European Data Protection: Coming of Age


Book Description

On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory network was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.




Digital Work and Personal Data Protection


Book Description

This book gathers contributions related to the most pressing problems and challenges that new information and communications technologies (ICT) and digital platforms introduce into the labour market, and the impact they have on the way that people work, their rights and even their health and dignity. In addition, there are also chapters studying personal data protection, which is currently a topic of maximum interest due to the New European Regulation about it. The contributors here are drawn from around the world, with several countries represented, such as Portugal, Spain, Italy, Brazil, Australia and Venezuela. The book will appeal lawyers, legal and human resources experts, economists, judges, academics and staff from trade unions, and employers’ representation. The volume features insights and contributions in different languages, with chapters in Spanish (12), English (6) and Portuguese (4).




Global Survey on Internet Privacy and Freedom of Expression


Book Description

"This publication seeks to identify the relationship between freedom of expression and Internet privacy, assessing where they support or compete with each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy from the viewpoint of freedom of expression. It provides an overview of legal protection, self-regulatory guidelines, normative challenges, and case studies relating to the topic. With this publication UNESCO aims to provide its Member States and other stakeholders, national and international, with a useful reference tool containing up-to-date and sharp information on emerging issues relevant to both developed and developing countries. Multiple stakeholders, preferably in dialogue, can use it in their own spheres of operation, adapting where appropriate from the range of experiences as recorded in these pages. The publication also supplies additional sources of reference for interested readers to use to further investigate each of the subjects highlighted. The publication explores a range of issues, such as: (1) threats to privacy that have developed through the Internet, (2) international legal standards on privacy and responses to these emerging issues, (3) complex intersections between the rights to privacy and freedom of expression, (4) UNESCO recommendations to states and corporations for better practice, (5) overview of literature, background material and tools on international and national policy and practice on privacy and freedom of expression on the Internet. In the coming years, UNESCO will specifically seek to disseminate information about good practices and international collaboration concerning the points of intersection between freedom of expression and privacy. Research on safeguarding the principle of freedom of expression in Internet policy across a range of issues will continue to be part of UNESCO's normative mandate and technical advice to stakeholders."--Publisher's description




Encyclopedia of Criminal Activities and the Deep Web


Book Description

As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society. The Encyclopedia of Criminal Activities and the Deep Web is a three-volume set that includes comprehensive articles covering multidisciplinary research and expert insights provided by hundreds of leading researchers from 30 countries including the United States, the United Kingdom, Australia, New Zealand, Germany, Finland, South Korea, Malaysia, and more. This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web. Highlighting a wide range of topics such as cyberbullying, online hate speech, and hacktivism, this book will offer strategies for the prediction and prevention of online criminal activity and examine methods for safeguarding internet users and their data from being tracked or stalked. Due to the techniques and extensive knowledge discussed in this publication it is an invaluable addition for academic and corporate libraries as well as a critical resource for policy makers, law enforcement officials, forensic scientists, criminologists, sociologists, victim advocates, cybersecurity analysts, lawmakers, government officials, industry professionals, academicians, researchers, and students within this field of study.




La Protección de Datos Personales en México


Book Description

Tal como otros países, México ha promulgado leyes de "libertad de información". Estas leyes están diseñadas para posibilitar a los individuos el examen de la información pública y para que puedan obtener información sobre las acciones de sus gobiernos (niveles federal, estatal y local). Asimismo, deben equilibrar la apertura de la información pública con la protección de la información personal y confidencial que el Estado, en sus tres niveles, posee sobre los ciudadanos Sí bien, el derecho a la privacidad es un derecho fundamental en la Constitución mexicana, la dificultad se presenta cuando se trata de establecer una división entre lo que es información pública e información privada La presente obra, pretende dar un panorama general de la normatividad vigente en el campo de la Protección de Datos Personales en México y reflexionar sobre la urgente necesidad de una Ley Federal y de una Agencia Federal de Protección de Datos




Token law and markets


Book Description

Esta monografía sobre derecho de tokens y tokenomics muestra los avances en el derecho de tokens americano y europeo, haciendo hincapié en las cuestiones esenciales que plantea la nueva Estrategia de Finanzas Digitales para DeFi y para los mercados de tokens, englobando las tres Propuestas de Regulaciones.




Research Handbook on Human Resource Management and Disruptive Technologies


Book Description

This comprehensive and judicious Research Handbook examines the fundamental influence of the emergence of contemporary disruptive technologies, including artificial intelligence, online platforms, the internet of things, and social robots, on Human Resource Management (HRM).




Handbook of Research on Cyber Crime and Information Privacy


Book Description

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.




De Orwell al cibercontrol


Book Description

Las recientes revelaciones sobre las prácticas ilegales de la Agencia Americana de Seguridad (NSA), o el descubrimiento por parte de un usuario del rastreo digital masivo realizado por Facebook testimonian la magnitud de la hipervigilancia a la que estamos sometidos. Sin embargo, lejos del modelo disciplinario tradicional sobre el que alertaba George Orwell en su Gran Hermano, ahora los controles se ejercen desde múltiples y sofisticados frentes, en los que cada vez es mayor la participación involuntaria de los ciudadanos. Armand Mattelart y André Vitalis nos proponen reflexionar sobre un novedoso e inquietante concepto: el perfilado, esto es, el control indirecto de los individuos —a menudo con el propósito de anticipar sus comportamientos— a través del estudio y explotación sistemáticos de sus datos —ya sean sus desplazamientos o sus pautas de consumo—. Mientras que el modelo de vigilancia totalitario exhibía su control, en el mundo post-orwelliano éste se nos impone sin plena conciencia por nuestra parte; es invisible, y esta invisibilidad, potenciada por la desmaterialización de los soportes, garantiza su efectividad en una población crecientemente fascinada por las nuevas tecnologías que, sin embargo, no perciben como tecnologías de control.




Cross-Border Infringement of Personality Rights via the Internet


Book Description

Conflicts of laws arising from injuries to rights of personality—such as defamation or invasion of privacy—have always been difficult, if only because they implicate conflicting societal values about the rights of freedom of speech and access to information, on the one hand, and protection of reputation and privacy, on the other hand. The ubiquity of the internet has dramatically increased the frequency and intensity of these conflicts. This book explores the ways in which various Western countries have addressed these conflicts, but also advances new, practical ideas about how these conflicts should be resolved. These ideas are part of an international model law unanimously adopted by a Resolution of the Institut de droit international, which addresses jurisdiction, choice of law, and recognition and enforcement of foreign judgments. The book provides extensive article-by-article commentary, which explains the philosophy and intended operation of the Resolution.