Description |
1 online resource (xix, 338 pages) : illustrations |
Series |
Information Technology and Law Series ; volume 25 |
|
Information technology & law series ; 25. 1570-2782
|
Contents |
1. Introduction. 1.1. Escalating Technological Threats to Privacy. 1.2. Core Theme of the Book. 1.3. Rationale for the Case Studies Selection. 1.4. Key Questions of Interest. 1.5. Added Value. 1.6. Structure and Overview of Chapters |
|
PART I. PRINCIPLES OF PRIVACY. 2. Privacy, Liberty and Security. 2.1. Introduction. 2.2. The Concept of Privacy. 2.3. Privacy as an International Human Right. 2.4. The Merits of Privacy. 2.5. The Concept of Liberty. 2.6. Privacy and Liberty. 2.7. The Concept of Security. 2.8. Privacy, Liberty and Security |
|
3. Assessing the Adequacy of a Privacy Legal Framework. 3.1. Introduction. 3.2. An Adequate Privacy Legal Framework?. 3.3. International Consensus in Principle. 3.4. Purpose and Meaning of Each Principle. 3.5. The EU Approach Versus the US Approach. 3.6. Required Legal Characteristics. 3.7. Basic Pre-measures. 3.8. Legal Criteria Specific to the US and UK. 3.9. Applying the Privacy Principles of the Twentieth Century to the Technological Advancements of the Twenty-First Century |
|
PART II. TECHNOLOGICAL THREATS TO PRIVACY. 4. Privacy-Invading Technologies. 4.1. Introduction. 4.2. A Definition of PITs. 4.3. The Growing Deployment and Threat of PITs. 4.4. PITs and the Human Body. 4.5. PITs and the Public Space. 4.6. Other PITs that May Pose Serious Threats to Privacy and Liberty |
|
5. Body Scanners: A Strip Search by Other Means?. 5.1. Introduction. 5.2. A Strip Search by Other Means?. 5.3. How Backscatter Body Scanners Work. 5.4. Security Benefits and Drawbacks. 5.5. The Plausibility of the Threat Posed by Plastic Guns, Ceramic Knives, and Liquid/Chemical and Plastic Explosives. 5.6. Alternatives to Backscatter Body Scanners. 5.7. Scope of Deployment in the US. 5.8. Laws, Codes, Decisions and Other Legal Instruments of Special Relevance in the US. 5.9. Deficiencies and Dilemmas of the US Legal Framework. 5.10. Policy-Relevant Recommendations. 5.11. Manufacturer-Level or User-Level Regulation?. 5.12. International Deployment, Developments and Responses. 5.13. Concluding Remarks |
|
6. Public Space CCTV Microphones and Loudspeakers: The Ears and Mouth of "Big Brother". 6.1. Introduction. 6.2. The Privacy-Intrusive Evolution of CCTV Surveillance Technology. 6.3. The Ears and Mouth of "Big Brother". 6.4. Scope of Deployment in the UK. 6.5. Security Gains. 6.6. Alternatives to CCTV Microphones and Loudspeakers. 6.7. Laws, Codes, Decisions and other Legal Instruments of Special Relevance in the UK. 6.8. Deficiencies and Dilemmas of the UK Legal Framework. 6.9. Policy-Relevant Recommendations. 6.10. Concluding Remarks |
|
7. Human-Implantable Microchips: Location-Awareness and the Dawn of an "Internet of Persons". 7.1. Introduction. 7.2. RFID/GPS Implants and the Technology Behind Them. 7.3. Location-Awareness and the Dawn of an "Internet of Persons". 7.4. Potential Security and Well-Being Benefits. 7.5. Security Risks and Drawbacks. 7.6. Scope of Deployment. 7.7. Alternatives to HIMs. 7.8. Laws, Codes, Decisions and Other Legal Instruments of Special Relevance in the US. 7.9. Deficiencies and Dilemmas of the US Legal Framework. 7.10. Policy-Relevant Recommendations. 7.11. Concluding Remarks |
|
8. New Privacy Threats, Old Legal Approaches: Conclusions of Part II. 8.1. The New Threats to Privacy. 8.2. Beyond Privacy and Data Protection. 8.3. Deficiencies of the Existing Privacy Legal Frameworks |
|
PART III. NEW APPROACH TO PROTECTING PRIVACY. 9. The Value, Role and Challenges of Privacy by Design. 9.1. Introduction. 9.2. Concept, Theory and Origins of PBD. 9.3. PBD Methodology. 9.4. PBD Solutions for: Body Scanners, HIMs, CCTV Microphones and Loudspeakers. 9.5. PBD Versus PETs. 9.6. PBD in the Current US and UK/EU Legal Frameworks. 9.7. Growing Widespread Recognition. 9.8. Potentially Growing Application. 9.9. A Unique Selling Point and Source of Value Creation. 9.10. The Growing Lack of Trust. 9.11. Potential Criticism. 9.12. Practical Challenges of Implementing PBD. 9.13. Concluding Remarks |
