001450477 000__ 06710cam\a2200637\i\4500 001450477 001__ 1450477 001450477 003__ OCoLC 001450477 005__ 20230310004527.0 001450477 006__ m\\\\\o\\d\\\\\\\\ 001450477 007__ cr\cn\nnnunnun 001450477 008__ 221021s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001450477 019__ $$a1348485361 001450477 020__ $$a9783031099014$$q(electronic bk.) 001450477 020__ $$a303109901X$$q(electronic bk.) 001450477 020__ $$z9783031099007 001450477 020__ $$z3031099001 001450477 0247_ $$a10.1007/978-3-031-09901-4$$2doi 001450477 035__ $$aSP(OCoLC)1348285749 001450477 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dN$T$$dUKAHL$$dOCLCQ 001450477 049__ $$aISEA 001450477 050_4 $$aK3264.C65 001450477 08204 $$a342.08/58$$223/eng/20221101 001450477 1112_ $$aPrivacy Symposium$$d(2022 :$$cVenice, Italy). 001450477 24510 $$aPrivacy symposium 2022 :$$bdata protection law international convergence and compliance with innovative technologies (DPLICIT) /$$cStefan Schiffner, Sebastien Ziegler, Adrian Quesada Rodriguez, editors. 001450477 24630 $$aDPLICIT 001450477 264_1 $$aCham :$$bSpringer,$$c[2022] 001450477 264_4 $$c©2022 001450477 300__ $$a1 online resource (xiv, 252 pages) :$$billustrations (chiefly color) 001450477 336__ $$atext$$btxt$$2rdacontent 001450477 337__ $$acomputer$$bc$$2rdamedia 001450477 338__ $$aonline resource$$bcr$$2rdacarrier 001450477 500__ $$aConference proceedings. 001450477 500__ $$aIncludes index. 001450477 5050_ $$aIntro -- Preface -- Organization -- Executive Commitee -- Steering Committee -- Program Commitee -- Additional Referees -- Sponsoring Institutions -- Contents -- Part I Privacy Friendly Data Usage -- 1 An Overview of the Secondary Use of Health Data Within the European Union: EU-Driven Possibilities and Civil Society Initiatives -- 1 Introduction: The Potential of the Secondary Use of Data for Health and Care in the European Union -- 2 The Legal Framework in the European Union -- 2.1 The Secondary Use of Health Data Within the General Data Protection Regulation (GDPR) 001450477 5058_ $$a2.2 The Data Governance Act: A Debated First Approach to the Secondary Use of Data -- 2.3 Artificial Intelligence and Personal Data in the EU Framework -- 3 Initiatives Towards the Use of Data Within Healthcare Research -- 3.1 Policymaker Initiatives -- 3.2 Civil Society Initiatives -- 4 Discussion -- 5 Conclusions -- References -- 2 Multi-Party Computation in the GDPR -- 1 Introduction -- 2 Multi-Party Computation -- 2.1 Introduction -- 2.2 Private Set Intersection -- 2.3 Security -- 3 GDPR: Personal Data -- 3.1 Absolute Approach -- 3.2 Relative Approach -- 3.3 Risk-Based Approach 001450477 5058_ $$a3.4 Conclusion -- 4 GDPR: Data Protection by Design -- 4.1 Article 25 -- 4.2 Privacy Engineering -- 4.2.1 Privacy-Enhancing Technologies -- 4.3 EDPB Guidelines -- 4.4 Conclusion -- 5 MPC in the GDPR -- 5.1 Related Work -- 5.2 Test -- 5.2.1 Absolute vs. Relative -- 5.2.2 Input Data -- 5.2.3 Output Data -- 5.2.4 Data Minimization -- 5.3 Security Model and Trust Assumption -- 5.3.1 GDPR Avoidance -- 5.3.2 Data Protection by Design -- 6 Scenarios -- 6.1 Private Set Intersection -- 6.1.1 Solution 1 -- 6.1.2 Solution 2 -- 6.1.3 Solution 3 -- 6.2 Outsourcing -- 6.2.1 Solution -- 6.2.2 Variant 001450477 5058_ $$a7 Conclusion -- References -- 3 A Critique of the Google Apple Exposure Notification (GAEN) Framework -- 1 Introduction -- 2 How Contact Tracing and Exposure Notification Works -- 3 The GAEN Framework -- 4 How the GAEN Framework Differs from a Purely App-Based Approach -- 5 A Critique of the GAEN Framework -- 5.1 GAEN Creates a Dormant Mass Surveillance Tool -- 5.2 Google and Apple Control the Exposure Notification Microdata -- 5.3 Distributed Can Be Made Centralised -- 5.4 Google and Apple Dictate How Contact Tracing Works -- 5.5 Function Creep -- 6 Conclusion -- References 001450477 5058_ $$aPart II Implications of Regulatory Framework in the European Union -- 4 Global Data Processing Identifiers and Registry (DP-ID) -- 1 Introduction -- 2 Global Data Processing Identifier Registry Concept -- 3 Facilitating GDPR Compliance -- 3.1 Obligation to Inform Art. 12, 13, 14 -- 3.2 Data Protection by Design and Default Art. 25 -- 4 Data Processing-Identified Requirements -- 5 DP-ID Implementation -- 6 Data Processing Identifier Format -- 7 Enabling Data Processing Mapping -- 8 Demonstrating Integrability and Portability -- 9 Demonstrating Interoperability 001450477 506__ $$aAccess limited to authorized users. 001450477 520__ $$aThis book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services. Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 001450477 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 1, 2022). 001450477 650_0 $$aData protection$$xLaw and legislation$$vCongresses. 001450477 650_0 $$aPrivacy, Right of$$vCongresses. 001450477 655_0 $$aElectronic books. 001450477 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001450477 655_7 $$aConference papers and proceedings.$$2lcgft 001450477 7001_ $$aSchiffner, Stefan,$$eeditor. 001450477 7001_ $$aZiegler, Sebastien,$$eeditor. 001450477 7001_ $$aQuesada Rodríguez, Adrián,$$eeditor. 001450477 77608 $$iPrint version:$$z3031099001$$z9783031099007$$w(OCoLC)1322812039 001450477 852__ $$bebk 001450477 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-09901-4$$zOnline Access$$91397441.1 001450477 909CO $$ooai:library.usi.edu:1450477$$pGLOBAL_SET 001450477 980__ $$aBIB 001450477 980__ $$aEBOOK 001450477 982__ $$aEbook 001450477 983__ $$aOnline 001450477 994__ $$a92$$bISE