Academic literature on the topic 'Data protection – Europe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data protection – Europe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data protection – Europe"

1

Mathieson, SA. "Data protection in the new Europe." Infosecurity Today 1, no. 4 (July 2004): 26–28. http://dx.doi.org/10.1016/s1742-6847(04)00087-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Madsen, Wayne. "Data protection in single-market Europe." Computer Fraud & Security Bulletin 1993, no. 6 (June 1993): 8–13. http://dx.doi.org/10.1016/0142-0496(93)90170-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tempest, Alastair, and Goetz Brandau. "Data protection in Europe — A cloudy future." Journal of Direct, Data and Digital Marketing Practice 12, no. 2 (October 2010): 180–93. http://dx.doi.org/10.1057/dddmp.2010.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Kunbei. "Incomplete Data Protection Law." German Law Journal 15, no. 6 (October 1, 2014): 1071–104. http://dx.doi.org/10.1017/s2071832200019271.

Full text
Abstract:
The European legal system governing data protection issues is widely regarded as an adequate blueprint for late developers to follow. According to this position, host countries will benefit from receiving the ready-made data protection law because it has already gone through a process of trial and error in Europe. For example, China follows the traditional civil law measures on data protection, such as contractual and tort liability. No Chinese legislation deals specifically with the right to protection of personal data. In China, researchers paid attention to the European legal system, which is regarded as the milestone for data protection. Some vigorously suggest that China should quickly move to enact data protection law based on the model provided by European law.When Chinese researchers strongly promote the European legal system over data protection issues, they send an underlying message that the quality of European laws is good enough to sufficiently deter violations: Individuals would be prohibited from carrying out harmful actions as soon as the expected law is transplanted to China. From a Chinese perspective, our country could quickly move to enact a similar law following the tone of Europe in order to enhance the efficiency of data protection. But is this a compelling position? Will European data protection laws indeed regulate unambiguously and prospectively? Will European data protection laws provide clear guidance to Chinese judges for resolving data protection-related cases? And will the court-enforced laws sufficiently solve the broad spectrum of problems on data use? Understanding the European enforcement mechanism covering data protection issues, and thereby assessing its efficacy on deterrence, is vital to answering these questions.
APA, Harvard, Vancouver, ISO, and other styles
5

Mulder, T. "The Protection of Data Concerning Health in Europe." European Data Protection Law Review 5, no. 2 (2019): 209–20. http://dx.doi.org/10.21552/edpl/2019/2/10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bendiek, Annegret, and Magnus Römer. "Externalizing Europe: the global effects of European data protection." Digital Policy, Regulation and Governance 21, no. 1 (January 14, 2019): 32–43. http://dx.doi.org/10.1108/dprg-07-2018-0038.

Full text
Abstract:
Purpose This paper aims to explain how the EU projects its own data protection regime to third states and the US in particular. Digital services have become a central element in the transatlantic economy. A substantial part of that trade is associated with the transfer of data, most of it personal, requiring many of the new products and services emerging to adhere to data protection standards. Yet different conceptions of data protection exist across the Atlantic, with the EU putting a particular focus on protecting the fundamental right to privacy. Design/methodology/approach Using the distinction between positive and negative forms of market integration as a starting point (Scharpf, 1997), this paper examines the question of how the EU is projecting its own data protection regime to third states. The so-called California effect (Vogel, 1997) and the utilization of trade agreements in the EU’s foreign policy and external relations are well researched. With decreasing effectiveness and limited territorial reach of its enlargement policy, the EU found trade agreements to be particularly effective to set standards on a global level (Lavenex and Schimmelfennig, 2009). The existence of the single market makes the Union not only an important locus of regulation but also a strong economic actor with the global ambition of digital assertiveness. In the past, establishing standards for the EU’s vast consumer market has proven effective in compelling non-European market participants to join. Findings As the globe’s largest consumer market, Europe aims to project its own data protection laws through the market place principle (lex loci solutionis), requiring any data processor to follow its laws whenever European customers’ data are processed. This paper argues that European data protection law creates a “California Effect”, whereby the EU exerts pressure on extra-territorial markets by unilateral standard setting. Originality/value With its GDPR, the EU may have defused the problem of European citizens’ data being stored and evaluated according to the US law. However, it has also set a precedent of extra-territorial applicability of its legislation – despite having previously criticized the USA for such practices. By now, international companies increasingly store data of European customers in Europe to prevent conflicts with EU law. With this decision, the EU will apply its own law on others’ sovereign territory. Conflicts created through the extra-territorial effects of national law may contradict the principle of due diligence obligations but are nevertheless not illegitimate. They may, however, have further unintended effects: Other major economies are likely to be less reluctant in the future about passing legal provisions with extra-territorial effect.
APA, Harvard, Vancouver, ISO, and other styles
7

Hallinan, Dara, Michael Friedewald, and Paul McCarthy. "Citizens' perceptions of data protection and privacy in Europe." Computer Law & Security Review 28, no. 3 (June 2012): 263–72. http://dx.doi.org/10.1016/j.clsr.2012.03.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Babić, Aida Škoro. "Successful and Effective Data Protection: a Myth or Achievable Task?" Atlanti 26, no. 1 (October 24, 2016): 177–85. http://dx.doi.org/10.33700/2670-451x.26.1.177-185(2016).

Full text
Abstract:
In the paper the author is addressing the issue of data protection by observing several points of the view. With the overview of diverse legislation in Europe and of definitions of personal data through different legal acts, the author is giving several starting points toward many questions, which arise on data protection issue. One of the most important points is protecting human rights and redressing the injustices. Next question, which arises, is the issue of data protection related to the same data in different archival records, in different archives and in different countries. The issue is discussed on the overview of the archival records of courts and military courts in the context of protecting human rights as well as on the archival records of former Yugoslavia.
APA, Harvard, Vancouver, ISO, and other styles
9

Stratford, Jean Slemmons, and Juri Stratford. "Data Protection and Privacy in the United States and Europe." IASSIST Quarterly 22, no. 3 (January 31, 1999): 17. http://dx.doi.org/10.29173/iq80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lestari, Yuliannova, and M. Misbahul Mujib. "Optimizing Personal Data Protection Legal Framework in Indonesia (a Comparative Law Study)." Supremasi Hukum: Jurnal Kajian Ilmu Hukum 11, no. 2 (December 31, 2022): 203. http://dx.doi.org/10.14421/sh.v11i2.2729.

Full text
Abstract:
This study explores the protection of personal data-appealing discourse these days. Globally, 132 countries already have special arrangements to protect personal data. The Bill on the Protection of Personal Data in Indonesia is already in the National Legislation Program. Indonesia does not yet have special regulations regarding protecting personal data. Furthermore, it also discussed personal data protection regulations in several countries, both Europe and Asia. This study uses a comparative study that compares personal data protection among countries for further studies on what matters should be included in the Data Protection Bill for Indonesia. The study showed that personal data protection arrangements certainly differ. Most Data Privacy Protection regulates the same stuff, such as principles, protection mechanisms, rights of data subjects, transfers to third countries, and sanctions. It also showed that the regulation of Personal Data Protection in Indonesia is still not adequately controlled compared to the regulations in other countries
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Data protection – Europe"

1

Alunge, Nnangsope Rogers Alunge <1985&gt. "Analyses of selected legal issues related to personal data security and the inter-relationship between personal data protection law in Africa and Europe." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amsdottorato.unibo.it/9512/1/Thesis%20regrouped%20-%20for%20final%20submission%20%28reviewer-corrected%29.pdf.

