Processing Personal Data by the Police in the Light of Changes in EU Law

2018 ◽  
Vol 9 (2) ◽  
pp. 229-237
Author(s):  
Andrzej Sprycha

In implementing their statutory tasks the Police can acquire a whole range of personal information, including sensitive data. This usually has a direct relation with combating crime. Therefore, such powers might be implemented without the knowledge and consent of persons to whom the information (data) concerns. Because police activities cause serious and profound intrusion into the sphere of a person’s private life, whose protection is guaranteed by the Constitution, they must be carried out within the limits strictly permitted by law. When discussing national regulations in force which control the issue of personal data protection, one must also take into consideration EU regulations. First of all the European Parliament and Council Regulation (EU) 2016/679 of 27th April 2016 on the protection of natural persons with regard to the processing of personal data and the European Parliament and Council Directive (EU) 2016/680 of 27th April 2016 on the protection of natural persons with regard to the processing of personal data. This directive, commonly known as the police directive, constitutes regulations on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection and prosecution of criminal offences and execution of penalties. The national legislator faces a difficult task of implementation of the above-mentioned European legal acts, all the more so because the choice of particular solutions, to be adopted in their transposition to the legislative and implementing provisions, still remains an open issue. The adopted solutions ought to, on the one hand, ensure coherence with national regulations that implement them, on the other hand, they ought to cause the appropriate adjustment of the Polish law regulations to their requirements. The article presents the normative contents and remarks regarding appropriate, consistent with EU law processing of personal data by the Police.

Notaire ◽  
2019 ◽  
Vol 1 (2) ◽  
pp. 267
Author(s):  
Mahendri Putri Sholichah ◽  
Dewi Rumaisa

The growths of technology make the privacy of personal information become an important issue in most countries, including Indonesia. Utilization of personal data is common things in most of our activity within the cyberspace and in this case, even the advancement of technology cannot neglect the privacy of personal information. The abusing of the data record, especially the data that belongs to the personal data category, the information that exists within this data could go to the public when it is leaked. One of the cases related to the personal data abuse is registration of thirty mobile phone SIM cards using one person’s personal information without the consent of personal information owner. This paper explains about personal data cases related to the mobile phone SIM card registration, and from this case, some issues about the abusing of personal data will be taken as an example to give consideration for legislating personal data protection. Moreover, this paper also explores the purpose of personal data collection, sensitive data collection, limitation of data collection, storage of collected personal data, transfer of collected personal data, and deletion of collected personal data. This paper convinces the urgency drafting of personal data protection law for country likes Indonesia. Therefore it is hoped that this paper will become one of many considerations for the Indonesian government to include personal data protection law into their national legislation program and legislate the personal data protection law in recent times.


The purpose of the article is to consider issues related to the legal protection of personal data in the European Union (EU). Based on a systematic approach and the method of comparative law, it is determined that the legal mechanisms of the EU most extensively regulate their scope, create a rigid framework for European and foreign companies and world corporations, and introduce independent regulatory authorities. This system of personal data protection is the most progressive at the moment. It is revealed that in the 20th-century mankind has experienced a rapid breakthrough of its development when the vector of technology progress was a reoriented towards information infrastructure, huge in its scale and universal coverage. Digital technologies led to the third industrial revolution, and they have entered into everyday life, both professional and domestic. Finally, the authors came to the conclusion that personal data protection rules are increasingly expanding. The world community has already realized the need to protect personal information, prevent its uncontrolled use, and the need to take sufficient measures to ensure the protection of information about the private life of everyone. Issues of cross-border transfer of personal data have become particularly important, and the trend towards the implementation of regulations on the personal data protection of an extraterritorial nature can be clearly seen


