Limit search to available items
Book Cover
E-book
Author Klitou, Demetrius, author

Title Privacy-invading technologies and privacy by design : safeguarding privacy, liberty and security in the 21st century / Demetrius Klitou
Published The Hague, The Netherlands : T.M.C. Asser Press, [2014]
Berlin : Springer-Verlag, [2014]
©2014

Copies

Description 1 online resource (xix, 338 pages) : illustrations
Series Information Technology and Law Series ; volume 25
Information technology & law series ; 25. 1570-2782
Contents 1. Introduction. 1.1. Escalating Technological Threats to Privacy. 1.2. Core Theme of the Book. 1.3. Rationale for the Case Studies Selection. 1.4. Key Questions of Interest. 1.5. Added Value. 1.6. Structure and Overview of Chapters
PART I. PRINCIPLES OF PRIVACY. 2. Privacy, Liberty and Security. 2.1. Introduction. 2.2. The Concept of Privacy. 2.3. Privacy as an International Human Right. 2.4. The Merits of Privacy. 2.5. The Concept of Liberty. 2.6. Privacy and Liberty. 2.7. The Concept of Security. 2.8. Privacy, Liberty and Security
3. Assessing the Adequacy of a Privacy Legal Framework. 3.1. Introduction. 3.2. An Adequate Privacy Legal Framework?. 3.3. International Consensus in Principle. 3.4. Purpose and Meaning of Each Principle. 3.5. The EU Approach Versus the US Approach. 3.6. Required Legal Characteristics. 3.7. Basic Pre-measures. 3.8. Legal Criteria Specific to the US and UK. 3.9. Applying the Privacy Principles of the Twentieth Century to the Technological Advancements of the Twenty-First Century
PART II. TECHNOLOGICAL THREATS TO PRIVACY. 4. Privacy-Invading Technologies. 4.1. Introduction. 4.2. A Definition of PITs. 4.3. The Growing Deployment and Threat of PITs. 4.4. PITs and the Human Body. 4.5. PITs and the Public Space. 4.6. Other PITs that May Pose Serious Threats to Privacy and Liberty
5. Body Scanners: A Strip Search by Other Means?. 5.1. Introduction. 5.2. A Strip Search by Other Means?. 5.3. How Backscatter Body Scanners Work. 5.4. Security Benefits and Drawbacks. 5.5. The Plausibility of the Threat Posed by Plastic Guns, Ceramic Knives, and Liquid/Chemical and Plastic Explosives. 5.6. Alternatives to Backscatter Body Scanners. 5.7. Scope of Deployment in the US. 5.8. Laws, Codes, Decisions and Other Legal Instruments of Special Relevance in the US. 5.9. Deficiencies and Dilemmas of the US Legal Framework. 5.10. Policy-Relevant Recommendations. 5.11. Manufacturer-Level or User-Level Regulation?. 5.12. International Deployment, Developments and Responses. 5.13. Concluding Remarks
6. Public Space CCTV Microphones and Loudspeakers: The Ears and Mouth of "Big Brother". 6.1. Introduction. 6.2. The Privacy-Intrusive Evolution of CCTV Surveillance Technology. 6.3. The Ears and Mouth of "Big Brother". 6.4. Scope of Deployment in the UK. 6.5. Security Gains. 6.6. Alternatives to CCTV Microphones and Loudspeakers. 6.7. Laws, Codes, Decisions and other Legal Instruments of Special Relevance in the UK. 6.8. Deficiencies and Dilemmas of the UK Legal Framework. 6.9. Policy-Relevant Recommendations. 6.10. Concluding Remarks
7. Human-Implantable Microchips: Location-Awareness and the Dawn of an "Internet of Persons". 7.1. Introduction. 7.2. RFID/GPS Implants and the Technology Behind Them. 7.3. Location-Awareness and the Dawn of an "Internet of Persons". 7.4. Potential Security and Well-Being Benefits. 7.5. Security Risks and Drawbacks. 7.6. Scope of Deployment. 7.7. Alternatives to HIMs. 7.8. Laws, Codes, Decisions and Other Legal Instruments of Special Relevance in the US. 7.9. Deficiencies and Dilemmas of the US Legal Framework. 7.10. Policy-Relevant Recommendations. 7.11. Concluding Remarks
8. New Privacy Threats, Old Legal Approaches: Conclusions of Part II. 8.1. The New Threats to Privacy. 8.2. Beyond Privacy and Data Protection. 8.3. Deficiencies of the Existing Privacy Legal Frameworks
PART III. NEW APPROACH TO PROTECTING PRIVACY. 9. The Value, Role and Challenges of Privacy by Design. 9.1. Introduction. 9.2. Concept, Theory and Origins of PBD. 9.3. PBD Methodology. 9.4. PBD Solutions for: Body Scanners, HIMs, CCTV Microphones and Loudspeakers. 9.5. PBD Versus PETs. 9.6. PBD in the Current US and UK/EU Legal Frameworks. 9.7. Growing Widespread Recognition. 9.8. Potentially Growing Application. 9.9. A Unique Selling Point and Source of Value Creation. 9.10. The Growing Lack of Trust. 9.11. Potential Criticism. 9.12. Practical Challenges of Implementing PBD. 9.13. Concluding Remarks
PART IV. RESEARCH RESULTS. 10. Conclusions and Policy Implications. 10.1. Introduction. 10.2. Keeping Up with the Technology. 10.3. PBD: Critical Combination of Technology and Law. 10.4. Not a Substitute for Law. 10.5. Flexibility vs. Specificity. 10.6. Radical Changes for Radical Capabilities. 10.7. Implementation, Enforcement, Monitoring and Evaluation. 10.8. Accountability, Sanctions and Recalls. 10.9. Certified Privacy-Friendly. 10.10. Designing for Privacy. 10.11. Adequate PBD Solutions. 10.12. Avoiding Overregulation. 10.13. Furthering Deployment and Innovation. 10.14. Safeguarding Privacy, Liberty and Security. 10.15. Using Privacy-Friendly Alternatives. 10.16. Countering Potential Criticism of PBD. 10.17. Overcoming Some of the Challenges. 10.18. Engaging Relevant Stakeholders. 10.19. Not a Panacea: The Limitations and Constraints of PBD. 10.20. Final Conclusions. Appendix A. A3-Report. Appendix B. Summary Table
Summary "Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microchips (RFID implants/GPS implants) are dealt with in this book. The book shows how and why laws that regulate the design and development of privacy-invading technologies (PITs) may more effectively ensure the protection of privacy than laws that only regulate data controllers and the use of such technologies. The premise is supported and demonstrated through a discussion on these four specific PITs as case studies. In doing so, the book overall attempts to explain how laws/regulations that mandate the implementation of Privacy by Design (PBD) could potentially serve as a viable approach for collectively safeguarding privacy, liberty and security in the 21st Century. This book will be of interest to academic researchers, law practitioners, policy makers and technology researchers."--Publisher's description
Challenged by rapidly developing privacy-invading technologies (PITs), this book provides a convincing set of potential policy recommendations and practical solutions for safeguarding both privacy and security. It shows that benefits such as public security do not necessarily come at the expense of privacy and liberty overall. Backed up by comprehensive study of four specific PITs - Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers; and Human-implantable microchips (RFID implants/GPS implants) - the author shows how laws that regulate the design and development of PITs may more effectively protect privacy than laws that only regulate data controllers and the use of such technologies. New rules and regulations should therefore incorporate fundamental privacy principles through what is known as 'Privacy by Design'. The numerous sources explored by the author provide a workable overview of the positions of academia, industry, government and relevant international organizations and NGOs. Demetrius Klitou has a Ph. D. in Law from Leiden University. He carried out his research under the auspices of the Centre for Law in the Information Society (eLaw@Leiden), Leiden, The Netherlands. He is currently serving as a consultant, specialized in the non-technological aspects of technology policies, innovation activities/policies, policy development processes and project management
Analysis intellectuele eigendomsrechten
intellectual property rights
internationaal recht
international law
mensenrechten
human rights
recht
law
computerwetenschappen
computer sciences
computertechnieken
computer techniques
sociale wetenschappen
social sciences
Law (General)
Recht (algemeen)
Bibliography Includes bibliographical references and index
Notes Online resource and print version record; title from PDF title page (SpringerLink, viewed June 14, 2016)
Subject Privacy, Right of.
Data protection -- Law and legislation.
LAW -- Constitutional.
LAW -- Public.
Privacy, Right of
Data protection -- Law and legislation
Privacy.
Liberty and security of the person.
Personal data.
Data protection.
Information and communication technology.
Electronic circuits.
Information law.
Form Electronic book
ISBN 9789462650268
9462650268