The Resource Reforming European data protection law, Serge Gutwirth, Ronald Leenes, Paul de Hert, editors

Reforming European data protection law, Serge Gutwirth, Ronald Leenes, Paul de Hert, editors

Reforming European data protection law
Reforming European data protection law
Statement of responsibility
Serge Gutwirth, Ronald Leenes, Paul de Hert, editors
  • eng
  • eng
  • eng
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection
Member of
Cataloging source
Dewey number
  • 342.2408/58
  • 343.40999
no index present
LC call number
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Law, governance and technology series
Series volume
volume 20
Reforming European data protection law, Serge Gutwirth, Ronald Leenes, Paul de Hert, editors
Antecedent source
Bibliography note
Includes bibliographical references
  • net
Carrier category
online resource
Carrier category code
Carrier MARC source
Content category
Content type code
Content type MARC source
  • Preface; Contents; Contributors; Part I Profiling: A Persistent Core Issue of Data Protection and Privacy; 1 Profiling Technologies and Fundamental Rights and Values: Regulatory Challenges and Perspectives from European Data Protection Authorities; 1.1 Introduction; 1.2 Profiling: Towards a Definition; 1.3 Societal Consequences of Digitization; 1.4 Profiling as a Threat for Fundamental Rights and Values; 1.4.1 Fundamental Values; 1.4.2 Fundamental Rights; The Right to Privacy and the Right to Data Protection; The Right to Non-discrimination
  • 1.5 So Far so Good -- Regulating Profiling1.6 National Data Protection Authorities' (DPAs) Responses to Profiling Questionnaire; 1.6.1 Findings; Legal Aspects; Domains of Application; Fundamental Rights; Procedure to Complaint; Awareness; 1.7 Conclusions; References; 2 On-line Behavioral Tracking: What May Change After the Legal Reform on Personal Data Protection; 2.1 On-line Behavioral Tracking; 2.1.1 Definition and Today's Trends; 2.1.2 Techniques of Online Tracking; On-line Scrutiny Through Cookies: Are They Always a Threat to Privacy?
  • Javascript2.1.2.3 Stateless Tracking; Supercookies and Evercookies; Location Tracking; Online Social Network Tracking; 2.1.3 Risks of On-line Tracking; 2.2 On-line Tracking Under the Current Data Protection Legal Framework; 2.2.1 Personal Data Protection Directive; 2.2.2 Applicability of the Core Foundations of Personal Data Protection; Purpose Limitation; Data Subject Notice; Proportionality; Obligation to Obtain Prior Consent; Data Destruction/Retention
  • 2.3 Future Personal Data Protection Framework: How Will It Affect Behavioral On-line Tracking?2.3.1 Scope of Application; 2.3.2 Definitions; 2.3.3 Consent; 2.3.4 Notice; 2.3.5 The Right of Erasure ("Right to Be Forgotten"); 2.3.6 Data Protection "by Design"; 2.3.7 Towards a "Privacy Friendlier" Internet Tracking: The Role of Society, (Social) Media and Education; 2.4 Conclusion; Bibliography; Part II Taming the Future: Assessments of Risks in the Sphere of Privacy and Data Protection; 3 A Systematic Approach to the Legal Evaluation of Security Measures in Public Transportation
  • 3.1 Introduction3.2 Social and Legal Acceptability of Security Measures; 3.3 The Basic Concepts of Decision Making; 3.4 The Legal Evaluation of Security Measures; 3.4.1 Pre-stage -- Identifying Fundamental Legal Provisions; Type and Functions of the Security Measure; Fundamental Legal Provisions; 3.4.2 Stage 1 -- Deduction of Legal Requirements; 3.4.3 Stage 2 -- Concretisation into Legal Criteria; 3.4.4 Stage 3 -- Concretisation into Technical Objectives; 3.4.5 Stage 4 -- Comparison; 3.4.6 Alternative: Stage 4 -- Technical Design Proposals; 3.4.7 Example of Use
Control code
1 online resource
File format
Form of item
Media category
Media MARC source
Media type code
Other control number
  • 10.1007/978-94-017-9385-8
  • DOI 10.1007/978-94-017-9385-8
Quality assurance targets
unknown sound
Specific material designation
System control number
  • (OCoLC)896116907
  • pebco9401793840

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...