Front cover image for Data protection and privacy : (in)visibilities and infrastructures

Data protection and privacy : (in)visibilities and infrastructures

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.-- Provided by publisher
eBook, English, 2017
Springer, Cham, Switzerland, 2017
Electronic books
1 online resource
9783319507965, 9783319561776, 3319507966, 3319561774
973013599
Part 1: Fundamental and legal questions. 1. Legal fundamentalism: is data protection really a fundamental right? Bart Van der Sloot.- 2. Is there a Right to Offline Alternatives in a Digital World? Murat Karaboga, Tobias Matzner, Hannah Obersteller and Carsten Ochs.- 3. What is New with the Internet of Things in Privacy and Data Protection? Four Legal Challenges. Ugo Pagallo, Massimo Durante and Shara Monteleone.- Part 2: Concepts and tools. 4. Towards a code of Conduct on privacy for mHealth to foster trust among users of mobile health applications. Eugenio Mantovani, Joan Antokol, Sjaak Nouwt, Marian Hoekstra, Nico Schutte, Pēteris Zilgalvis, Juan-Pedro Castro and Claudia Prettner.- 5. Minimum Harm by Design. Reworking Privacy by Design to mitigate the risks of surveillance. Elisa Orru.- 6. A purpose-based taxonomy for better governance of personal data in the Internet of Things era: the example of wellness data. Claire Levallois-Barth and Hugo Zylberberg.- 7. A Privacy Engineering Framework for the Internet of Things. Antonio Kung, Frank Kargl, Santiago Suppan, Jorge Cuellar, Henrich C. Pöhls, Adam Kapovits, Nicolas Notario and Yod Samuel Martin.- Part 3: Case studies. 8. Dangers from Within? Looking Inwards at the Role of Maladministration as the Leading Cause of Health Data Breaches in the UK. Leslie Stevens, Christine Dobbs, Kerina Jones and Graeme Laurie.- 9. On the road to privacy- and data protection-friendly security technologies in the workplace - A case-study of the MUSES Risk and Trust Analysis Engine. Yung Shin Van Der Sype, Jonathan Guislain, Seigneur Jean-Marc and Xavier Titi.- 10. A Study on Corporate Compliance with Transparency Requirements of Data Protection Law. Christoph Bier, Simon Kömpf and Jürgen Beyerer.- Part 4: closing. 11. Closing remarks: 9th International Computers, Privacy and Data Protection Conference. Giovanni Buttarelli.
A selection of papers from the ninth edition of the annual Brussels-based International Conference on Computers, Privacy and Data Protection (CPDP 2016), which took place on 27, 28, and 29 January 2016
fsso.springer.com Available online via Springer E-books. Please select find Institution via Shibboleth and log in using your Exeter IT login, if prompted.