Coverart for item
The Resource Enforcing Privacy : Regulatory, Legal and Technological Approaches, edited by David Wright, Paul De Hert, (electronic resource)

Enforcing Privacy : Regulatory, Legal and Technological Approaches, edited by David Wright, Paul De Hert, (electronic resource)

Label
Enforcing Privacy : Regulatory, Legal and Technological Approaches
Title
Enforcing Privacy
Title remainder
Regulatory, Legal and Technological Approaches
Statement of responsibility
edited by David Wright, Paul De Hert
Contributor
Editor
Subject
Language
eng
Summary
This book demonstrates different approaches – regulatory, legal and technological – to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear – it is a theme that runs throughout this book – zcarrotsy and zsoft lawy need to be backed up by zsticksy and zhard lawy. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book – including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher – share their views in the one and only book on Enforcing Privacy
Member of
Image bit depth
0
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Wright, David.
  • De Hert, Paul.
Series statement
Law, Governance and Technology Series,
Series volume
25
http://library.link/vocab/subjectName
  • Law
  • Computer security
  • Computers
  • Law and legislation
  • International law
  • Intellectual property
Label
Enforcing Privacy : Regulatory, Legal and Technological Approaches, edited by David Wright, Paul De Hert, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=http://dx.doi.org/10.1007/978-3-319-25047-2
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier.
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent.
Contents
About the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications – contributions to transnational privacy enforcement; Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index
Control code
978-3-319-25047-2
Dimensions
unknown
Extent
1 online resource (x, 506 pages)
File format
multiple file formats
Form of item
electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783319250472
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia.
Media type code
c
Other control number
10.1007/978-3-319-25047-2
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)947837021
Label
Enforcing Privacy : Regulatory, Legal and Technological Approaches, edited by David Wright, Paul De Hert, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=http://dx.doi.org/10.1007/978-3-319-25047-2
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier.
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent.
Contents
About the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications – contributions to transnational privacy enforcement; Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index
Control code
978-3-319-25047-2
Dimensions
unknown
Extent
1 online resource (x, 506 pages)
File format
multiple file formats
Form of item
electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783319250472
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia.
Media type code
c
Other control number
10.1007/978-3-319-25047-2
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)947837021

Library Locations

    • Badia FiesolanaBorrow it
      Via dei Roccettini 9, San Domenico di Fiesole, 50014, IT
      43.803074 11.283055
Processing Feedback ...