Advertisement

Community Policing in the Light of the New European Data Protection Legal Framework

  • Philippe JougleuxEmail author
  • Georgios Leventakis
  • Lilian Mitrou
Chapter
Part of the SpringerBriefs in Criminology book series (BRIEFSCRIMINOL)

Abstract

Our analysis of community policing focuses on the impact of the new Data Protection Package that will enter into force in May 2018. We identify and discuss the implications of both the General Data Protection Regulation (2016/ 679/ EU-GDPR) and the Police and Criminal Justice Authorities Directive (2016/680/ EU -PCJA Directive), as due to the hybrid nature–function of community policing platform/ applications both legal instruments will be applicable. We insist on legal provisions of GDPR concerning information and transparency duties, application of data protection principles, consent of involved persons, processing requirements as well as rights of data subjects that may be affected by community policing information applications and activities. In this context we analyse new principles and obligations such as accountability as well as privacy by design, obligation to carry data protection impact assessment, designation of a data protection officer, etc. With regard to the analysis of PCJA Directive we considered and assessed the legal obligations in the light of the specific duties and tasks of police authorities with focus on categorization of personal data and accuracy. As case study we analyse the way the INSPEC2T project has dealt with the legal issues identified. In our conclusion we emphasize the importance of an adequate and balanced data protection framework on community policing. However we point out the potential issues that may arise due to cumulative application of two different legal frameworks (GDPR and PCJA Directive) and the lack of clarity of some, basic duties.

Keywords

Community policing Privacy Personal data General Data Protection Regulation Police directive Data protection impact assessment Data protection by design 

References

  1. Brinkhoff, S. (2017). Big data data mining by the Dutch police: Criteria for a future method of investigation. European Journal for Security Research, 2, 57.  https://doi.org/10.1007/s41125-017-0012-x.CrossRefGoogle Scholar
  2. Hustinx, P. (2014). EU data protection law: The review of directive 95/46/EC and the proposed general data protection regulation. Retrieved from https://edps.europa.eu/data-protection/our-work/publications/speeches-articles/eu-data-protection-law-review-directive_en
  3. Leventakis, G., Kokkinis, G., Moustakidis, N., Papalexandratos, G., & Vasiliadou, I. (2016). Enhancing cooperation between LEAs and citizens: The INSPEC2T approach. World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 10(8), 2836–2845.Google Scholar
  4. Leventakis, G., Kokkinis, G., & Papalexandratos, G. (2017). Community policing case studies: Proposing a social media approach. In Community policing-a European perspective (pp. 139–156). New York: Springer International Publishing.CrossRefGoogle Scholar
  5. Manders-Huits, N. (2011). Regulating invisible harms. In S. van der Hof & M. M. Groothuis (Eds.), Innovating government- normative, Policy and technological dimensions of Modern Government (pp. 57–73). Berlin: Springer.CrossRefGoogle Scholar
  6. Mazerolle, L. (2014). The power of policing partnerships: Sustaining the gains. Journal of Experimental Criminology, 10(3), 341–365.CrossRefGoogle Scholar
  7. Mendoza, I., & Bygrave, L. (2017). Chapter 4: The right not to be subject to automated decisions based on profiling. In T. Synodinou et al. (Eds.), Contemporary issues of internet law. New York: Springer.Google Scholar
  8. Nakar, C., & Greenbaum, D. (2017). Now you see me. Now you still do: Facial recognition technology and the growing lack of privacy. Boston University Journal of Science & Technology Law, 23, 88.Google Scholar
  9. Ngan, M., & Grother, P. (2015). Tattoo recognition technology-challenge (Tatt-C): An open tattoo database for developing tattoo recognition research. Identity, Security and Behavior Analysis (ISBA), 2015 IEEE International Conference on IEEE.Google Scholar
  10. Niculescu-Dinca, V. (2012). Managing suspicion and privacy in police information systems negotiated work in local police GIS in Romania. In S. Gutwirth et al. (Eds.), European data protection: In good health? (pp. 103–121). New York: Springer.CrossRefGoogle Scholar
  11. Organization for Security and Co-operation in Europe. (2014). Preventing terrorism and countering violent extremism and radicalization that lead to terrorism: A community-policing approach. Vienna: OSCE.Google Scholar
  12. Pataky, T. C., et al. (2011). Gait recognition: highly unique dynamic plantar pressure patterns among 104 individuals. Journal of Royal Society Interface, 9(69), 790–800.  https://doi.org/10.1098/rsif.2011.0430.CrossRefGoogle Scholar
  13. Patel, T. (2012). Surveillance, suspicion and stigma: Brown bodies in a terror-panic climate. Surveillance & Society, 10(3/4), 215–234 Retrieved from http://www.surveillance-and-society.org.CrossRefGoogle Scholar
  14. Reeves, J. (2012). If you see something, say something: Lateral surveillance and the uses of responsibility. Surveillance & Society, 10(3/4), 235–248.CrossRefGoogle Scholar
  15. Salami E. (2017, February 6). The impact of directive (EU) 2016/680 on the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties and on the free movement of such data on the existing privacy regime. Retrieved from SSRN https://ssrn.com/abstract=2912449 or  https://doi.org/10.2139/ssrn.2912449
  16. Schafer, B. (2013). Crowdsourcing and cloudsourcing CCTV surveillance. Datenschutz und Datensicherheit, 37(7), 434–439.CrossRefGoogle Scholar
  17. van Dijk, N., Gellert, R., & Rommetveit, K. (2016). A risk to a right? Beyond data protection risk assessments. Computer Law & Security Review, 32(2016), 286–306.CrossRefGoogle Scholar

Copyright information

© The Author(s), under exclusive licence to Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Philippe Jougleux
    • 1
    Email author
  • Georgios Leventakis
    • 2
    • 3
  • Lilian Mitrou
    • 4
  1. 1.School of LawEuropean University CyprusNicosiaCyprus
  2. 2.Center for Security Studies (KEMEA)Greek Ministry of InteriorΑthensGreece
  3. 3.University of Aegean, School of ScienceLesbosGreece
  4. 4.Department of Information and Communication Systems EngineeringUniversity of the AegeanLesbosGreece

Personalised recommendations