TY - GEN N2 - This book demonstrates different approaches ℓ́ℓ regulatory, legal and technological ℓ́ℓ to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear ℓ́ℓ it is a theme that runs throughout this book ℓ́ℓ ℓ́ℓcarrotsℓ́ℓ and ℓ́ℓsoft lawℓ́ℓ need to be backed up by ℓ́ℓsticksℓ́ℓ and ℓ́ℓhard lawℓ́ℓ. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book ℓ́ℓ including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher ℓ́ℓ share their views in the one and only book on Enforcing Privacy. AB - This book demonstrates different approaches ℓ́ℓ regulatory, legal and technological ℓ́ℓ to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear ℓ́ℓ it is a theme that runs throughout this book ℓ́ℓ ℓ́ℓcarrotsℓ́ℓ and ℓ́ℓsoft lawℓ́ℓ need to be backed up by ℓ́ℓsticksℓ́ℓ and ℓ́ℓhard lawℓ́ℓ. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book ℓ́ℓ including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher ℓ́ℓ share their views in the one and only book on Enforcing Privacy. T1 - Enforcing privacy :regulatory, legal and technological approaches / AU - Wright, David, AU - Hert, Paul de, VL - 25 CN - K3264.C65 ID - 762884 KW - Data protection KW - Privacy, Right of. SN - 9783319250472 SN - 3319250477 TI - Enforcing privacy :regulatory, legal and technological approaches / LK - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25047-2 UR - https://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25047-2 ER -