Abstract
The successful functionality of the solutions proposed by the SERENITY project will only be achieved when they fit into the existing legal framework. Therefore, when developing software and hardware solutions, developers must respect requirements set out by law. The aim of this chapter is to define legal challenges that arise with the advent of the Ambient Intelligence, and to explain how SERENITY deals with the challenge of legal compliance. To do this, we will first describe how the legal requirements are translated into a machinereadable form in the SERENITY project, and introduce the concept of so called legal patterns. The application of relevant legal principles on data protection will be illustrated using two particular scenarios. We will then focus on practical legal problems related to daily operations of SERENITY technical solutions. Finally, we conclude with an evaluation of the SERENITY approach and its outcomes
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aggarwal G, Bawa M, Ganesan P, Garcia-Molina H, Kenthapadi K, Mishra N, Motwani R, Srivastava U, Thomas D, Widom J, Xu Y (2004) Vision Paper: Enabling Privacy for the Paranoids. VLDB Endowment Inc. http://www.vldb.org/conf/2004/RS19P1.PDF. Accessed 5 August 2008
Article 29 Data Protection Working Party (2006) Opinion 8/2006 on the review of the regulatory Framework for Electronic Communications and Services, with focus on the ePrivacy Directive. European Commission. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2006/wp126_en.pdf. Accessed 28 May 2008
Article 29 Data Protection Working Party (2008) Opinion 2/2008 on the review of the Directive 2002/58/EC on privacy and electronic communications (ePrivacy Directive). European Commission. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2008/wp150_en.pdf. Accessed 1 October 2008
4. Augusto JC and McGullagh P (2007) Ambient Intelligence: Concepts and Applications. Int'l J. Computer Science and Information Systems 4:1-28
5. Avižienis A, Laprie JC, Randell B, Landwehr C (2004) Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1:11-33
6. Bygrave Lee A (2002) Data Protection Law: Approaching Its Rationale, Logic and Limits. Kluwer Law International, Hague
7. Cai Y (ed) (2005) Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems. Springer-Verlag, Berlin, Heidelberg
Compagna L, El Khoury P, Krausová A, Massacci F, Zannone N (2008) How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artificial Intelligence and Law. doi: 10.1007/s10506-008-9067-3
Compagna L, El Khoury P, Massacci F, Thomas R, Zannone N (2007) How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL '07: Proceedings of the 11th international conference on Artificial intelligence and law: 149-153
Cybex (2006) The Admissibility of Electronic Evidence in Court. Cybex. http://www.cybex.es/agis2005/docs/libro_aeec_en.pdf. Accessed 14 July 2008
11. Escuredo-Pascual A, Hosein I (2004) Questioning Lawful Access to Traffic Data. Communications of the ACM 3:77-82
FP7 ICT Advisory Group (2008) Working Group Report on “ICT and Sustainability (including Energy and Environment)”. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/sustainability-istag_en.pdf. Accessed 21 August 2008
13. Gadzheva M (2008) Privacy in the Age of Transparency: The New Vulnerability of the Individual. Social Science Computer Review 26:60-74
Gruetser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-Aware Location Sensor Networks. http://systems.cs.colorado.edu/Papers/Generated/2003PrivacyAwareSensors.pdf. Accessed 5 August 2008
Hohfeld WN (1913) Fundamental legal conceptions as applied to judicial reasoning. Yale Law Journal: 16-59
Hoofnagle CJ (2005) Privacy Self Regulation: A Decade of Disappointment. SSRN Electronic Library. http://ssrn.com/abstract=650804. Accessed 18 July 2008
IST Advisory Group (1999) Orientations for Workprogramme 2000 and beyond. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-99-final.pdf. Accessed 21 August 2008
IST Advisory Group (2002) Software technologies, embedded systems and distributed systems: A European strategy towards an Ambient Intelligent environment. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag_kk4402472encfull.pdf. Accessed 21 August 2008
IST Advisory Group (2002) Trust, dependability, security and privacy for IST in FP6. IST-web. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag_kk4402464encfull.pdf. Accessed 21 August 2008
IST Advisory Group (2003) Ambient Intelligence: From Vision to Reality. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-ist2003_consolidated_report.pdf. Accessed 16 July 2008
IST Advisory Group (2004) Experience and Application Research: Involving Users in the Development of Ambient Intelligence. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/2004_ear_web_en.pdf. Accessed 21 August 2008
IST Advisory Group (2006) ISTAG Report on Shaping Europe's Future Through ICT. IST-web. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-shaping-europe-future-ict-march-2006-en.pdf. Accessed 21 August 2008
IST Advisory Group (2006) ISTAG Report on Orientations for Work Programme in FP7. ISTweb. ftp://ftp.cordis.europa.eu/pub/ist/docs/istag-wp-wg-report-ver-final_en.pdf. Accessed 21 August 2008
Kosta E, Pitkänen O, Niemelä M, Kaasinen E (2008) Ethical-Legal Challenges in User-Centric AmI Services. Third International Conference on Internet and Web Applications and Services: 19-24
Korff D (2002) EC Study on Implementation of Data Protection Directive: Comparative Summary of National Laws. European Commission. http://ec.europa.eu/justice_home/fsj/privacy/docs/lawreport/consultation/univessex-comparativestudy_en.pdf. Accessed 21 January 2008
Mason S with specialist contributors (2007) Electronic Evidence: Disclosure, Discovery and Admissibility. LexisNexis Butterworths, Suffolk
27. Pedersen DM (1997) Psychological Functions of Privacy. Journal of Environmental Psychology 17:147-156
28. Perrig A, Stankovic J, Wagner D (2004) Security in Wireless Sensor Networks. Communications of the ACM 6:53-57
Saraogi M (2005) