Privacy in the 21st Century

2015 ◽  
pp. 1638-1652
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.

2013 ◽  
Vol 4 (3) ◽  
pp. 15-29
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.


2021 ◽  
Vol 17 (1) ◽  
Author(s):  
Felix Gille ◽  
Caroline Brall

AbstractPublic trust is paramount for the well functioning of data driven healthcare activities such as digital health interventions, contact tracing or the build-up of electronic health records. As the use of personal data is the common denominator for these healthcare activities, healthcare actors have an interest to ensure privacy and anonymity of the personal data they depend on. Maintaining privacy and anonymity of personal data contribute to the trustworthiness of these healthcare activities and are associated with the public willingness to trust these activities with their personal data. An analysis of online news readership comments about the failed care.data programme in England revealed that parts of the public have a false understanding of anonymity in the context of privacy protection of personal data as used for healthcare management and medical research. Some of those commenting demanded complete anonymity of their data to be willing to trust the process of data collection and analysis. As this demand is impossible to fulfil and trust is built on a false understanding of anonymity, the inability to meet this demand risks undermining public trust. Since public concerns about anonymity and privacy of personal data appear to be increasing, a large-scale information campaign about the limits and possibilities of anonymity with respect to the various uses of personal health data is urgently needed to help the public to make better informed choices about providing personal data.


2016 ◽  
Vol 11 (2) ◽  
pp. 171 ◽  
Author(s):  
Alicja Jagielska-Burduk

LEGAL STATUS OF CULTURAL PROPERTY AND WORKS OF ART IN THE PRL Summary The article deals with the legal status of works of art and cultural property in the Polish legislation during communism period. Classifying those objects as private property was considered as a very difficult task, because of their material value and the public interest in saving them for future generations. The strict limitations of individuals property were perceived as unusual and as a result a new sort of property – the private cultural property was distinguished. Moreover, the concepts of the common heritage and res extra commercium could be observed in the light of the PRL ideas. It should be emphasized that the above mentioned theories for improving cultural heritage regulations are the most popular in the nowadays’ international discussion.


2017 ◽  
Vol 6 (1) ◽  
pp. 1-8
Author(s):  
Jorida Xhafaj ◽  
Almarin Frakulli

The main object of this paper is the tender balance that exists and arises even more between the use of personal information that people provide in the course of most public security actions and privacy. This study analyze the most famous and strong related decision of the European Court of Human Rights, with the aim to give our opinion how has to be understand the barrier between the power of individuals over information and the power of public institutions to guaranties security. The protection of personal data is of fundamental importance to a person’s enjoyment of his or her right to respect for private and family life, and how law allocates power over information in different countries, will give us the possibility to define the most important criteria’s which define the existence of abuse or not over personal data and information.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


2017 ◽  
Vol 17 (1) ◽  
pp. 45
Author(s):  
Endre Győző Szabó ◽  
Balázs Révész

A magánélet és a biztonság népszerű ellentétpárként tűnhet fel az adatvédelmi gondolkodásban. Leegyszerűsítve olvashatjuk sokszor, hogy ha bizonyos feltételek hiányoznak, aránytalanul nagy áldozatot hozhatunk a személyes magánszféra, a privacy oldalán a biztonság érdekében, és magánszféránk túlzott feláldozása a biztonság oltárán visszafordíthatatlan folyamathoz és orwelli világhoz vezet. Más, a biztonság szempontjait mindenek felettinek hirdető érvelésben viszont a személyes adatok védelmére való hivatkozást alkotmányjogi bűvészkedésnek csúfolják és igyekeznek kisebbíteni a magánszféra-védelem egyébként méltányolandó értékeit. A magánélet és a személyes adatok védelmének pedig nagy a tétje, az adatok illetéktelenek részére való kiszolgáltatása, rosszhiszemű felhasználása egzisztenciákat, családokat tehet tönkre, boldogulási lehetőségeket hiúsíthat meg, ha a védelem alacsony szintre süllyed. Másrészről pedig az információszerzés, illetve előzetes adatgyűjtés a különböző bűnelkövetések, terrorcselekmények előkészületi cselekményei is egyben. Azzal, ha a személyes adataink, magánszféránk védelmében ésszerű lépéseket teszünk, élünk a jog és a technológia adta védelmi lehetőségekkel, adatainkat nemcsak az államtól és a piaci szereplőktől, de a bűnözőktől is elzárjuk, és ezzel mindannyiunk biztonságát szolgáljuk. Egy terület tehát biztosan létezik, ahol a biztonság és magánszféra mezsgyéje összeér: az adatbiztonságé és ezzel összefüggésben a tudatos, felelős felhasználói attitűdé, aminek azonban sokszor az emberi tényező a gátja. Jelen tanulmányban a magánszféra és biztonság kérdéskörének komplexitásáról szólunk, és közös nevezőt keresünk az adatkezelések nézőpontjából, kitérve az új adatvédelmi rendelet (GDPR) magánszféránkat és biztonságunkat egyaránt szolgáló leendő jogintézményeinek bemutatására is. --- Data in security – security in our data? Privacy and security may be deemed as a popular dichotomy. It is often argued that even if security is vital, we might sacrifice too much of our privacy in return. This may be irreversible when it comes to the intrusiveness of surveillance. On the other hand, it is also sometimes argued that the importance of personal data protection deserves less attention than security. There is much at stake when it comes to privacy and the protection of personal data. Misuse of personal information may damage families’ lives and ruin people’s livelihoods, thus this may all have significant repercussions for society as a whole – this is the price to be paid if protection is at a low level. Using sophisticated measures that technology and legal regulations can provide, privacy can be protected. Data security is a common field for the protection of privacy and security – crucial for both endeavours to make people’s lives better. This essay describes the complexity of issues related to privacy and security, while also taking new legislation of the European Union into account.


