LEADER 07733nam 22009495 450 001 9910484992103321 005 20230418161256.0 010 $a94-017-9385-9 024 7 $a10.1007/978-94-017-9385-8 035 $a(CKB)3710000000281403 035 $a(EBL)1968653 035 $a(OCoLC)896116907 035 $a(SSID)ssj0001386743 035 $a(PQKBManifestationID)11994486 035 $a(PQKBTitleCode)TC0001386743 035 $a(PQKBWorkID)11374520 035 $a(PQKB)11771958 035 $a(DE-He213)978-94-017-9385-8 035 $a(MiAaPQ)EBC1968653 035 $a(PPN)183091000 035 $a(EXLCZ)993710000000281403 100 $a20141117d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aReforming European Data Protection Law$b[electronic resource] /$fedited by Serge Gutwirth, Ronald Leenes, Paul de Hert 205 $a1st ed. 2015. 210 1$aDordrecht :$cSpringer Netherlands :$cImprint: Springer,$d2015. 215 $a1 online resource (409 p.) 225 1 $aIssues in Privacy and Data Protection,$x2352-1929 ;$v20 300 $aDescription based upon print version of record. 311 $a94-017-9384-0 320 $aIncludes bibliographical references at the end of each chapters. 327 $a""Preface""; ""Contents""; ""Contributors""; ""Part I Profiling: A Persistent Core Issue of Data Protection and Privacy""; ""1 Profiling Technologies and Fundamental Rights and Values: Regulatory Challenges and Perspectives from European Data Protection Authorities""; ""1.1 Introduction""; ""1.2 Profiling: Towards a Definition""; ""1.3 Societal Consequences of Digitization""; ""1.4 Profiling as a Threat for Fundamental Rights and Values""; ""1.4.1 Fundamental Values""; ""1.4.2 Fundamental Rights""; ""1.4.2.1 The Right to Privacy and the Right to Data Protection"" 327 $a""1.4.2.2 The Right to Non-discrimination""""1.5 So Far so Good a??? Regulating Profiling""; ""1.6 National Data Protection Authorities' (DPAs) Responses to Profiling Questionnaire""; ""1.6.1 Findings""; ""1.6.1.1 Legal Aspects""; ""1.6.1.2 Domains of Application""; ""1.6.1.3 Fundamental Rights""; ""1.6.1.4 Procedure to Complaint""; ""1.6.1.5 Awareness""; ""1.7 Conclusions""; ""References""; ""2 On-line Behavioral Tracking: What May Change After the Legal Reform on Personal Data Protection""; ""2.1 On-line Behavioral Tracking""; ""2.1.1 Definition and Today's Trends"" 327 $a""2.1.2 Techniques of Online Tracking""""2.1.2.1 On-line Scrutiny Through Cookies: Are They Always a Threat to Privacy?""; ""2.1.2.2 Javascript""; ""2.1.2.3 Stateless Tracking""; ""2.1.2.4 Supercookies and Evercookies""; ""2.1.2.5 Location Tracking""; ""2.1.2.6 Online Social Network Tracking""; ""2.1.3 Risks of On-line Tracking""; ""2.2 On-line Tracking Under the Current Data Protection Legal Framework""; ""2.2.1 Personal Data Protection Directive""; ""2.2.2 Applicability of the Core Foundations of Personal Data Protection""; ""2.2.2.1 Purpose Limitation""; ""2.2.2.2 Data Subject Notice"" 327 $a""2.2.2.3 Proportionality""""2.2.2.4 Obligation to Obtain Prior Consent""; ""2.2.2.5 Data Destruction/Retention""; ""2.3 Future Personal Data Protection Framework: How Will It Affect Behavioral On-line Tracking?""; ""2.3.1 Scope of Application""; ""2.3.2 Definitions""; ""2.3.3 Consent""; ""2.3.4 Notice""; ""2.3.5 The Right of Erasure (a???Right to Be Forgottena???)""; ""2.3.6 Data Protection a???by Designa???""; ""2.3.7 Towards a a???Privacy Friendliera??? Internet Tracking: The Role of Society, (Social) Media and Education""; ""2.4 Conclusion""; ""Bibliography"" 327 $a""Part II Taming the Future: Assessments of Risks in the Sphere of Privacy and Data Protection""""3 A Systematic Approach to the Legal Evaluation of Security Measures in Public Transportation""; ""3.1 Introduction""; ""3.2 Social and Legal Acceptability of Security Measures""; ""3.3 The Basic Concepts of Decision Making""; ""3.4 The Legal Evaluation of Security Measures""; ""3.4.1 Pre-stage a??? Identifying Fundamental Legal Provisions""; ""3.4.1.1 Type and Functions of the Security Measure""; ""3.4.1.2 Fundamental Legal Provisions""; ""3.4.2 Stage 1 a??? Deduction of Legal Requirements"" 327 $a""3.4.3 Stage 2 a??? Concretisation into Legal Criteria"" 330 $aThis book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection. . 410 0$aIssues in Privacy and Data Protection,$x2352-1929 ;$v20 606 $aMass media 606 $aLaw 606 $aComputers 606 $aLaw and legislation 606 $aPhilosophy 606 $aHuman rights 606 $aComputer security 606 $aComputers and civilization 606 $aIT Law, Media Law, Intellectual Property$3https://scigraph.springernature.com/ontologies/product-market-codes/R15009 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aPhilosophy of Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/E34050 606 $aHuman Rights$3https://scigraph.springernature.com/ontologies/product-market-codes/R19020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aMass media. 615 0$aLaw. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aPhilosophy. 615 0$aHuman rights. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aIT Law, Media Law, Intellectual Property. 615 24$aLegal Aspects of Computing. 615 24$aPhilosophy of Technology. 615 24$aHuman Rights. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a342.240858 702 $aGutwirth$b Serge$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLeenes$b Ronald$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $ade Hert$b Paul$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484992103321 996 $aReforming European Data Protection Law$92836735 997 $aUNINA