Full text
Abstract:
It has been well documented that the unprecedented use of computerized technology to process personal information in the 1960s in Europe and the US led to concerns about individual privacy, which resulted in the introduction of a branch of law regulating the processing of personal data, known today as personal data protection law. Over the years, this relatively new domain of law has introduced rights and obligations which appear to have the capacity to regulate a vast variety of domains of activity as long as they involve processing information about humans. This publication-based thesis regroups five published/accepted articles which generally seek to appreciate the significance of rights and obligations of this branch of law within the EU and Africa. The Chapters in this thesis focus on a limited variety of selected themes in data protection law. The first Chapter addresses the lack of clarification of the meaning of a breach of security in EU data protection law, and the second Chapter examines the level of personal data security protection guaranteed by African regional data protection instruments. The third and fourth Chapters both explore the potential effect of the transposition of EU data protection legal standards into African soil, respectively focusing on the processing of public examination results and on curtailing the prevalence of teacher-student abuses on university campuses. The fifth and final Chapter presents a comparative analysis between the EU GDPR, the Ghanaian Data Protection Act 2012 and Kenyan Data Protection Act 2019 in their approaches to consolidate the OECD data protection principles. The thesis conclusively finds that transposing EU data protection standards into Africa could help regulate some under-regulated domains of activity. But the continent's institutions still need to do a lot in terms of harmonising and promoting personal data protection law among its countries.
APA, Harvard, Vancouver, ISO, and other styles
2

Chemlali, Laroussi. "Protection du consommateur et commerce électronique : droit français, européen et tunisien." Thesis, Paris Est, 2011. http://www.theses.fr/2011PEST0049.

Full text
Abstract:
Le commerce électronique B to C se popularise de plus en plus et le nombre de ses adeptes ne cesse de croître d'année en année. Ses avantages, pour les consommateurs, en termes de rapidité, de commodité et de proximité ne sont plus à prouver. Néanmoins, la particularité du medium utilisé pour effectuer des transactions en ligne et les spécificités de l'environnement électronique, notamment l'immatérialité, l'interactivité et l'internationalité influent considérablement sur la confiance des cyberconsommateurs en même temps qu'elles accroissent leur vulnérabilité, d'où la nécessité d'un cadre juridique adapté afin que l'essor du commerce électronique B to C ne néglige pas la protection des cyberconsommateurs. Conscients de cet impératif, les législateurs communautaire, français et tunisien, ont mis en place un certain nombre de mesures de nature à rassurer ces derniers et leur permettre de s'engager dans des transactions de commerce en ligne en toute confiance. Ces mesures sont de deux ordres : les unes sont destinées à assurer au cyberconsommateur une protection intrinsèque au processus de la transaction en ligne ; cette protection se manifeste en amont de la transaction, lors de la phase précontractuelle, mais également pendant la période contractuelle, c'est-à-dire au moment de la finalisation de la transaction en ligne et de son exécution. Les autres ont pour objectif de garantir au consommateur une protection extrinsèque au processus de la transaction du commerce électronique. Deux aspects sont, à cet égard, pris en compte : la protection des données à caractère personnel traitées dans le cadre d'une transaction en ligne et les aspects du droit international privé de la protection du cyberconsommateur
B to C e-commerce is increasingly gaining popularity. The number of its followers has seen a drastic surge throughout the few recent years. Its advantages in terms of speed, convenience and proximity are not any more questionable by consumers. Nevertheless, the characteristic of this medium used to carry out online transactions as well as the specificities of the electronic environment - in particular the immateriality, the interactivity and internationality - influence considerably cyber-consumers confidence. Simultaneously, they increase their vulnerability. Thus, the need for an appropriate legal framework to regulate the rise of B to C e-commerce and protect cyber-consumers. Taking into account these requirement, community, French and Tunisian legislators set up a number of measures to reassure the latter and allow them to engage confidently in online commerce transactions. These measures have two targets: some of them were intended to grant cyber-consumers an intrinsic protection in the process of the online transaction. This protection is set to be an upstream transaction protection at the pre-contractual phase as well as during the contractual period; i.e. at the level of on line transaction finalization and execution. The others aim to guarantee the consumer an extrinsic protection throughout the process of e-commerce transaction. In this respect, two aspects are taken into account, namely: personal data processed during transactions and the aspects of private international law of cyber-consumer protection
APA, Harvard, Vancouver, ISO, and other styles
3

Suárez, Gonzalo Sara. "Big data, poder y libertad. Sobre el impacto social y político de la vigilancia masiva." Doctoral thesis, Universitat Pompeu Fabra, 2019. http://hdl.handle.net/10803/668235.

Full text
Abstract:
Esta tesis doctoral reflexiona sobre el impacto social y político de la explotación de datos masivos a nivel europeo. Cumple dos objetivos principales. En primer lugar, define el contexto general en el que se produce esta explotación, a través del análisis de cinco factores: a) la lógica de generación, recopilación y procesamiento de los datos masivos; b) el modelo de negocio de las grandes corporaciones de servicios digitales; c) el discurso mediático dominante acerca de las tecnologías big data; d) las reacciones sociales y formas de resistencia ante este nuevo escenario; y e) el reglamento europeo de protección de datos personales, incluyendo su fundamentación conceptual. En segundo lugar, discute en qué medida estos cinco factores favorecen u obstaculizan la privacidad, la libertad y el control sobre los datos, desde una perspectiva fundamentada en la teoría crítica del capitalismo, la filosofía republicana, la teoría política feminista y la teoría del framing. La investigación se compone de cinco publicaciones: 1. La conversación sobre big data en Twitter. Una primera aproximación al análisis del discurso dominante. 2. Tay is you. The attribution of responsibility in the algorithmic culture. 3. Big social data: límites del modelo notice and choice para la protección de la privacidad. 4. Your likes, your vote? Big personal data exploitation and media manipulation in the US presidential election campaign of Donald Trump in 2016. 5. Personal data are political. A feminist view on privacy and personal data protection. Esta memoria contextualiza, organiza y relaciona las aportaciones principales de estos artículos.
This doctoral thesis reflects on the social and political impact of big data exploitation at the European level. The research fulfils two main objectives. Firstly, it defines the general context in which this exploitation is embedded, through the analysis of five factors: a) the logic of big data generation, gathering and processing; b) the business model of digital services corporations; c) the dominant media discourse on big data technologies; d) the social reactions and forms of resistance to this new scenario; and e) the European regulation on personal data protection, including its conceptual foundations. Secondly, it discusses to what extent these five factors favour or hinder privacy, freedom and control over data, from the lens of critical theory of capitalism, republican philosophy, feminist political theory and framing theory. The study consists of five publications: 1. La conversación sobre big data en Twitter. Una primera aproximación al análisis del discurso dominante. 2. Tay is you. The attribution of responsibility in the algorithmic culture. 3. Big social data: límites del modelo notice and choice para la protección de la privacidad. 4. Your likes, your vote? Big personal data exploitation and media manipulation in the US presidential election campaign of Donald Trump in 2016. 5. Personal data are political. A feminist view on privacy and personal data protection. This report contextualizes, organizes and connects the main contributions of these papers.
Aquesta tesi doctoral reflexiona sobre l'impacte social i polític de l'explotació de dades massives a escala europea. Compleix dos objectius principals. En primer lloc, defineix el context general en el qual es produeix aquesta explotació, a través de l'anàlisi de cinc factors: a) la lògica de generació, recopilació i processament de les dades massives; b) el model de negoci de les grans corporacions de serveis digitals; c) el discurs mediàtic dominant al voltant de les tecnologies big data; d) les reaccions socials i formes de resistència davant d’aquest nou escenari; i e) el reglament europeu de protecció de dades personals, incloent-hi la seva fonamentació conceptual. En segon lloc, discuteix en quina mesura aquests cinc factors afavoreixen o obstaculitzen la privacitat, la llibertat i el control sobre les dades, des d'una perspectiva fonamentada en la teoria crítica del capitalisme, la filosofia republicana, la teoria política feminista i la teoria del framing. La recerca es composa de cinc publicacions: 1. La conversación sobre big data en Twitter. Una primera aproximación al análisis del discurso dominante. 2. Tay is you. The attribution of responsibility in the algorithmic culture. 3. Big social data: límites del modelo notice and choice para la protección de la privacidad. 4. Your likes, your vote? Big personal data exploitation and media manipulation in the US presidential election campaign of Donald Trump in 2016. 5. Personal data are political. A feminist view on privacy and personal data protection. Aquesta memòria contextualitza, organitza i relaciona les aportacions principals d'aquests articles.
APA, Harvard, Vancouver, ISO, and other styles
4

