EU Data Privacy Law and Serious Crime


Book Description

This book provides the first comprehensive doctrinal and comparative study to examine the influence of the fundamental human right to respect for private life on data retention within EU law, specifically communications data and passenger name record data, for the purpose of countering serious crime. First, it is the only academic publication that offers a complete picture of the EU's institutions, not just the Court of Justice of the EU, at work in a legally and politically sensitive field from a variety of perspectives, thereby contributing to a scholarly understanding of topics which tend to attract generalized opinions not based on detailed analysis of law and practice in specific areas. Secondly, this original analysis of EU data retention law casts a spotlight on the real and actual extent of the weight now being given in the mainstreaming of fundamental rights within the EU policymaking process, providing a more complete picture of the role and impact of human rights on this area of law and policymaking. Thirdly, this book is the only work to outline and examine in detail the impact of the tensions and dialogue between the EU and European Convention on Human Rights (ECHR) legal systems within the case law of both courts on data privacy and serious crime. In addition, this book also sets out the implications of the above analysis, and recent landmark jurisprudence on Article 8 ECHR and Articles 7 and 8 of the EU Charter of Fundamental Rights, for new related EU legislation, including Directive 2016/680 on data processing for the purposes of the prevention, investigation, detection or prosecution of criminal offences and relevant provisions of the forthcoming E-Privacy Regulation.




Handbook on European data protection law


Book Description

The rapid development of information technology has exacerbated the need for robust personal data protection, the right to which is safeguarded by both European Union (EU) and Council of Europe (CoE) instruments. Safeguarding this important right entails new and significant challenges as technological advances expand the frontiers of areas such as surveillance, communication interception and data storage. This handbook is designed to familiarise legal practitioners not specialised in data protection with this emerging area of the law. It provides an overview of the EU’s and the CoE’s applicable legal frameworks. It also explains key case law, summarising major rulings of both the Court of Justice of the European Union and the European Court of Human Rights. In addition, it presents hypothetical scenarios that serve as practical illustrations of the diverse issues encountered in this ever-evolving field.




Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe


Book Description

In the past 10 years, the Member States of the European Union (EU) have intensified their exchange of information for the purposes of preventing and combating serious cross-border crime, as manifested in three main aspects. Firstly, there is a need to ensure the practical application of innovative principles (availability, mutual recognition) and concepts (Information Management Strategy, European Information Exchange Model) for tackling criminal organisations and networks that threaten the Internal Security of the EU. Secondly, there has been a gradual consolidation of EU agencies and bodies (Eurojust, Europol) aimed at promoting cooperation and dialogue among law enforcement officials and judicial authorities responsible for preventing and combating drug trafficking, trafficking in human beings, child pornography, and other serious trans-national offences. Thirdly, important EU information systems and databases (Prüm, SIS-II, ECRIS) have been created, enabling law enforcement and judicial authorities to gain access to essential information on criminal phenomena and organisations. Pursuing a practice-orientated approach, this work provides comprehensive coverage of all these measures, as well as the applicable rules governing data quality, data protection and data security. It is especially intended for law enforcement and judicial authorities who need to develop the appropriate expertise for the practical application of the above-mentioned principles. It also offers a solid basis of practical training material for police training centres and judicial schools.




Privacy, Due Process and the Computational Turn


Book Description

Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, and so on in order to consider their implications for the assumptions on which our legal framework has been built. The contributions to this volume focus on the issue of privacy, which is often equated with data privacy and data security, location privacy, anonymity, pseudonymity, unobservability, and unlinkability. Here, however, the extent to which predictive and other types of data analytics operate in ways that may or may not violate privacy is rigorously taken up, both technologically and legally, in order to open up new possibilities for considering, and contesting, how we are increasingly being correlated and categorizedin relationship with due process – the right to contest how the profiling systems are categorizing and deciding about us.




The Right to Erasure in EU Data Protection Law


Book Description

The right to erasure (or ""right to be forgotten"") has become a major flashpoint in the courts and public opinion of the potential and limits of data protection law to empower individuals to control their data. This is the first book to focus on the right to erasure in the context of Article 17 of the GDPR, its theory, history, and legal scope.