|
PART IV. RESEARCH RESULTS. 10. Conclusions and Policy Implications. 10.1. Introduction. 10.2. Keeping Up with the Technology. 10.3. PBD: Critical Combination of Technology and Law. 10.4. Not a Substitute for Law. 10.5. Flexibility vs. Specificity. 10.6. Radical Changes for Radical Capabilities. 10.7. Implementation, Enforcement, Monitoring and Evaluation. 10.8. Accountability, Sanctions and Recalls. 10.9. Certified Privacy-Friendly. 10.10. Designing for Privacy. 10.11. Adequate PBD Solutions. 10.12. Avoiding Overregulation. 10.13. Furthering Deployment and Innovation. 10.14. Safeguarding Privacy, Liberty and Security. 10.15. Using Privacy-Friendly Alternatives. 10.16. Countering Potential Criticism of PBD. 10.17. Overcoming Some of the Challenges. 10.18. Engaging Relevant Stakeholders. 10.19. Not a Panacea: The Limitations and Constraints of PBD. 10.20. Final Conclusions. Appendix A. A3-Report. Appendix B. Summary Table |
Summary |
"Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microchips (RFID implants/GPS implants) are dealt with in this book. The book shows how and why laws that regulate the design and development of privacy-invading technologies (PITs) may more effectively ensure the protection of privacy than laws that only regulate data controllers and the use of such technologies. The premise is supported and demonstrated through a discussion on these four specific PITs as case studies. In doing so, the book overall attempts to explain how laws/regulations that mandate the implementation of Privacy by Design (PBD) could potentially serve as a viable approach for collectively safeguarding privacy, liberty and security in the 21st Century. This book will be of interest to academic researchers, law practitioners, policy makers and technology researchers."--Publisher's description |
|
Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall. Backed up by comprehensive study of four specific PITs - Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers; and Human-implantable microchips (RFID implants/GPS implants) - the author shows how laws that regulate the design and development of PITs may more effectively protect privacy than laws that only regulate data controllers and the use of such technologies. New rules and regulations should therefore incorporate fundamental privacy principles through what is known as 'Privacy by Design'. The numerous sources explored by the author provide a workable overview of the positions of academia, industry, government and relevant international organizations and NGOs. Demetrius Klitou has a Ph. D. in Law from Leiden University. He carried out his research under the auspices of the Centre for Law in the Information Society (eLaw@Leiden), Leiden, The Netherlands. He is currently serving as a consultant, specialized in the non-technological aspects of technology policies, innovation activities/policies, policy development processes and project management |
Analysis |
intellectuele eigendomsrechten |
|
intellectual property rights |
|
internationaal recht |
|
international law |
|
mensenrechten |
|
human rights |
|
recht |
|
law |
|
computerwetenschappen |
|
computer sciences |
|
computertechnieken |
|
computer techniques |
|
sociale wetenschappen |
|
social sciences |
|
Law (General) |
|
Recht (algemeen) |
Bibliography |
Includes bibliographical references and index |
Notes |
Online resource and print version record; title from PDF title page (SpringerLink, viewed June 14, 2016) |
Subject |
Privacy, Right of.
|
|
Data protection -- Law and legislation.
|
|
LAW -- Constitutional.
|
|
LAW -- Public.
|
|
Privacy, Right of
|
|
Data protection -- Law and legislation
|
|
Privacy.
|
|
Liberty and security of the person.
|
|
Personal data.
|
|
Data protection.
|
|
Information and communication technology.
|
|
Electronic circuits.
|
|
Information law.
|
Form |
Electronic book
|
ISBN |
9789462650268 |
|
9462650268 |
|