Author(s):  
Yanis Arturovich Sekste ◽  
Anna Sergeevna Markevich

The subject of this research is the problems emerging in the process of establishment and development of the Institution of personal data protection in the Russian Federation. Special attention is turned to the comparison of Soviet and Western models of protection of private life and personal data. The authors used interdisciplinary approach, as comprehensive and coherent understanding of socio-legal institution of personal data protection in the Russian Federation is only possible in inseparable connection with examination of peculiarities of the key historical stages in legal regulation of private life of the citizen. After dissolution of the Soviet political and legal system, the primary task of Russian law consisted in development and legal formalization of the institution of protection of human and civil rights and freedoms, first and foremost by means of restricting invasion of privacy by the state and enjoyment of personal freedom. It is concluded that the peculiarities of development of the new Russian political and legal model significantly impacted the formation of the institution of personal data protection in the Russian Federation. The authors believe that the Russian legislator and competent government branches are not always capable to manage the entire information flow of personal data; therefore, one of the priority tasks in modern Russian society is the permanent analysis and constant monitoring of the development of information technologies.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


2017 ◽  
Vol 17 (1) ◽  
pp. 45
Author(s):  
Endre Győző Szabó ◽  
Balázs Révész

A magánélet és a biztonság népszerű ellentétpárként tűnhet fel az adatvédelmi gondolkodásban. Leegyszerűsítve olvashatjuk sokszor, hogy ha bizonyos feltételek hiányoznak, aránytalanul nagy áldozatot hozhatunk a személyes magánszféra, a privacy oldalán a biztonság érdekében, és magánszféránk túlzott feláldozása a biztonság oltárán visszafordíthatatlan folyamathoz és orwelli világhoz vezet. Más, a biztonság szempontjait mindenek felettinek hirdető érvelésben viszont a személyes adatok védelmére való hivatkozást alkotmányjogi bűvészkedésnek csúfolják és igyekeznek kisebbíteni a magánszféra-védelem egyébként méltányolandó értékeit. A magánélet és a személyes adatok védelmének pedig nagy a tétje, az adatok illetéktelenek részére való kiszolgáltatása, rosszhiszemű felhasználása egzisztenciákat, családokat tehet tönkre, boldogulási lehetőségeket hiúsíthat meg, ha a védelem alacsony szintre süllyed. Másrészről pedig az információszerzés, illetve előzetes adatgyűjtés a különböző bűnelkövetések, terrorcselekmények előkészületi cselekményei is egyben. Azzal, ha a személyes adataink, magánszféránk védelmében ésszerű lépéseket teszünk, élünk a jog és a technológia adta védelmi lehetőségekkel, adatainkat nemcsak az államtól és a piaci szereplőktől, de a bűnözőktől is elzárjuk, és ezzel mindannyiunk biztonságát szolgáljuk. Egy terület tehát biztosan létezik, ahol a biztonság és magánszféra mezsgyéje összeér: az adatbiztonságé és ezzel összefüggésben a tudatos, felelős felhasználói attitűdé, aminek azonban sokszor az emberi tényező a gátja. Jelen tanulmányban a magánszféra és biztonság kérdéskörének komplexitásáról szólunk, és közös nevezőt keresünk az adatkezelések nézőpontjából, kitérve az új adatvédelmi rendelet (GDPR) magánszféránkat és biztonságunkat egyaránt szolgáló leendő jogintézményeinek bemutatására is. --- Data in security – security in our data? Privacy and security may be deemed as a popular dichotomy. It is often argued that even if security is vital, we might sacrifice too much of our privacy in return. This may be irreversible when it comes to the intrusiveness of surveillance. On the other hand, it is also sometimes argued that the importance of personal data protection deserves less attention than security. There is much at stake when it comes to privacy and the protection of personal data. Misuse of personal information may damage families’ lives and ruin people’s livelihoods, thus this may all have significant repercussions for society as a whole – this is the price to be paid if protection is at a low level. Using sophisticated measures that technology and legal regulations can provide, privacy can be protected. Data security is a common field for the protection of privacy and security – crucial for both endeavours to make people’s lives better. This essay describes the complexity of issues related to privacy and security, while also taking new legislation of the European Union into account.


2015 ◽  
pp. 1638-1652
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.


2021 ◽  
pp. 17-28
Author(s):  
V. BRYZHKO ◽  
V. PYLYPCHUK

The article is a continuation of a number of scientific works on the state, trends and further ensuring security of personal data in the context of digital transformation and related problems of legal regulation of new social relations in this area. The key aspects of the EU documents approved in recent years, in particular, the GDPR Regulation, the NIS Directive and the draft legal act on e-Privacy, are considered and evaluated. The main criteria and topical issues that need to be addressed in the context of the implementation of EU law and the development of national legislation on personal data protection are highlighted.