Author(s):  
Cécile de Terwangne

Article 6(1) (Lawfulness of processing) (see too recitals 40–49); Article 6(4) (Exceptions to the requirement of compatible purposes for further processing and criteria to ascertain whether a purpose of further processing is compatible with the purpose for which the personal data are initially collected) (see too recital 50); Article 12 (Transparent information) (see too recitals 58–59); Articles 13–15 (Information and access to personal data) (see also recitals 60–64); Article 24 (Responsibility of the controller) (see too recitals 74–78) ; Article 32 (Security of processing) (see too recital 83); Article 89(1) (Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes) (see too recitals 158–163).


Author(s):  
Jef Ausloos

This chapter zooms in on Article 17 GDPR, on the right to erasure (‘right to be forgotten’). It meticulously dissects the three paragraphs of this provision. The first paragraph lists six rights-to-erasure triggers which can be summarized as: (a) purpose expiration; (b) withdrawal of consent; (c) right to object; (d) unlawful processing; (e) legal obligation; and (f) withdrawal of consent by minors in the online environment. The second paragraph comprises an odd extension of the right to erasure, enabling data subjects to request that controllers who have made the personal data public, communicate potential erasure to anyone else processing that same personal data. The third paragraph lists five exemptions to the right to erasure, summarized as: (a) freedom of expression and information; (b) legal obligation or task carried out in the public interest or official authority; (c) public interest in the area of public health; (d) public interest archiving, scientific and historical research, or statistical purposes; and (e) legal claims. What becomes clear right away is how both the right-to-erasure’s triggers and exemptions all refer to other legal provisions in and outside the GDPR. As such, the right to erasure can be seen as a central hub in the GDPR, bringing together key data protection principles from the perspective of data subject empowerment.


Author(s):  
John Baker

This chapter shows how actions on the case were used both to supplant the assize of nuisance and to provide remedies for types of nuisance not within the assize. The King’s Bench allowed case to overlap with the assize, but this was opposed by the Common Pleas until 1601, when the King’s Bench view prevailed. The assize was chiefly concerned with easements and profits. But there were new difficulties over the extent to which neighbours had to put up with disagreeable activities and processes which disturbed their comfort. These were discussed in a case of 1569 concerning ancient lights in London, and in a leading case of 1629 concerning the use of sea-coal by a London brewery. The 1629 case seems to have resulted in judicial deadlock, but the judges agreed on the principle of ‘necessity’, meaning that activities which were desirable in the public interest should be protected.


Author(s):  
Gloria González Fuster

Article 4(9) (Definition of ‘recipient’); Article 12 (Transparent information, communication and modalities for the exercise of the rights of the data subject); Article 16 (Right to rectification), Article 17(1) (Right to erasure (‘right to be forgotten’)); Article 18 (Right to restriction of processing); Article 58(2)(g) (Powers of supervisory authorities); Article 89(3) (Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes).


Sign in / Sign up

Export Citation Format

Share Document