LEADER 05879nam 22006615 450 001 9910255201103321 005 20200702104410.0 010 $a3-319-25047-7 024 7 $a10.1007/978-3-319-25047-2 035 $a(CKB)3710000000649124 035 $a(EBL)4509208 035 $a(DE-He213)978-3-319-25047-2 035 $a(MiAaPQ)EBC4509208 035 $a(PPN)222234199 035 $a(EXLCZ)993710000000649124 100 $a20160419d2016 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEnforcing Privacy$b[electronic resource] $eRegulatory, Legal and Technological Approaches /$fedited by David Wright, Paul De Hert 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (503 p.) 225 1 $aIssues in Privacy and Data Protection,$x2352-1929 ;$v25 300 $aDescription based upon print version of record. 311 $a3-319-25045-0 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aAbout the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrčres.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications ? contributions to transnational privacy enforcement;Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and  David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index. 330 $aThis book demonstrates different approaches ? regulatory, legal and technological ? to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear ? it is a theme that runs throughout this book ? ?carrots? and ?soft law? need to be backed up by ?sticks? and ?hard law?. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book ? including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher ? share their views in the one and only book on Enforcing Privacy. 410 0$aIssues in Privacy and Data Protection,$x2352-1929 ;$v25 606 $aMass media 606 $aLaw 606 $aComputer security 606 $aComputers 606 $aLaw and legislation 606 $aIT Law, Media Law, Intellectual Property$3https://scigraph.springernature.com/ontologies/product-market-codes/R15009 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aMass media. 615 0$aLaw. 615 0$aComputer security. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aIT Law, Media Law, Intellectual Property. 615 24$aSystems and Data Security. 615 24$aLegal Aspects of Computing. 676 $a342.0858 702 $aWright$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDe Hert$b Paul$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910255201103321 996 $aEnforcing Privacy$92514253 997 $aUNINA