Skip to main content

The Law and Data Protection

  • Chapter
  • First Online:
Face Recognition Technology

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 41))

Abstract

This chapter provides an overview of the range of legislation associated with the regulation of data management. Of special interest here is the status of personal images as ‘data’. The issue of whether photographic or digital images are in fact data creates tensions that until recently did not exist. In other words, the technology has overtaken the legal discourse and has required either that the image data should be assimilated into existing law on a case-by-case basis, or for new laws to be drafted. Therefore, since face recognition is an imaging modality previous statutory instruments are inadequate, and this chapter provides the back-drop to the on-going legal discourse.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Manson and O’Neill (2007), pp. 97–121.

  2. 2.

    Westin (1967) and Parent (1983).

  3. 3.

    Wacks (1989, revised 1993), p. 26.

  4. 4.

    To be considered below.

  5. 5.

    The European Community Act 1972.

  6. 6.

    The state can equally be a business corporation.

  7. 7.

    See Chap. 3, footnote 26.

  8. 8.

    Council of the European Union Regulation (EU) 2016/680.

  9. 9.

    Amos (2006), p. 346.

  10. 10.

    The antecedent to the General Data Protection Regulation.

  11. 11.

    Regulation (EU) 2016/680 para 1 op cit.

  12. 12.

    Wicks (2007), p. 122.

  13. 13.

    ibid p. 123.

  14. 14.

    See Eglot (2015).

  15. 15.

    Mosley v News Group Newspapers Ltd.

  16. 16.

    ibid Mosley: Eady J at [133] and [134].

  17. 17.

    European Commission Memo, 27th January2014.

  18. 18.

    Regulation (EU) 2016/680, op cit. See footnote 45 below.

  19. 19.

    Nissenbaum (2010).

  20. 20.

    ibid p. 231.

  21. 21.

    ibid p. 237.

  22. 22.

    Schwartz and Solove (2014).

  23. 23.

    Nissenbaum (2010), pp. 237–238 op cit.

  24. 24.

    US Constitution: Fourth Amendment.

  25. 25.

    See Mallon (2003). See fn 24 above.

  26. 26.

    Katz v. United States, 389 U.S. 347 (1967). Cited by Mallon B op cit.

  27. 27.

    United States v Dionisio 410 U.S. 1 (1973). Cited by Mallon B ibid.

  28. 28.

    See Sect. 6.7.

  29. 29.

    Solove (2011), pp. 100–101.

  30. 30.

    See Sect. 4.4.

  31. 31.

    See Whitehead (2013), p. 21.

  32. 32.

    See Chap. 11.

  33. 33.

    See Jolly (n.d.), p. 2.

  34. 34.

    Reuters (2012).

  35. 35.

    FTC (2012). The FTC performs a similar role to that of EU Information Commissioners though unlike the US, the European data protection laws apply universally to all data in every sector.

  36. 36.

    Shear (2013).

  37. 37.

    Jolly I op cit p.5. The Federal Trade Commission Act (15 U.S.C. s.41-58) (FTC Act) is a federal consumer protection law that prohibits unfair or deceptive practices and applies to offline and online privacy and data security policies. The Financial Services Modernisation Act (Gramm-Leach-Bliley Act (GLB)) (15 U.S.C. s.6801-6827) regulates the collection, use and disclosure of financial information. GLB limits the disclosure of non-public personal information and can require financial institutions to provide notice of their privacy practices and an opportunity for data subjects to opt out of having their information shared. The Health Insurance Portability and Accountability Act (HIPAA) (42 U.S.C. s.1301 et seq) regulates medical information.

    The Electronic Communications Privacy Act (18 U.S.C. s.2510) and the Computer Fraud and Abuse Act (18 U.S.C. s.1030) regulates the interception of electronic communications and computer tampering respectively.

  38. 38.

    HIPPA (2003). For instance the United States Department of Health and Human Services ‘Summary of the HIPAA Privacy Rule [The HIPAA] “Privacy Rule provides exceptions to the general rule of federal pre-emption for contrary State laws that relate to the privacy of individually identifiable health information, [which] provide greater privacy protections or privacy rights with respect to such information”.

  39. 39.

    Schwartz and Solove (2014) op cit. See Sect. 4.6.

  40. 40.

    ibid.

  41. 41.

    Regulation (EU) 2016/680 §2, op cit.

  42. 42.

    DPA 2018; GDPR Article 9.

  43. 43.

    Solove (2011) op cit.

  44. 44.

    FTC (2014).

  45. 45.

    Viviane Reding V (2014).

  46. 46.

    ibid.

  47. 47.

    See Drozdiak and Sam Schechner (2015).

  48. 48.

    EU—US Privacy Shield Framework (European Commission 2016).

  49. 49.

    Edgar (2017), pp. 164–167.

