Data Protection and Privacy: (In)visibilities and Infrastructures


Book Description

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.




Data Privacy and Security


Book Description

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.




Consumer Privacy and Data Protection


Book Description

This short paperback, developed from the casebook Information Privacy Law,contains key cases and materials focusing on privacy issues related to consumer privacy and data security. This book is designed for use in courses and seminars on: Cyberlaw Law and technology Privacy law Information law Consumer law New to the Third Edition: CCPA, biometric privacy laws FTC Facebook Cambridge Analytica case United States v. Gratkowski (Bitcoin and the Fourth Amendment) In re Vizio, Inc. Additional material about TCPA litigation, including Stoops v. Wells Fargo Bank Additional material on the FCC Act Additional material on the Video Privacy Protection Act Barr v. American Association of Political Consultants Topics covered include: Big Data, financial privacy, FCRA, GLBA, FTC privacy and security regulation Identity theft, online behavioral advertising First Amendment limitations on privacy regulation Data breaches, data breach notification statutes Privacy of video watching and media consumptions CFAA, enforcement of privacy policies, marketing use of data, and more




APEC Privacy Framework


Book Description




Data Protection on the Move


Book Description

This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called ‘EU-cookie law’ and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.




Data Protection and Privacy, Volume 13


Book Description

This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and Artificial Intelligence. It is one of the results of the thirteenth annual International Conference on Computers, Privacy and Data Protection (CPDP) held in Brussels in January 2020. The development and deployment of Artificial Intelligence promises significant break-throughs in how humans use data and information to understand and interact with the world. The technology, however, also raises significant concerns. In particular, concerns are raised as to how Artificial Intelligence will impact fundamental rights. This interdisciplinary book has been written at a time when the scale and impact of data processing on society – on individuals as well as on social systems – is becoming ever starker. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection.




Privacy and Data Protection Issues of Biometric Applications


Book Description

This book discusses all critical privacy and data protection aspects of biometric systems from a legal perspective. It contains a systematic and complete analysis of the many issues raised by these systems based on examples worldwide and provides several recommendations for a transnational regulatory framework. An appropriate legal framework is in most countries not yet in place. Biometric systems use facial images, fingerprints, iris and/or voice in an automated way to identify or to verify (identity) claims of persons. The treatise which has an interdisciplinary approach starts with explaining the functioning of biometric systems in general terms for non-specialists. It continues with a description of the legal nature of biometric data and makes a comparison with DNA and biological material and the regulation thereof. After describing the risks, the work further reviews the opinions of data protection authorities in relation to biometric systems and current and future (EU) law. A detailed legal comparative analysis is made of the situation in Belgium, France and the Netherlands. The author concludes with an evaluation of the proportionality principle and the application of data protection law to biometric data processing operations, mainly in the private sector. Pleading for more safeguards in legislation, the author makes several suggestions for a regulatory framework aiming at reducing the risks of biometric systems. They include limitations to the collection and storage of biometric data as well as technical measures, which could influence the proportionality of the processing. The text is supported by several figures and tables providing a summary of particular points of the discussion. The book also uses the 2012 biometric vocabulary adopted by ISO and contains an extensive bibliography and literature sources.




Data Protection Around the World


Book Description

This book provides a snapshot of privacy laws and practices from a varied set of jurisdictions in order to offer guidance on national and international contemporary issues regarding the processing of personal data and serves as an up-to-date resource on the applications and practice-relevant examples of data protection laws in different countries. Privacy violations emerging at an ever-increasing rate, due to evolving technology and new lifestyles linked to an intensified online presence of ever more individuals, required the design of a novel data protection and privacy regulation. The EU General Data Protection Regulation (GDPR) stands as an example of a regulatory response to these demands. The authors included in this book offer an in-depth analysis of the national data protection legislation of various countries across different continents, not only including country-specific details but also comparing the idiosyncratic characteristics of these national privacy laws to the GDPR. Valuable comparative information on data protection regulations around the world is thus provided in one concise volume. Due to the variety of jurisdictions covered and the practical examples focused on, both academics and legal practitioners will find this book especially useful, while for compliance practitioners it can serve as a guide regarding transnational data transfers. Elif Kiesow Cortez is Senior Lecturer at the International and European Law Program at The Hague University of Applied Sciences in The Netherlands.




Regulating Privacy


Book Description

The information revolution has brought with it the technology for easily collecting personal information about individuals, a facility that inherently threatens personal privacy. Colin J. Bennett here examines political responses to the data protection issue in four Western democracies, comparing legislation that the United States, Britain, West Germany, and Sweden forged from the late 1960's to the 1980's to protect citizens from unwanted computer dissemination of personal information. Drawing on an extensive body of interviews and documentary evidence, Bennett considers how the four countries, each with different cultural traditions and institutions, formulated fair information policy. He finds that their computer regulatory laws are based on strikingly similar statutory principles, but that enforcement of these principles varies considerably: the United States relies on citizen initiative and judicial enforcement; Britain uses a registration system; Germany has installed an ombudsman; and Sweden employs a licensing system. Tracing the impact of key social, political, and technological factors on the ways different political systems have controlled the collection and communication of information, Bennett also deepens our understanding of policymaking theory. Regulating Privacy will be welcomed by political sciences—especially those working in comparative public policy, American politics, organization theory, and technology and politics—political economists, information systems analysts, and others concerned with issues of privacy.




Designing for Privacy and its Legal Framework


Book Description

This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.