Alessio-Verni', Caterina <1996&gt. "The General Data Protection Regulation: analysis of principles, impacts and effectiveness in the data-driven economy." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19797.

Full text
Abstract:
The starting point of the dissertation is the relevance of data in today’s society and the rapid growth of the data-driven economy in the recent years. The common thread will be the General Data Protection Regulation (GDPR), starting from the discussion of the background that has led to the regulatory framework, to the analysis of the GDPR principles and concluding with the practical application of the Regulation within a company and the evaluation of its repercussions. The aim is to evaluate the impacts and the effectiveness of the Regulation, to understand whether the GDPR represents an adding value instrument for the European Union. The first chapter will present the data-driven society focusing on the social and economic problems connected with personal data disclosure and the economic evaluation of data. The second chapter will discuss the specific principles of the GDPR and the entities compliance requirements. The last chapter will consider a case study to examine the application of the Regulation within an insurance company, especially with regards to the business organisation, analysing the internal audit procedures and cost implications. Finally, the fitness check of the Regulation will be conducted, evaluating the impacts and the effectiveness of the GDPR. Key words: GDPR, data-driven, personal data, disclosure, economic valuation, privacy
APA, Harvard, Vancouver, ISO, and other styles
5

Hoffiani, Mansoor. "Strengthening European Data Protection in the Era of Artificial Intelligence." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-94723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chihai, Corina <1991&gt. "Applicazione dell'art. 35 del Regolamento UE n. 2016/679 - Data Protection Impact Assessment." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/15645.

Full text
Abstract:
Il presente elaborato viene focalizzato sul diritto alla privacy nel nuovo “Pacchetto protezione dati”, soprattutto nel Regolamento (UE) 2016/679 del Parlamento Europeo e del Consiglio del 27 aprile 2016 relativo alla protezione delle persone fisiche con riguardo al trattamento dei dati personali, obbligando l’adeguamento della normativa nazionale di ogni Stato membro entro il 24 maggio 2018. Il GDPR (General Data Protection Regulation) introduce delle significative novità in tema di privacy, come ad esempio il principio dell’accountability (responsabilizzazione) in capo al Titolare del trattamento dati e al responsabile del trattamento dati, la figura del Responsabile Protezione Dati (RPD o DPO), il diritto alla portabilità dei dati, il diritto all’oblio, la protezione dei dati fin dalla progettazione (Privacy by design) e protezione per impostazione predefinita (Privacy by Default), cambiando completamente la prospettiva della Direttiva 95/46/CE – la cosiddetta Direttiva “madre”. Ma il cuore dell’intera dissertazione è l’articolo 35 del GDPR, ai sensi del quale viene prevista la valutazione d’impatto sulla protezione dei dati, o la c.d. Data Protection Impact Assessment (DPIA). Tale valutazione è un processo finalizzato a valutare il rispetto dei principi privacy – come i principi di necessità e proporzionalità – e a valutare e gestire i rischi inerenti al trattamento. In merito, si terrà conto delle Linee guida del Gruppo di Lavoro articolo 29, in special modo dei criteri per stabilire se un trattamento “possa presentare un rischio elevato” in base al Regolamento UE n. 2016/679. Al riguardo verrà sviluppato un modello di valutazione di impatto sulla protezione dei dati, nonché la sua applicazione all'interno di cinque realtà diverse, ovvero la videosorveglianza sul posto di lavoro, i dati medici in azienda ospedaliera, la richiesta del casellario giudiziario a fini assuntivi, il trattamento dei dati nel settore del telemarketing, il trattamento dei dati nell'ambito bancario.
APA, Harvard, Vancouver, ISO, and other styles
7

Spiller, Elisa. "Diritti fondamentali e big data. I profili costituzionali della protezione dei dati personali tra diritto italiano e europeo." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3423305.

Full text
Abstract:
La tesi si propone di affrontare le questioni legate all'impatto dei big data sui diritti fondamentali, concentrando l'attenzione sulla funzione costituzionale del diritto alla protezione dei dati personali nel contesto italiano ed europeo. Dopo aver dato conto del percorso svolto dal diritto internazionale ed europeo per definire i fondamenti di tale disciplina e le implicazioni costituzionali delle garanzie che propone, viene esaminato con particolare attenzione il quadro normativo interno, analizzando come il Giudice delle leggi e il legislatore nel tempo abbiano affrontato il rapporto tra diritti e informazioni. Specifica attenzione è rivolta soprattutto all'individuazione dei molteplici interessi intercettati da questa disciplina e ai criteri di bilanciamento da essa indicati per procedere alla ricomposizione dei conflitti tra prerogative confliggenti. L'analisi si sofferma inoltre sul sistema di tutele elaborato a livello comunitario, concentrandosi inizialmente sul primo c.d. data protection package, per poi passare a considerare la nuova strategia di data-governance europea e i contenuti del reg. 679/2016. Facendo ciò, si approfondiscono in particolare il percorso che ha portato il legislatore europeo a riconoscere la protezione dei dati personali come diritto fondamentale dell'UE (art. 8 CDFUE) e le implicazioni che questo ha avuto sul piano delle competenze comunitarie (art. 16 TFUE). Da ultimo, alla luce delle considerazioni appena accennate, viene proposto un case-study in cui si affrontano i problemi che vengono emergendo da questa progressiva comunitarizzazione della disciplina sulla protezione dei dati personali, soprattutto nei rapporti tra la Corte di giustizia UE e i giudici costituzionali nazionali. Chiude il lavoro una riflessione circa le prospettive che si aprono per il c.d. costituzionalismo tecnologico europeo a il ruolo che spetta all'Unione e agli Stati membri nel promuovere questa trasposizione delle tradizionali garanzie a favore dei diritti fondamentali.
The dissertation aims to tackle the issues emerging by the use of big data analytics on fundamental rights. The attention focuses on the constitutional analysis of the fundamental right to the protection of personal data, and the goal is to compare the different approaches developed by EU law and national law on this topic. The first part gives a short introduction to the overall outline of the study, defining the structure and the methodology. After that, the second part provides a brief overview of the gist of the international and European data protection strategies, then it analyses on the national legal framework. In particular, the core of this chapter focuses on the approach developed by the Italian Constitutional Court about the issues concerning privacy and data protection. Furthermore, it pays precise attention to the many interests intertwined by personal data analytics and to the standards developed by the domestic constitutional case-law to balance the opposite prerogatives involved these processings. In light of the recent Italian case-law on the relation between the national and the European legal systems, the third part develops the evolution of the EU discipline on data protection. As first, it focuses on the first data protection package launched in the 90s. It then addresses the issues concerning the ongoing debate on the current EU strategies on data-governance, highlighting on the novelties introduced by the regulation 2016/679/EU. So doing, the study devotes particular attention the constitutionalization process of data protection in the supranational legal system. In particular, it focuses on article 8 of the Charter of Nice and article 16 TFEU. Finally, the last part provides a case study focused on the EUCJ case-law on data and fundamental rights. This section aims to address the issues emerging in this progressive shift of the constitutional guarantees on data protection towards the Luxemburg Court. In particular, the research focuses on the institutional dialogue developed between the EUCJ and the national constitutional courts on these themes. The work concludes providing some provisional disclosures on this complicate evolution of the EU technological constitutionalism, remarking on the contact points that animate this multilevel system of protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Tassanakunlapan, Tossapon. "Protection of personal data in cyberspace: the EU-US E-market regime." Doctoral thesis, Universitat de Barcelona, 2017. http://hdl.handle.net/10803/463075.

