04806nam 22007815 450 991048465720332120200919074916.094-6265-026-810.1007/978-94-6265-026-8(CKB)3710000000168354(EBL)1783811(OCoLC)889267628(SSID)ssj0001298117(PQKBManifestationID)11987046(PQKBTitleCode)TC0001298117(PQKBWorkID)11240659(PQKB)11257393(MiAaPQ)EBC1783811(DE-He213)978-94-6265-026-8(PPN)179928031(EXLCZ)99371000000016835420140704d2014 u| 0engur|n|---|||||txtccrPrivacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century /by Demetrius Klitou1st ed. 2014.The Hague :T.M.C. Asser Press :Imprint: T.M.C. Asser Press,2014.1 online resource (343 p.)Information Technology and Law Series,1570-2782 ;25Description based upon print version of record.1-322-17565-9 94-6265-025-X Includes bibliographical references at the end of each chapters and index.Introduction -- Privacy, Liberty and Security -- Assessing the Adequacy of a Privacy Legal Framework -- Privacy-Invading Technologies -- Body Scanners: A Strip search by Other Means? Public Space CCTV Microphones and Loudspeakers: The Ears and Mouth of “Big Brother” -- Human-Implantable Microchips: Location-Awareness & the dawn of an “Internet of Persons” -- New Privacy Threats, Old Legal Approaches: Conclusion of The Value, Role and Challenges of Privacy by Design -- Conclusions and Policy Implications.Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall. Backed up by comprehensive study of four specific PITs – Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers; and Human-implantable microchips (RFID implants/GPS implants) – the author shows how laws that regulate the design and development of PITs may more effectively protect privacy than laws that only regulate data controllers and the use of such technologies. New rules and regulations should therefore incorporate fundamental privacy principles through what is known as ‘Privacy by Design’. The numerous sources explored by the author provide a workable overview of the positions of academia, industry, government and relevant international organizations and NGOs.   Demetrius Klitou has a Ph.D. in Law from Leiden University. He carried out his research under the auspices of the Centre for Law in the Information Society (eLaw@Leiden), Leiden, The Netherlands. He is currently serving as a consultant, specialized in the non-technological aspects of technology policies, innovation activities/policies, policy development processes and project management.  .Information Technology and Law Series,1570-2782 ;25Mass mediaLawHuman rightsApplication softwareComputersLaw and legislationIT Law, Media Law, Intellectual Propertyhttps://scigraph.springernature.com/ontologies/product-market-codes/R15009Human Rightshttps://scigraph.springernature.com/ontologies/product-market-codes/R19020Computer Appl. in Social and Behavioral Scienceshttps://scigraph.springernature.com/ontologies/product-market-codes/I23028Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Mass media.Law.Human rights.Application software.Computers.Law and legislation.IT Law, Media Law, Intellectual Property.Human Rights.Computer Appl. in Social and Behavioral Sciences.Legal Aspects of Computing.323.448Klitou Demetriusauthttp://id.loc.gov/vocabulary/relators/aut1225834MiAaPQMiAaPQMiAaPQBOOK9910484657203321Privacy-Invading Technologies and Privacy by Design2846106UNINA