000724392 000__ 06336cam\a2200613Ii\4500 000724392 001__ 724392 000724392 005__ 20230306140532.0 000724392 006__ m\\\\\o\\d\\\\\\\\ 000724392 007__ cr\cn\nnnunnun 000724392 008__ 141119s2015\\\\gw\\\\\\ob\\\\000\0\eng\d 000724392 010__ $$a 2014954796 000724392 019__ $$a899219622$$a908090294 000724392 020__ $$a9789401793858$$qelectronic book 000724392 020__ $$a9401793859$$qelectronic book 000724392 020__ $$z9789401793841 000724392 0247_ $$a10.1007/978-94-017-9385-8$$2doi 000724392 0248_ $$aDOI 10.1007/978-94-017-9385-8 000724392 035__ $$aSP(OCoLC)ocn896116907 000724392 035__ $$aSP(OCoLC)896116907$$z(OCoLC)899219622$$z(OCoLC)908090294 000724392 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dYDXCP$$dCOO$$dNLGGC$$dOCLCF$$dIDEBK$$dEBLCP 000724392 0410_ $$aeng$$beng 000724392 049__ $$aISEA 000724392 050_4 $$aKJE6071 000724392 08204 $$a343.40999$$223 000724392 08204 $$a342.2408/58$$223 000724392 24500 $$aReforming European data protection law$$h[electronic resource] /$$cSerge Gutwirth, Ronald Leenes, Paul de Hert, editors. 000724392 264_1 $$aDordrecht :$$bSpringer,$$c[2015] 000724392 264_4 $$c©2015 000724392 300__ $$a1 online resource. 000724392 336__ $$atext$$btxt$$2rdacontent 000724392 337__ $$acomputer$$bc$$2rdamedia 000724392 338__ $$aonline resource$$bcr$$2rdacarrier 000724392 4901_ $$aLaw, governance and technology series ;$$vvolume 20 000724392 504__ $$aIncludes bibliographical references. 000724392 5050_ $$aPreface; Contents; Contributors; Part I Profiling: A Persistent Core Issue of Data Protection and Privacy; 1 Profiling Technologies and Fundamental Rights and Values: Regulatory Challenges and Perspectives from European Data Protection Authorities; 1.1 Introduction; 1.2 Profiling: Towards a Definition; 1.3 Societal Consequences of Digitization; 1.4 Profiling as a Threat for Fundamental Rights and Values; 1.4.1 Fundamental Values; 1.4.2 Fundamental Rights; 1.4.2.1 The Right to Privacy and the Right to Data Protection; 1.4.2.2 The Right to Non-discrimination 000724392 5058_ $$a1.5 So Far so Good -- Regulating Profiling1.6 National Data Protection Authorities' (DPAs) Responses to Profiling Questionnaire; 1.6.1 Findings; 1.6.1.1 Legal Aspects; 1.6.1.2 Domains of Application; 1.6.1.3 Fundamental Rights; 1.6.1.4 Procedure to Complaint; 1.6.1.5 Awareness; 1.7 Conclusions; References; 2 On-line Behavioral Tracking: What May Change After the Legal Reform on Personal Data Protection; 2.1 On-line Behavioral Tracking; 2.1.1 Definition and Today's Trends; 2.1.2 Techniques of Online Tracking; 2.1.2.1 On-line Scrutiny Through Cookies: Are They Always a Threat to Privacy? 000724392 5058_ $$a2.1.2.2 Javascript2.1.2.3 Stateless Tracking; 2.1.2.4 Supercookies and Evercookies; 2.1.2.5 Location Tracking; 2.1.2.6 Online Social Network Tracking; 2.1.3 Risks of On-line Tracking; 2.2 On-line Tracking Under the Current Data Protection Legal Framework; 2.2.1 Personal Data Protection Directive; 2.2.2 Applicability of the Core Foundations of Personal Data Protection; 2.2.2.1 Purpose Limitation; 2.2.2.2 Data Subject Notice; 2.2.2.3 Proportionality; 2.2.2.4 Obligation to Obtain Prior Consent; 2.2.2.5 Data Destruction/Retention 000724392 5058_ $$a2.3 Future Personal Data Protection Framework: How Will It Affect Behavioral On-line Tracking?2.3.1 Scope of Application; 2.3.2 Definitions; 2.3.3 Consent; 2.3.4 Notice; 2.3.5 The Right of Erasure ("Right to Be Forgotten"); 2.3.6 Data Protection "by Design"; 2.3.7 Towards a "Privacy Friendlier" Internet Tracking: The Role of Society, (Social) Media and Education; 2.4 Conclusion; Bibliography; Part II Taming the Future: Assessments of Risks in the Sphere of Privacy and Data Protection; 3 A Systematic Approach to the Legal Evaluation of Security Measures in Public Transportation 000724392 5058_ $$a3.1 Introduction3.2 Social and Legal Acceptability of Security Measures; 3.3 The Basic Concepts of Decision Making; 3.4 The Legal Evaluation of Security Measures; 3.4.1 Pre-stage -- Identifying Fundamental Legal Provisions; 3.4.1.1 Type and Functions of the Security Measure; 3.4.1.2 Fundamental Legal Provisions; 3.4.2 Stage 1 -- Deduction of Legal Requirements; 3.4.3 Stage 2 -- Concretisation into Legal Criteria; 3.4.4 Stage 3 -- Concretisation into Technical Objectives; 3.4.5 Stage 4 -- Comparison; 3.4.6 Alternative: Stage 4 -- Technical Design Proposals; 3.4.7 Example of Use 000724392 506__ $$aAccess limited to authorized users. 000724392 520__ $$aThis book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection. 000724392 588__ $$aOnline resource; title from PDF title page (viewed November 19, 2014). 000724392 650_0 $$aData protection$$xLaw and legislation$$zEuropean Union countries. 000724392 650_0 $$aPrivacy, Right of$$zEuropean Union countries. 000724392 650_0 $$aComputer security$$xLaw and legislation. 000724392 7001_ $$aGutwirth, Serge,$$eeditor. 000724392 7001_ $$aLeenes, Ronald,$$eeditor. 000724392 7001_ $$aHert, Paul de,$$eeditor. 000724392 77608 $$iPrint version:$$z9789401793841 000724392 830_0 $$aLaw. governance and technology series ;$$vvolume 20. 000724392 85280 $$bebk$$hSpringerLink 000724392 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-94-017-9385-8$$zOnline Access$$91397441.1 000724392 909CO $$ooai:library.usi.edu:724392$$pGLOBAL_SET 000724392 980__ $$aEBOOK 000724392 980__ $$aBIB 000724392 982__ $$aEbook 000724392 983__ $$aOnline 000724392 994__ $$a92$$bISE