Full text
Abstract:
The object of study of this research is the right to Personal Data Protection within the framework of the EU-US E-Market legal regime. Its characteristics, as well as the features of the main actors participating into that E-Market, make possible to consider it as a proper basis for the development of an International/Universal legal system treaty-based. The Actors and Relations included by the research are the duty bearers of Personal Data Protection law, both State and Private Entity Activities. Nonetheless, the Informal Power Relation between State and Private organization is also taken into account since there are some informal agreements or coordination between State Agencies and IT Corporations on data sharing and processing. The time frame of the research is 2001-2016 (after the terrorist’s attack in USA on 9/11 until the most recent reform of the EU-US E-Market regime in 2016). The research’s point of departure is International Human Rights Law, as far as it recognizes a general framework to support and regulate personal data protection on cyberspace realm. Nonetheless, the distinctive characters of cyberspace demand a well designed, at universal level, specific regulation and mechanisms to guarantee such fundamental rights relating personal data protection internationally. Accordingly, Research Hypothesis is represented in double issues: first, effective personal data protection on cyberspace needs the establishment of an International/Universal legal system treaty-based; second, EU Regime on personal data protection in cyberspace and current EU-US agreements on this issue can be used as a model for initiating such International/Universal Treaty. The structure of the thesis is divided into six chapters, being Chapter 1 the research design and Chapter 6 the conclusions and recommendations coming from the research. So, Chapter 2 analyzes Universal Legal Instruments, EU Laws and EU-US Agreements in force before 5th June 2013 (critical turning point date because of the revelations of Mass Electronic Surveillance presented then on World Wide Web). Within this legal framework, Chapter 3 studies hard cases about personal data protection in US domestic courts and in the Court of Justice of European Union, in order to search for precise interpretation of the right to personal data protection in cyberspace that, later, had to be taken into account by US and EU in their further legal reforms. Chapter 4 analyses and reviews the legal instruments enacted through the reform of the EU personal data protection regime and the new EU-US Bilateral Agreements currently in force. Finally, Chapter 5 evaluates the possibility to initiate an International Treaty for regulating data using across borders. Considering the initiatives of either international governmental organizations or non-governmental movements in the field, the chapter shows how a set of principles can be extracted from the reforms in the EU and EU-US regime and how they can be used to create an International Regime for protection of personal data in cyberspace.
L'objecte d'estudi d'aquesta recerca és el dret a la protecció de les dades personals en el marc del règim jurídic aplicable al mercat electrònic UE-Estats Units. Les seves característiques, així com les dels principals actors que intervenen en aquest mercat, permeten considerar aquest règim jurídic com una base adequada per al possible desenvolupament d'un tractat internacional de vocació universal sobre protecció de dades personals en el ciberespai. Els actors i les relacions incloses en la recerca són els responsables de les obligacions jurídiques en matèria de protecció de dades personals, tant entitats públiques com a privades. Malgrat això, també es tenen en compte les ‘relacions informals de poder’ entre Estat i organitzacions privades, donada l'existència d'acords informals o coordinació entre tots dos per a l'intercanvi i processament de dades. El marc temporal de la recerca és 2001-2016 (després dels atemptats del 9/11 a Estats Units i fins a la més recent reforma del règim UE-EUA culminada en 2016). El punt de partida d’aquesta recerca és el Dret Internacional dels Drets Humans, que conté el marc general per al suport i regulació de la protecció de dades personals en el ciberespai. Ara bé, els caràcters distintius del ciberespai exigeixen una regulació i mecanismes específics ben dissenyats, a nivell universal, per garantir internacionalment els esmentats drets fonamentals relatius a la protecció de dades personals. Conseqüentment, la hipòtesi de recerca es formula de la següent manera: en primer lloc, la protecció eficaç de les dades personals en el ciberespai necessita l'establiment d'un sistema jurídic internacional d'abast universal basat en tractats; en segon lloc, el règim de la UE sobre protecció de dades personals en el ciberespai i els actuals acords UE- Estats Units sobre aquesta qüestió poden utilitzar-se com a model per a l'elaboració d'aquest Tractat Internacional. L'estructura de la tesi es divideix en sis capítols, essent el Capítol 1 el disseny de la recerca i el Capítol 6 les conclusions i recomanacions que es desprenen de la recerca. Així, el Capítol 2 analitza els Instruments Jurídics Universals, les normes de la UE i els acords UE-EUA vigents abans 5 de juny de 2013 (data crítica a causa de les revelacions sobre Vigilància Electrònica en massa, presentades mundialment aquest dia). Dins d'aquest marc jurídic, el Capítol 3 realitza una anàlisi jurisprudencial i analitza una selecció de casos sobre protecció de dades personals suscitades davant els tribunals interns d'Estats Units i davant el Tribunal de Justícia de la Unió Europea, amb l'objectiu d'identificar la interpretació precisa del dret a la protecció de dades personals en el ciberespai que, posteriorment, ha hagut de tenir en compte la reforma normativa a Estats Units i en la UE sobre aquesta matèria. El Capítol 4 analitza i revisa els instruments jurídics promulgats en virtut de la reforma del règim de protecció de dades personals de la UE i els nous acords bilaterals entre la UE i els Estats Units actualment en vigor. Finalment, el Capítol 5 avalua la possibilitat d'elaborar un Tractat Internacional d'abast universal que garanteixi el dret a la protecció de dades personals que ‘circulen’ pel ciberespai. Tenint en compte les iniciatives formulades per organitzacions governamentals internacionals i pels moviments no governamentals especialitzats, el capítol mostra com es poden extreure un conjunt de principis de les reformes de la UE i del règim aplicable a l'espai UE-EUA i com aquests principis poden utilitzar-se per a la creació d'un règim internacional de protecció de dades personals en el ciberespai.
El objeto de estudio de esta investigación es el derecho a la protección de los datos personales en el marco del régimen jurídico aplicable al mercado electrónico UE- Estados Unidos. Sus características, así como las de los principales actores que intervienen en este mercado, permiten considerar este régimen jurídico como una base adecuada para el posible desarrollo de un tratado internacional de vocación universal sobre protección de datos personales en el ciberespacio. Los actores y las relaciones incluidas en la investigación son los responsables de las obligaciones jurídicas en materia de protección de datos personales, tanto entidades públicas como privadas. No obstante, también se tienen en cuenta las ‘relaciones informales de poder’ entre Estado y organizaciones privadas, dada la existencia de acuerdos informales o coordinación entre ambos para el intercambio y procesamiento de datos. El marco temporal de la investigación es 2001-2016 (después de los atentados del 9/11 en Estados Unidos y hasta la más reciente reforma del régimen UE-EEUU culminada en 2016). El punto de partida de la investigación es el Derecho Internacional de los Derechos Humanos, que contiene el marco general para el apoyo y regulación de la protección de datos personales en el ciberespacio. Sin embargo, los caracteres distintivos del ciberespacio exigen una regulación y mecanismos específicos bien diseñados, a nivel universal, para garantizar internacionalmente tales derechos fundamentales relativos a la protección de datos personales. Consecuentemente, la hipótesis de investigación se formula del siguiente modo: en primer lugar, la protección eficaz de los datos personales en el ciberespacio necesita el establecimiento de un sistema jurídico internacional de alcance universal basado en tratados; en segundo lugar, el régimen de la UE sobre protección de datos personales en el ciberespacio y los actuales acuerdos UE-Estados Unidos sobre esta cuestión pueden utilizarse como modelo para la elaboración de dicho Tratado Internacional. La estructura de la tesis se divide en seis capítulos, siendo el Capítulo 1 el \diseño de la investigación y el Capítulo 6 las conclusiones y recomendaciones que se desprenden de la investigación. Así, el Capítulo 2 analiza los Instrumentos Jurídicos Universales, las normas de la UE y los acuerdos UE-EEUU vigentes antes del 5 de junio de 2013 (fecha crítica debido a las revelaciones sobre Vigilancia Electrónica en Masa presentadas mundialmente ese día). Dentro de ese marco jurídico, el Capítulo 3 realiza un análisis jurisprudencial y analiza una selección de casos sobre protección de datos personales suscitados ante los tribunales internos de Estados Unidos y ante el Tribunal de Justicia de la Unión Europea, con el objetivo de identificar la interpretación precisa del derecho a la protección de datos personales en el ciberespacio que, posteriormente, ha debido tener en cuenta la reforma normativa en Estados Unidos y en la UE sobre esta materia. El Capítulo 4 analiza y revisa los instrumentos jurídicos promulgados en virtud de la reforma del régimen de protección de datos personales de la UE y los nuevos acuerdos bilaterales entre la UE y los Estados Unidos actualmente en vigor. Por último, el Capítulo 5 evalúa la posibilidad de elaborar un Tratado Internacional de alcance universal que garantice el derecho a la protección de datos personales que ‘circulan’ en el ciberespacio. Teniendo en cuenta las iniciativas formuladas por organizaciones gubernamentales internacionales y por los movimientos no gubernamentales especializados, el capítulo muestra cómo se pueden extraer un conjunto de principios de las reformas de la UE y del régimen aplicable en el espacio UE-EEUU y cómo esos principios pueden utilizarse para la creación de un régimen internacional de protección de datos personales en el ciberespacio.
APA, Harvard, Vancouver, ISO, and other styles
9

Toguz, Ozlem. "Data Protection And Intellectual Property In The Eu And Turkey." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12611940/index.pdf.

Full text
Abstract:
This research had two main purposes. Firstly it aimed at showing the regulatory framework of both data protection and intellectual property in the European Union and thus making the privacy complications of Digital Rights Managements systems clear in the developed world. This research also aimed at disclosing the complications of employment of DRMs systems in developing countries. To that end Turkey&rsquo
s copyright framework has been reviewed. It was found out that DRMs systems employed in Turkey went beyond the scope of Turkish Copyright Legislation and restricted also legitimate acts which fall within the scope of fair use. DRMs also have hindered development since it restricted availability of educational and cultural works. The review of Turkey&rsquo
s Data Protection regime disclosed that the most important reason behind the non adoption of the draft law was related to the legislators&rsquo
confusion of first pillar and third pillar data protection. It was concluded that Turkey lacked a data protection policy and the lack of such a policy led to the surveillance of the people to such a degree that almost no private space is left for them. The main finding of the research was that Turkey has been one of the best markets for the employment of DRMs with its current copyright regime and lack of data protection rules. The research concluded with proposals of action concerning data protection and DRMs.
APA, Harvard, Vancouver, ISO, and other styles
10

Oldani, Isabella. "Exchanging and Protecting Personal Data across Borders: GDPR Restrictions on International Data Transfer." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/270518.

Full text
Abstract:
From the very outset of the EU data protection legislation, and hence from the 1995 Directive, international data transfer has been subject to strict requirements aimed at ensuring that protection travels with data. Although these rules have been widely criticized for their inability to deal with the complexity of modern international transactions, the GDPR has essentially inherited the same architecture of the Directive together with its structural limitations. This research aims to highlight the main weaknesses of the EU data export restrictions and identify what steps should be taken to enable a free, yet safe, data flow. This research first places EU data transfer rules in the broader debate about the challenges that the un-territorial cyberspace poses to States’ capabilities to exert their control over data. It then delves into the territorial scope of the GDPR to understand how far it goes in protecting data beyond the EU borders. The objectives underpinning data export restrictions (i.e., avoiding the circumvention of EU standards and protecting data from foreign public authorities) and their limitations in achieving such objectives are then identified. Lastly, three possible “solutions” for enabling data flow are tested. Firstly, it is shown that the adoption by an increasing number of non-EEA countries of GDPR-like laws and the implementation by many companies of GDPR-compliant policies is more likely to boost international data flow than internationally agreed standards. Secondly, the role that Article 3 GDPR may play in making data transfer rules “superfluous” is analysed, as well as the need to complement the direct applicability of the GDPR with cross-border cooperation between EU and non-EU regulators. Thirdly, the study finds that the principle of accountability, as an instrument of data governance, may boost international data flow by pushing most of the burden for ensuring GDPR compliance on organizations and away from resource-constrained regulators.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Data protection – Europe"

1

Schünemann, Wolf J., and Max-Otto Baumann, eds. Privacy, Data Protection and Cybersecurity in Europe. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53634-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deryck, Beyleveld, ed. The data protection directive and medical research across Europe. Burlington, VT: Ashgate, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Astrid, Epiney, and Theuerkauf Sarah 1978-, eds. Datenschutz in Europa und die Schweiz =: La protection des données en Europe et la Suisse. Zürich: Schulthess, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gutwirth, Serge. European Data Protection: Coming of Age. Dordrecht: Springer Netherlands, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Council of Europe. Committee of Ministers. The protection of medical data: Recommendation no. R (97) 5. Strasbourg: Council of Europe Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Deryck, Beyleveld, Townend D, and Wright J, eds. Research ethics committees, data protection, and medical research in Europe--key issues. Aldershot, Hants, England: Ashgate Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gutiérrez Zarza, Ángeles, ed. Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-40291-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deryck, Beyleveld, ed. Implementation of the Data Protection Directive in relation to medical research in Europe. Aldershot, Hants, England: Ashgate, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bennett, Colin J. Regulating privacy: Data protection and public policy in Europe and the United States. Ithaca: Cornell University Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

honouree, Hustinx P. J., ed. Data protection anno 2014 : how to restore trust?: Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004-2014). Cambridge [England]: Intersentia, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data protection – Europe"

1

Kolb, Marina. "Data Protection." In The European Union and the Council of Europe, 63–86. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137023636_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nouwt, Sjaak. "Towards a Common European Approach to Data Protection: A Critical Analysis of Data Protection Perspectives of the Council of Europe and the European Union." In Reinventing Data Protection?, 275–92. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-1-4020-9498-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Colonna, Liane. "Europe Versus Facebook: An Imbroglio of EU Data Protection Issues." In Data Protection on the Move, 25–50. Dordrecht: Springer Netherlands, 2016. http://dx.doi.org/10.1007/978-94-017-7376-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tamò-Larrieux, Aurelia. "Privacy and Data Protection Regulation in Europe." In Law, Governance and Technology Series, 73–100. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98624-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cavoukian, Ann, and Michelle Chibba. "Privacy Seals in the USA, Europe, Japan, Canada, India and Australia." In Privacy and Data Protection Seals, 59–82. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peissl, Walter. "Information Privacy in Europe from a TA Perspective." In Data Protection in a Profiled World, 247–56. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-8865-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Rebecca. "Data Protection Directive 95/46/EC." In Data Security Breaches and Privacy in Europe, 3–8. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Rebecca. "Proposed Data Protection Regulation 2012: Data Security Breach Notifications." In Data Security Breaches and Privacy in Europe, 25–29. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baumann, Max-Otto, and Wolf J. Schünemann. "Introduction: Privacy, Data Protection and Cybersecurity in Europe." In Privacy, Data Protection and Cybersecurity in Europe, 1–14. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53634-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wong, Rebecca. "European Data Protection Supervisor’s Opinion on Cybersecurity." In Data Security Breaches and Privacy in Europe, 35–37. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data protection – Europe"

1

Wang, Lin, and Shuijing Hu. "Patent Protection for Artificial Intelligence in Europe." In 2020 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2020. http://dx.doi.org/10.1109/icitbs49701.2020.00130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Srivastava, Adhishree, and S. K. Parida. "Frequency and Voltage Data Processing Based Feeder Protection in Medium Voltage Microgrid." In 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe). IEEE, 2019. http://dx.doi.org/10.1109/isgteurope.2019.8905705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Jie, Wujie Wen, Yaojun Zhang Li, Sicheng Li, Hai Li, and Yiran Chen. "DA-RAID-5: A Disturb Aware Data Protection Technique for NAND Flash Storage Systems." In Design Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2013. http://dx.doi.org/10.7873/date.2013.087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ciurapiński, Wieslaw, Rafal Dulski, Mariusz Kastek, Mieczyslaw Szustakowski, Grzegorz Bieszczad, Marek Życzkowski, Piotr Trzaskawka, and Marek Piszczek. "Data fusion concept in multispectral system for perimeter protection of stationary and moving objects." In SPIE Europe Security + Defence, edited by David A. Huckridge and Reinhard R. Ebert. SPIE, 2009. http://dx.doi.org/10.1117/12.830395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dahal, Om P., Huiping Cao, Sukumar Brahma, and Rajesh Kavasseri. "Evaluating performance of classifiers for supervisory protection using disturbance data from phasor measurement units." In 2014 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2014. http://dx.doi.org/10.1109/isgteurope.2014.7028892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bandopadhyay, Subhajit, Theo Dimitrakos, Yair Diaz, Ali Hariri, Tezcan Dilshener, Antonio La Marra, and Alessandro Rosetti. "DataPAL: Data Protection and Authorization Lifecycle framework." In 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2021. http://dx.doi.org/10.1109/seeda-cecnsm53056.2021.9566212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pavli, Kristina, and Miha Dvojmoč. "General Data Protection Regulation (GDPR), the Data Protection Police Directive, and the Changes to National Legislation in the Republic of Slovenia." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Press, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Auzina, Anita, Andra Zvirbule, and Eliza Liga Lamberga. "ECO-INNOVATION AS A FACTOR IN THE COMPETITIVENESS OF ENVIRONMENTAL PROTECTION COMPANIES." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/5.1/s21.070.

Full text
Abstract:
Climate change and global environmental challenges pose an existential threat to the world, including Europe. Dealing with the current climate and environmental challenges requires an urgent and ambitious response. The global challenges are also an opportunity for companies, especially those engaged in environmental protection, to innovate, as they both increase their competitiveness and export potential. The relevance of the research problem is additionally supported by the fact that the European Union is committed to achieving climate neutrality by 2050 and fulfilling its obligations under the Paris Climate Agreement as well as making the implementation of the European Green Deal an obligation for each EU Member State. Accordingly, identify the role of eco-innovation in the competitiveness of companies based on the guidelines of the European Green Deal. The research employed the following methods to achieve the aim: case study, PEST analysis, expert analysis methods. Information sources used: specific economic literature, published research papers, scientific conference proceedings from databases: EBSCO, ScienceDirect and Scopus, as well as the European Union�s legal acts and directives, statistical data from Eurostat, European Innovation Scoreboard reports and World Economic Forum competitiveness reports.
APA, Harvard, Vancouver, ISO, and other styles
9

Feng, Ran. "Enlightenment of Cross-Border Data Security and Personal Privacy Protection Measures of Europe and the United States for China." In AICS 2019: 2019 International Conference on Artificial Intelligence and Computer Science. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3349341.3349514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Wen-Jun, and Hong-Tzer Yang. "Self-adaptive protection strategies for distribution system with DGs and FCLs based on data mining and neural network." In 2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe). IEEE, 2017. http://dx.doi.org/10.1109/eeeic.2017.7977738.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data protection – Europe"

1

Clark, Andrew E., Angela Greulich, and Hippolyte d’Albis. The age U-shape in Europe: the protective role of partnership. Verlag der Österreichischen Akademie der Wissenschaften, March 2021. http://dx.doi.org/10.1553/populationyearbook2021.res3.1.

Full text
Abstract:
In this study, we ask whether the U-shaped relationship between life satisfactionand age is flatter for individuals who are partnered. An analysis of cross-sectionalEU-SILC data indicates that the decline in life satisfaction from the teens to thefifties is almost four times larger for non-partnered than for partnered individuals,whose life satisfaction essentially follows a slight downward trajectory with age.However, the same analysis applied to three panel datasets (BHPS, SOEP andHILDA) reveals a U-shape for both groups, albeit somewhat flatter for the partneredthan for the non-partnered individuals. We suggest that the difference between thecross-sectional and the panel results reflects compositional effects: i.e., there isa significant shift of the relatively dissatisfied out of marriage in mid-life. Thesecompositional effects tend to flatten the U-shape in age for the partnered individualsin the cross-sectional data.
APA, Harvard, Vancouver, ISO, and other styles
2

Minero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.

Full text
Abstract:
When we think on initiatives on access to and reuse of data, we must consider both the European Intellectual Property Law and the General Data Protection Regulation (GDPR). The first one provides a special intellectual property (IP) right – the sui generis right – for those makers that made a substantial investment when creating the database, whether it contains personal or non-personal data. That substantial investment can be made by just one person, but, in many cases, it is the result of the activities of many people and/or some undertakings processing and aggregating data. In the modern digital economy, data are being dubbed the ‘new oil’ and the sui generis right might be con- sidered a right to control any access to the database, thus having an undeniable relevance. Besides, there are still important inconsistences between IP Law and the GDPR, which must be removed by the European legislator. The genuine and free consent of the data subject for the use of his/her data must remain the first step of the legal analysis.
APA, Harvard, Vancouver, ISO, and other styles
3

Durovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.