  50. 50.

    Privacy Shield Framework (European Commission 2016).

  51. 51.

    Reding V 2(014) op cit.

  52. 52.

    Agamben (2005).

  53. 53.

    Campbell (Appellant) v. MGN Limited (Respondents).

  54. 54.

    ibid as per para 155.

  55. 55.

    Chapter 5 above.

  56. 56.

    See Sect. 6.7.

  57. 57.

    EU Directive 95/46/EC.

  58. 58.

    GDPR para (9).

  59. 59.

    See Kindt (2013), p. 93 §189.

  60. 60.

    von Hannover v. Germany.

  61. 61.

    See Bedat (2013) and Callender Smith (2012).

  62. 62.

    This was widely reported in the press with headlines declaring the Daily Mirror’s lawyer had called her a liar. And was also contentiously considered as legislating privacy by the backdoor of medical confidentiality by Piers Morgan, editor of the Daily Mirror Newspaper at the time.

  63. 63.

    Kindt (2013) op cit, p. 418 §241.

  64. 64.

    Murray v Express Newspapers Plc & Anor [2007].

  65. 65.

    ibid para 65.

  66. 66.

    ibid para 66.

  67. 67.

    ibid paras 18, 19,72 and 73.

  68. 68.

    Murray v Big Pictures (UK) Ltd [2008].

  69. 69.

    ibid paras 63 and 63.

  70. 70.

    Kindt (2013) op cit p 149 §275.

  71. 71.

    Directive 95/46/EC Article 30(c).

  72. 72.

    Cited by Kindt (2013) op cit.

  73. 73.

    GDPR Article 4(1). Cited by Kindt (2013) op cit.

  74. 74.

    Kindt (2013) op cit.

  75. 75.

    Directive 95/46/EC Article 29.

  76. 76.

    ibid.

  77. 77.

    Kindt (2013) op cit.

  78. 78.

    i.e. scanned photographs.

  79. 79.

    Regulation (EU) 2016/680 op cit.

  80. 80.

    Privacy by Design: 7 Foundational Principles.

  81. 81.

    Kindt (2013) op cit.

  82. 82.

    ibid.

  83. 83.

    ibid.

  84. 84.

    Directive 95/46/EC op cit. My italics.

  85. 85.

    Kindt (2013) op cit.

  86. 86.

    European Commission Regulation 2016/679 (proposed GDPR vis-à-vis Regulation 2016/680).

  87. 87.

    ibid (Article 30) and implemented in GDPR Articles 25 and 30.

  88. 88.

    ibid and implemented in GDPR Article 26.

  89. 89.

    ibid page 18(7).

  90. 90.

    ibid page 18(6).

  91. 91.

    Regulation (EU) 2016/679 and 2016/680.

  92. 92.

    FTC Report (2012).

  93. 93.

    ibid.

  94. 94.

    See Cohn et al. (2013) Electronic Frontier Foundation.

  95. 95.

    Electronic Frontier Foundation.

  96. 96.

    ibid.

  97. 97.

    Cited by Welinder (2012).

  98. 98.

    Acquisti et al. (2014).

  99. 99.

    ibid.

  100. 100.

    Fretty (2011), p. 444.

  101. 101.

    Fourth Amendment op cit.

  102. 102.

    United States v. Maynard.

  103. 103.

    ibid Maynard, 615F.3d at 559. Cited by Fretty (2011), p. 444.

  104. 104.

    Fretty (2011) op cit.

  105. 105.

    Nader v. General Motors Corp.

  106. 106.

    See Solove (2008), p. 111.

  107. 107.

    United States v. Knotts.

  108. 108.

    Fretty (2011) op cit p. 450.

  109. 109.

    ibid p 451; United States v. Garcia.

  110. 110.

    United States v. Mendenhall.

  111. 111.

    INS v. Delgado.

  112. 112.

    Fretty D op cit p. 446.

  113. 113.

    United States v. Mendenhall op cit.

  114. 114.

    Human Rights Act (HRA) 1998.

  115. 115.

    Regulation of Investigatory Powers Act 2000.

  116. 116.

    Police and Criminal Evidence Act 1984 c. 60.

  117. 117.

    HRA1998 op cit.

  118. 118.

    Perry v. The United Kingdom. My italics.

  119. 119.

    R v. Loveridge.

  120. 120.

    Campbell v. MGN Limited.

  121. 121.

    The Law Society Gazette (2013).

  122. 122.

    Kinloch [2012] UKSC 62.

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Berle, I. (2020). The Law and Data Protection. In: Face Recognition Technology. Law, Governance and Technology Series, vol 41. Springer, Cham. https://doi.org/10.1007/978-3-030-36887-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36887-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36886-9

  • Online ISBN: 978-3-030-36887-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics