Privacy Impact Assessment


Book Description

Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess, mitigate or avoid privacy risks and, in collaboration with stakeholders, to identify solutions. Contributors to this book – privacy commissioners, academics, consultants, practitioners, industry representatives – are among the world’s leading PIA experts. They share their experience and offer their insights to the reader in the policy and practice of PIA in Australia, Canada, New Zealand, the United Kingdom, the United States and elsewhere. This book, the first such on privacy impact assessment, will be of interest to any organisation that collects or uses personal data and, in particular, to regulators, policy-makers, privacy professionals, including privacy, security and information officials, consultants, system architects, engineers and integrators, compliance lawyers and marketing professionals. In his Foreword, surveillance studies guru Gary Marx says, “This state-of-the-art book describes the most comprehensive tool yet available for policy-makers to evaluate new personal data information technologies before they are introduced.” This book could save your organisation many thousands or even millions of euros (or dollars) and the damage to your organisation’s reputation and to the trust of employees, customers or citizens if it suffers a data breach that could have been avoided if only it had performed a privacy impact assessment before deploying a new technology, product, service or other initiative involving personal data.




EU–Korea Security Relations


Book Description

This book provides an original examination of current European Union (EU)–Republic of Korea (ROK) security relations. It brings together analysis and original material on relations in the fields of Nuclear non-proliferation and disarmament, Cybersecurity and data-protection, Space policy and technology, and Preventive diplomacy and crisis management. These represent areas of particular interest to examine the extent to which the EU and ROK are able to successfully or otherwise cooperate. Relations between the EU and the ROK have been growing in quantity and quality over recent years. Alongside the economic dimension, the political and security elements of the relationship have shown promise for further collaboration between the two sides, not least within the context of North Korea’s nuclear threat and East Asia’s wider evolving security environment. All contributors are leading experts in their respective fields and each chapter is co-authored by a European and Korean expert for a balanced assessment. The volume will be essential reading for students, scholars and policy-makers interested in EU–Korea relations, EU foreign policy and security, Area studies, and, more broadly to EU politics studies, security studies, and international relations.




The Emergence of EU Criminal Law


Book Description

Criminal law can no longer be neatly categorised as the product and responsibility of domestic law. That this is true is emphasised by the ever-increasing amount of legislation stemming from the European Union (EU) which impacts, both directly and indirectly, on the criminal law. The involvement of the EU institutions in the substantive criminal laws of its Member States is of considerable legal and political significance. This book deals with the emerging EU framework for creating, harmonising and ensuring the application of EU criminal law. This book aims to highlight some of the consequences of EU involvement in the criminal law by examining the provisions which have been adopted in the field of information and communications technology. It provides an overview of the criminal law competence of the EU and evaluates the impact of these developments on the criminal laws of the Member States. It then goes on to consider the EU legislation which requires Member States to regulate matters such as data protection, e-security, intellectual property and various types of illegal content through the criminal law is analysed. In the course of this evaluation, particular consideration is given to issues such as the basis on which the EU institutions establish the need for criminal sanctions, the liability of service providers and the extent to which the Member States have adhered to, or departed from, the legislation in the course of implementation.




Europe in 12 Lessons


Book Description







Socioeconomic and Legal Implications of Electronic Intrusion


Book Description

"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.




Consumer Protection, Automated Shopping Platforms and EU Law


Book Description

This book looks at two technological advancements in the area of e-commerce, which dramatically seem to change the way consumers shop online. In particular, they automate certain crucial tasks inherent in the ‘shopping’ activity, thereby relieving consumers of having to perform them. These are shopping agents (or comparison tools) and automated marketplaces. It scrutinizes their underlying processes and the way they serve the consumer, thereby highlighting risks and issues associated with their use. The ultimate aim is to ascertain whether the current EU regulatory framework relating to consumer protection, e-commerce, data protection and security adequately addresses the relevant risks and issues, thus affording a ‘safe’ shopping environment to the e-consumer.




Crime and Technology


Book Description

Guido Rossi As Chairman of ISPAC, I want to thank all the contributors to this book that originates from the International Conference on Crime and Technology. This could be the end of my presentation if I did not feel uneasy not considering one of the problems I believe to be pivotal in the relationship between crime and technology. I shall also consider that the same relationship exists between terror and globalization, while globalization is stemming from technology and terror from crime. Transnational terrorism is today made possible by the vast array of communication tools. But the paradox is that if globalization facilitates terrorist violence, the fight against this war without borders is potentially disastrous for both economic development and globalization. Antiterrorist measures restrict mobility and financial flows, while new terrorist attacks could lead the way for an antiglobalist reaction. But the global society has yet to agree on a common definition of terrorism or on a common policy against it. The ordinary traditional criminal law is still depending on the sovereignty of national states, while international criminal justice is only a spotty and contested last resort. The fragmented and weak international institutions and underdeveloped civil societies have no power to enforce criminal justice against t- rorism. At the same time, the states that are its targets have no interest in applying the laws of war (the Geneva Conventions) to their fight against terrorists.