Full text
Abstract:
Commercialization of consumers’ personal data in the digital economy poses serious, both conceptual and practical, challenges to the traditional approach of European Union (EU) Consumer Law. This article argues that mass-spread, automated, algorithmic decision-making casts doubt on the foundational paradigm of EU consumer law: consent and autonomy. Moreover, it poses threats of discrimination and under- mining of consumer privacy. It is argued that the recent legislative reaction by the EU Commission, in the form of the ‘New Deal for Consumers’, was a step in the right direction, but fell short due to its continued reliance on consent, autonomy and failure to adequately protect consumers from indirect discrimination. It is posited that a focus on creating a contracting landscape where the consumer may be properly informed in material respects is required, which in turn necessitates blending the approaches of competition, consumer protection and data protection laws.
APA, Harvard, Vancouver, ISO, and other styles
4

van der Sloot, Bart. The Quality of Life: Protecting Non-personal Interests and Non-personal Data in the Age of Big Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64579.

Full text
Abstract:
Under the current legal paradigm, the rights to privacy and data protection provide natural persons with subjective rights to protect their private interests, such as related to human dignity, individual autonomy and personal freedom. In principle, when data processing is based on non-personal or aggregated data or when such data pro- cesses have an impact on societal, rather than individual interests, citizens cannot rely on these rights. Although this legal paradigm has worked well for decades, it is increasingly put under pressure because Big Data processes are typically based indis- criminate rather than targeted data collection, because the high volumes of data are processed on an aggregated rather than a personal level and because the policies and decisions based on the statistical correlations found through algorithmic analytics are mostly addressed at large groups or society as a whole rather than specific individuals. This means that large parts of the data-driven environment are currently left unregu- lated and that individuals are often unable to rely on their fundamental rights when addressing the more systemic effects of Big Data processes. This article will discuss how this tension might be relieved by turning to the notion ‘quality of life’, which has the potential of becoming the new standard for the European Court of Human Rights (ECtHR) when dealing with privacy related cases.
APA, Harvard, Vancouver, ISO, and other styles
5

Kira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, March 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.

Full text
Abstract:
Realities such as the COVID-19 pandemic have expedited the move to online operations, highlighting the undeniable fact that the world is continuing to go digital. This emphasises the need for policymakers to regulate in a manner that allows them to harness digital trade benefits while also avoiding associated risk. However, given that digital trade remains unco-ordinated globally, with countries adopting different approaches to policy issues, national regulatory divergence on the matter continues, placing limits on the benefits that countries can obtain from digital trade. Given these disparities, ahead of the African Continental Free Trade Area (AfCFTA) Phase II Negotiations, African countries have been considering the best way to harmonise regulations on issues related to digital trade. To do this effectively, AfCFTA members need to identify where divergencies exist in their domestic regulatory systems. This will allow AfCFTA members to determine where harmonisation is possible, as well as what is needed to achieve such harmonisation. This report analyses the domestic regulations and policies of four focus countries – South Africa, Nigeria, Kenya and Senegal – comparing their regulatory approaches to five policy issues: i) regulation of online transactions; ii) cross-border data flows, data localisation, and personal data protection; iii) access to source code and technology transfer; iv) intermediary liability; and v) customs duties on electronic transmissions. The study highlights where divergencies exist in adopted approaches, indicating the need for the four countries – and AfCFTA members in general – to carefully consider the implications of the divergences, and determine where it is possible and beneficial to harmonise approaches. This was intended to encourage AfCFTA member states to take ownership of these issues and reflect on the reforms needed. As seen in Table 1 below, the study shows that the four countries diverge on most of the five policy issues. There are differences in how all four countries regulate online transactions – that is, e-signatures and online consumer protection. Nigeria was the only country out of the four to recognise all types of e-signatures as legally equivalent. Kenya and Senegal only recognise specific e-signatures, which are either issued or validated by a recognised institution, while South Africa adopts a mixed approach, where it recognises all e-signatures as legally valid, but provides higher evidentiary weight to certain types of e-signatures. Only South Africa and Senegal have specific regulations relating to online consumer protection, while Nigeria and Kenya do not have any clear rules. With regards to cross border data flows, data localisation, and personal data protection, the study shows that all four focus countries have regulations that consist of elements borrowed from the European Union (EU) General Data Protection Regulation (GDPR). In particular, this was regarding the need for the data subject's consent, and also the adequacy requirement. Interestingly, the study also shows that South Africa, Kenya and Nigeria also adopt data localisation measures, although at different levels of strictness. South Africa’s data localisation laws are mostly imposed on data that is considered critical – which is then required to be processed within South African borders – while Nigeria requires all data to be processed and stored locally, using local servers. Kenya imposes data localisation measures that are mostly linked to its priority for data privacy. Out of the four focus countries, Senegal is the only country that does not impose any data localisation laws. Although the study shows that all four countries share a position on customs duties on electronic transmissions, it is also interesting to note that none of the four countries currently have domestic regulations or policies on the subject. The report concludes by highlighting that, as the AfCFTA Phase II Negotiations aim to arrive at harmonisation and to improve intra-African trade and international trade, AfCFTA members should reflect on their national policies and domestic regulations to determine where harmonisation is needed, and whether AfCFTA is the right platform for achieving this efficiently.
APA, Harvard, Vancouver, ISO, and other styles
6

Jones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, February 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.

Full text
Abstract:
The internet and digital technologies are upending global trade. Industries and supply chains are being transformed, and the movement of data across borders is now central to the operation of the global economy. Provisions in trade agreements address many aspects of the digital economy – from cross-border data flows, to the protection of citizens’ personal data, and the regulation of the internet and new technologies like artificial intelligence and algorithmic decision-making. The UK government has identified digital trade as a priority in its Global Britain strategy and one of the main sources of economic growth to recover from the pandemic. It wants the UK to play a leading role in setting the international standards and regulations that govern the global digital economy. The regulation of digital trade is a fast-evolving and contentious issue, and the US, European Union (EU), and China have adopted different approaches. Now that the UK has left the EU, it will need to navigate across multiple and often conflicting digital realms. The UK needs to decide which policy objectives it will prioritise, how to regulate the digital economy domestically, and how best to achieve its priorities when negotiating international trade agreements. There is an urgent need to develop a robust, evidence-based approach to the UK’s digital trade strategy that takes into account the perspectives of businesses, workers, and citizens, as well as the approaches of other countries in the global economy. This working paper aims to inform UK policy debates by assessing the state of play in digital trade globally. The authors present a detailed analysis of five policy areas that are central to discussions on digital trade for the UK: cross-border data flows and privacy; internet access and content regulation; intellectual property and innovation; e-commerce (including trade facilitation and consumer protection); and taxation (customs duties on e-commerce and digital services taxes). In each of these areas the authors compare and contrast the approaches taken by the US, EU and China, discuss the public policy implications, and examine the choices facing the UK.
APA, Harvard, Vancouver, ISO, and other styles
7

ADAS, RSK. Nitrate Surveillance Monitoring Program (Annual Report May 2021 - March 2022). Food Standards Agency, December 2022. http://dx.doi.org/10.46756/sci.fsa.uau489.

Full text
Abstract:
Every Member State is required to monitor and report levels of nitrate in specified foodstuffs as part of the European Commission regulation and the UK also requires this information as part of the collection of data to support the review of retained EU law in the UK and inform the setting of policy around maximum nitrate levels. The requirement to carry out monitoring for nitrate in lettuce, spinach and rocket is being met by the UK Nitrate Surveillance Programme. Results are presented for the period between 1st April 2021 and 31st March 2022. A total of 202 samples were collected within the sampling period, comprising of 130 lettuce, 9 rocket, 26 spinach samples. A further 37 samples categorised at “Other Green Leafy Vegetables”, which comprised of samples including mustard, mizuna, celery, Pak Choi and cabbage. The lowest average nitrate concentration was recorded in summer-grown iceberg lettuce (935.2 mg/kg), and no iceberg samples exceeded the maximum nitrate concentration. The highest average nitrate concentration was seen in winter grown non-iceberg lettuce grown under protection within the lettuce group (3242.2 mg/kg), and in winter-grown rocket overall (4271.2 mg/kg). The number of samples exceeding the maximum threshold increased this year to 7 samples – 2 samples of open-air non-iceberg lettuce sampled in the summer, 1 sample of protected non-iceberg lettuce in the summer, and 3 samples of spinach. A further 4 samples were within 10% of the maximum threshold. Consistent with previous years of this project, a strong correlation was found between nitrate concentration and sampling date, with samples collected later in the season showing greater concentrations, indicating potential interactions between nitrate accumulation and climate – particularly light levels and available soil moisture and the accumulation of nitrate in the soil through subsequent fertiliser applications with successive planting. Furthermore, there was significant interaction between nitrate accumulation, product type and cultivation type, which could be further explored to better identify risk factors associated with nitrate accumulation in leafy vegetables grown in the UK.
APA, Harvard, Vancouver, ISO, and other styles
8

Smit, Amelia, Kate Dunlop, Nehal Singh, Diona Damian, Kylie Vuong, and Anne Cust. Primary prevention of skin cancer in primary care settings. The Sax Institute, August 2022. http://dx.doi.org/10.57022/qpsm1481.

Full text
Abstract:
Overview Skin cancer prevention is a component of the new Cancer Plan 2022–27, which guides the work of the Cancer Institute NSW. To lessen the impact of skin cancer on the community, the Cancer Institute NSW works closely with the NSW Skin Cancer Prevention Advisory Committee, comprising governmental and non-governmental organisation representatives, to develop and implement the NSW Skin Cancer Prevention Strategy. Primary Health Networks and primary care providers are seen as important stakeholders in this work. To guide improvements in skin cancer prevention and inform the development of the next NSW Skin Cancer Prevention Strategy, an up-to-date review of the evidence on the effectiveness and feasibility of skin cancer prevention activities in primary care is required. A research team led by the Daffodil Centre, a joint venture between the University of Sydney and Cancer Council NSW, was contracted to undertake an Evidence Check review to address the questions below. Evidence Check questions This Evidence Check aimed to address the following questions: Question 1: What skin cancer primary prevention activities can be effectively administered in primary care settings? As part of this, identify the key components of such messages, strategies, programs or initiatives that have been effectively implemented and their feasibility in the NSW/Australian context. Question 2: What are the main barriers and enablers for primary care providers in delivering skin cancer primary prevention activities within their setting? Summary of methods The research team conducted a detailed analysis of the published and grey literature, based on a comprehensive search. We developed the search strategy in consultation with a medical librarian at the University of Sydney and the Cancer Institute NSW team, and implemented it across the databases Embase, MEDLINE, PsycInfo, Scopus, Cochrane Central and CINAHL. Results were exported and uploaded to Covidence for screening and further selection. The search strategy was designed according to the SPIDER tool for Qualitative and Mixed-Methods Evidence Synthesis, which is a systematic strategy for searching qualitative and mixed-methods research studies. The SPIDER tool facilitates rigour in research by defining key elements of non-quantitative research questions. We included peer-reviewed and grey literature that included skin cancer primary prevention strategies/ interventions/ techniques/ programs within primary care settings, e.g. involving general practitioners and primary care nurses. The literature was limited to publications since 2014, and for studies or programs conducted in Australia, the UK, New Zealand, Canada, Ireland, Western Europe and Scandinavia. We also included relevant systematic reviews and evidence syntheses based on a range of international evidence where also relevant to the Australian context. To address Question 1, about the effectiveness of skin cancer prevention activities in primary care settings, we summarised findings from the Evidence Check according to different skin cancer prevention activities. To address Question 2, about the barriers and enablers of skin cancer prevention activities in primary care settings, we summarised findings according to the Consolidated Framework for Implementation Research (CFIR). The CFIR is a framework for identifying important implementation considerations for novel interventions in healthcare settings and provides a practical guide for systematically assessing potential barriers and facilitators in preparation for implementing a new activity or program. We assessed study quality using the National Health and Medical Research Council (NHMRC) levels of evidence. Key findings We identified 25 peer-reviewed journal articles that met the eligibility criteria and we included these in the Evidence Check. Eight of the studies were conducted in Australia, six in the UK, and the others elsewhere (mainly other European countries). In addition, the grey literature search identified four relevant guidelines, 12 education/training resources, two Cancer Care pathways, two position statements, three reports and five other resources that we included in the Evidence Check. Question 1 (related to effectiveness) We categorised the studies into different types of skin cancer prevention activities: behavioural counselling (n=3); risk assessment and delivering risk-tailored information (n=10); new technologies for early detection and accompanying prevention advice (n=4); and education and training programs for general practitioners (GPs) and primary care nurses regarding skin cancer prevention (n=3). There was good evidence that behavioural counselling interventions can result in a small improvement in sun protection behaviours among adults with fair skin types (defined as ivory or pale skin, light hair and eye colour, freckles, or those who sunburn easily), which would include the majority of Australians. It was found that clinicians play an important role in counselling patients about sun-protective behaviours, and recommended tailoring messages to the age and demographics of target groups (e.g. high-risk groups) to have maximal influence on behaviours. Several web-based melanoma risk prediction tools are now available in Australia, mainly designed for health professionals to identify patients’ risk of a new or subsequent primary melanoma and guide discussions with patients about primary prevention and early detection. Intervention studies have demonstrated that use of these melanoma risk prediction tools is feasible and acceptable to participants in primary care settings, and there is some evidence, including from Australian studies, that using these risk prediction tools to tailor primary prevention and early detection messages can improve sun-related behaviours. Some studies examined novel technologies, such as apps, to support early detection through skin examinations, including a very limited focus on the provision of preventive advice. These novel technologies are still largely in the research domain rather than recommended for routine use but provide a potential future opportunity to incorporate more primary prevention tailored advice. There are a number of online short courses available for primary healthcare professionals specifically focusing on skin cancer prevention. Most education and training programs for GPs and primary care nurses in the field of skin cancer focus on treatment and early detection, though some programs have specifically incorporated primary prevention education and training. A notable example is the Dermoscopy for Victorian General Practice Program, in which 93% of participating GPs reported that they had increased preventive information provided to high-risk patients and during skin examinations. Question 2 (related to barriers and enablers) Key enablers of performing skin cancer prevention activities in primary care settings included: • Easy access and availability of guidelines and point-of-care tools and resources • A fit with existing workflows and systems, so there is minimal disruption to flow of care • Easy-to-understand patient information • Using the waiting room for collection of risk assessment information on an electronic device such as an iPad/tablet where possible • Pairing with early detection activities • Sharing of successful programs across jurisdictions. Key barriers to performing skin cancer prevention activities in primary care settings included: • Unclear requirements and lack of confidence (self-efficacy) about prevention counselling • Limited availability of GP services especially in regional and remote areas • Competing demands, low priority, lack of time • Lack of incentives.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography