000762884 000__ 05110cam\a2200445Ii\4500 000762884 001__ 762884 000762884 005__ 20230306142244.0 000762884 006__ m\\\\\o\\d\\\\\\\\ 000762884 007__ cr\cn\nnnunnun 000762884 008__ 160426s2016\\\\sz\\\\\\ob\\\\001\0\eng\d 000762884 020__ $$a9783319250472$$q(electronic book) 000762884 020__ $$a3319250477$$q(electronic book) 000762884 020__ $$z9783319250458 000762884 035__ $$aSP(OCoLC)ocn947837021 000762884 035__ $$aSP(OCoLC)947837021 000762884 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dYDXCP$$dIDEBK$$dCDX$$dN$T$$dAZU$$dEBLCP$$dOCLCF$$dSNK 000762884 049__ $$aISEA 000762884 050_4 $$aK3264.C65 000762884 08204 $$a342.858$$223 000762884 24500 $$aEnforcing privacy :$$bregulatory, legal and technological approaches /$$cDavid Wright, Paul de Hert, editors. 000762884 264_1 $$a[Cham] :$$bSpringer,$$c2016. 000762884 300__ $$a1 online resource. 000762884 336__ $$atext$$btxt$$2rdacontent 000762884 337__ $$acomputer$$bc$$2rdamedia 000762884 338__ $$aonline resource$$bcr$$2rdacarrier 000762884 4901_ $$aLaw, governance and technology series ;$$v25 000762884 504__ $$aIncludes bibliographical references and index. 000762884 5050_ $$aAbout the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications -- contributions to transnational privacy enforcement;Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index. 000762884 506__ $$aAccess limited to authorized users. 000762884 520__ $$aThis book demonstrates different approaches ℓ́ℓ regulatory, legal and technological ℓ́ℓ to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear ℓ́ℓ it is a theme that runs throughout this book ℓ́ℓ ℓ́ℓcarrotsℓ́ℓ and ℓ́ℓsoft lawℓ́ℓ need to be backed up by ℓ́ℓsticksℓ́ℓ and ℓ́ℓhard lawℓ́ℓ. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book ℓ́ℓ including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher ℓ́ℓ share their views in the one and only book on Enforcing Privacy. 000762884 588__ $$aOnline resource; title from PDF title page (viewed May 4, 2016) 000762884 650_0 $$aData protection$$xLaw and legislation. 000762884 650_0 $$aPrivacy, Right of. 000762884 7001_ $$aWright, David,$$d1948 December 10-$$eeditor. 000762884 7001_ $$aHert, Paul de,$$eeditor. 000762884 830_0 $$aLaw, governance and technology series ;$$v25. 000762884 852__ $$bebk 000762884 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25047-2$$zOnline Access$$91397441.1 000762884 909CO $$ooai:library.usi.edu:762884$$pGLOBAL_SET 000762884 980__ $$aEBOOK 000762884 980__ $$aBIB 000762884 982__ $$aEbook 000762884 983__ $$aOnline 000762884 994__ $$a92$$bISE