Internet: Risk Management and Networked Normativity.
Summary
data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen – utilizing the full potential of what ICT-technology has to offer – seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one’s own identity. Transactiondata–bothtraf?candlocationdata–deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person’s contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.
Additional text
From the reviews:
“Provide a full length assessment of the myriad challenges currently facing the notion of data protection … . Overall, this volume offers an interesting and balanced account of what has become of the concept of data protection since its inclusion in the 2000 Charter of Fundamental Rights. In engaging with the technological challenges of the networked world as well as the limitations of existing legislations, this collection constitutes a useful companion for legal experts in the field and newcomers … .” (Btihaj Ajana, Identity in the Information Society, Vol. 2 (3), December, 2009)
Report
From the reviews:
"Provide a full length assessment of the myriad challenges currently facing the notion of data protection ... . Overall, this volume offers an interesting and balanced account of what has become of the concept of data protection since its inclusion in the 2000 Charter of Fundamental Rights. In engaging with the technological challenges of the networked world as well as the limitations of existing legislations, this collection constitutes a useful companion for legal experts in the field and newcomers ... ." (Btihaj Ajana, Identity in the Information Society, Vol. 2 (3), December, 2009)
Product details
Assisted by | Paul De Hert (Editor), Paul De Hert et al (Editor), Cécile de Terwangne (Editor), Serge Gutwirth (Editor), Paul de Hert (Editor), Sjaak Nouwt (Editor), Yve Poullet (Editor), Yves Poullet (Editor), Cecile de Terwangne (Editor), Cécile de Terwangne (Editor) |
Publisher | Springer Netherlands |
Languages | English |
Product format | Hardback |
Released | 18.02.2011 |
EAN | 9781402094972 |
ISBN | 978-1-4020-9497-2 |
No. of pages | 342 |
Weight | 672 g |
Illustrations | XXIX, 342 p. |
Subjects |
Natural sciences, medicine, IT, technology
> IT, data processing
> Internet
Social sciences, law, business > Law > International law, foreign law |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.