2020 ◽  
Author(s):  
Yasutoshi Moteki ◽  
Kiyomi Hashimoto

We conducted a questionnaire survey of public hospitals across the country of Japan in order to analyze the issues and challenges concerning personal data protection faced by medical institutions managed by local municipalities in Japan. The reason for targeting public hospitals is that they are more closely related to the regional medical care plan. Questionnaires were sent to all municipal hospitals (887 hospitals with 20 or more beds that are members of the Japan Municipal Hospital Association: JMHA). Key parts of the findings were published as research material in another journal in 2018. This paper summarizes and analyzes the unpublished portion of the 2017 questionnaire survey by the authors. The analysis of the results focuses on the characteristics of the municipal hospitals surveyed and the use of clinical indicators compared by the size of hospitals. While many small and medium-sized hospitals use a common form of consent for the use of personal information, and many large hospitals have specific consent forms for each department (26.4%). Concerning primal method for disposing or deleting personal information, the most chosen item among small and medium-sized hospitals was the incineration or dissolution method (62.5%); the percentage of contractors outsourcing was relatively high in large hospitals (39.5%). In addition, we found the differences between large and small/medium hospitals concerning the use of the clinical indicators. The most used indicator is average length of hospitalization and the rate of hospital bed utilization (80.4%).


Author(s):  
A. Denker

Abstract. The project of smart cities has emerged as a response to the challenges of twenty-first- century urbanization. Solutions to the fundamental conundrum of cities revolving around efficiency, convenience and security keep being sought by leveraging technology. Notwithstanding all the conveniences furnished by a smart city to all the citizens, privacy of a citizen is intertwined with the benefits of a smart city. The development processes which overlook privacy and security issues have left many of the smart city applications vulnerable to non-conventional security threats and susceptible to numerous privacy and personal data spillage risks. Among the challenges the smart city initiatives encounter, the emergence of the smartphone-big data-the cloud coalescence is perhaps the greatest, from the viewpoint of privacy and personal data protection. As our cities are getting digitalized, information comprising citizens' behavior, choices, and mobility, as well as their personal assets are shared over smartphone-big data-the cloud coalescences, thereby expanding cyber-threat surface and creating different security concerns. This coalescence refers to the practices of creating and analyzing vast sets of data, which comprise personal information. In this paper, the protection of privacy and personal data issues in the big data environment of smart cities are viewed through bifocal lenses, focusing on social and technical aspects. The protection of personal data and privacy in smart city enterprises is treated as a socio-technological operation where various actors and factors undertake different tasks. The article concludes by calling for novel developments, conceptual and practical changes both in technological and social realms.


2020 ◽  
Vol 2 (2) ◽  
pp. 182-200
Author(s):  
Fenty Usman Puluhulawa ◽  
Jufryanto Puluhulawa ◽  
Moh. Gufran Katili

This study aims to discuss the legal weak protection of personal data which is motivated by the phenomenon of society today which is like living in a world without borders so that it impacts on easy access to one's personal information, the impact of begins to spread illegal practices by irresponsible parties in the illegal use of personal information. In addition, there are no laws that specifically regulate the protection of personal data/information in the 4.0 Industrial Revolution era. The approach method used is a conceptual and case approach, with the purpose of the research is to analyze the weakness of legal protection for personal data in the 4.0 Industrial Revolution era in Indonesia. The results of the study, the spread of personal data protection arrangements in various laws and regulations indicate the protection of personal data is not yet a national legal priority and results in legal weak protection of the personal data of citizens so as to position Indonesian citizens in a vulnerable position, which is certainly not in line with the legal objectives namely provide legal certainty, justice, and expediency. The various cases that exist and pay attention to the phenomenon of digitalization in the era of the industrial revolution 4.0 illustrate the urgency of the need for the legal protection of personal data a state priority. Legal reform through the legitimacy of protecting personal data as a responsive and progressive legal policy is a must so that legal protection in the form of legal guarantees can be carried out properly in order to create a safe and comfortable digital ecosystem for the community.


Sign in / Sign up

Export Citation Format

Share Document