European Constitutional Courts towards Data Retention Laws


Book Description

The book analyses the impact the jurisprudence of the constitutional courts of EU Member States and the Court of Justice of the European Union has had on the perception of freedom of communications in the digital era with respect to these courts’ judgments regarding regulating storage and access to telecommunications data (known as telecommunications data retention) from 2008 to 2017. To do so, it examines the jurisprudence of the constitutional courts of Austria, Bulgaria, Cyprus, Czech Republic, Ireland, Germany, Poland, Portugal, Romania, Slovenia, and Slovakia, i.e. those courts that have already ruled on domestic provisions regulating telecommunications data retention. Further, it investigates the judgments of the Court of Justice of European Union regarding directive 2006/24/EC regulating telecommunications data retention along with relevant jurisprudence of the European Court of Human Rights. As such, the book provides a comparative study of jurisprudence and national measures to implement the Data Retention Directive. Moreover, the book discusses whether our current understanding of protection of freedom of communications guaranteed by the constitutions of EU member states and the EU Charter of Fundamental Rights, which was developed in the era of analogue communications, remains accurate in the era of digital technologies and mass surveillance (simultaneously applied by states and private corporations). In this context, the book reconstructs constitutional standards that currently apply in the EU towards data retention. This book presents a unique comparative analysis of all judgments concerning Directive 2006/24/EC, which can be used in the legislative process on the EU forum aimed at introducing new principles of data retention and by constitutional courts in the context of comparative argumentation.




Emerging Challenges in Privacy Law


Book Description

Prominent privacy law experts, regulators and academics examine contemporary legal approaches to privacy from a comparative perspective.




Organized Crime Legislation in the European Union


Book Description

Just a few months after the entry into force of the EU Framework Decision on the fight against organized crime, this book provides an unprecedented analysis of the national and European legislation on organized crime. The book provides a critical examination of the European policies and legal instruments to promote the harmonization and approximation of criminal law in this field (including the United Nations Convention on Transnational Organized Crime). The current level of harmonization among EU Member States and the approximation to the standards of the new Framework Decision are discussed in detail, with the help of tables, graphs and maps. The results highlight the problems surrounding the international legal instruments and the inconsistencies of the national approaches to combating organized crime.




Cybersecurity, Privacy and Data Protection in EU Law


Book Description

Is it possible to achieve cybersecurity while safeguarding the fundamental rights to privacy and data protection? Addressing this question is crucial for contemporary societies, where network and information technologies have taken centre stage in all areas of communal life. This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law. The book explores the values, interconnections and tensions inherent to cybersecurity, privacy and data protection within the EU constitutional architecture and its digital agendas. The work's novel analysis looks at the interplay between digital policies, instruments including the GDPR, NIS Directive, cybercrime legislation, e-evidence and cyber-diplomacy measures, and technology as a regulatory object and implementing tool. This original approach, which factors in the connections between engineering principles and the layered configuration of fundamental rights, outlines all possible combinations of the relationship between cybersecurity, privacy and data protection in EU law, from clash to complete reconciliation. An essential read for scholars, legal practitioners and policymakers alike, the book demonstrates that reconciliation between cybersecurity, privacy and data protection relies on explicit and brave political choices that require an active engagement with technology, so as to preserve human flourishing, autonomy and democracy.




The Risk-Based Approach to Data Protection


Book Description

The concept of a risk-based approach to data protection came to the fore during the overhaul process of the EU's General Data Protection Regulation (GDPR). At its core, it consists of endowing the regulated organizations that process personal data with increased responsibility for complying with data protection mandates. Such increased compliance duties are performed through risk management tools. This book provides a comprehensive analysis of this legal and policy development, which considers a legal, historical, and theoretical perspective. By framing the risk-based approach as a sui generis implementation of a specific regulation model known as meta regulation, this book provides a recollection of the policy developments that led to the adoption of the risk-based approach in light of regulation theory and debates. It also discusses a number of salient issues pertaining to the risk-based approach, such as its rationale, scope, and meaning; the role for regulators; and its potential and limits. The book also looks at they way it has been undertaken in major statutes with a focus on key provisions, such as data protection impact assessments or accountability. Finally, the book devotes considerable attention to the notion of risk. It explains key terms such as risk assessment and management. It discusses in-depth the role of harms in data protection, the meaning of a data protection risk, and the difference between risks and harms. It also critically analyses prevalent data protection risk management methodologies and explains the most important caveats for managing data protection risks.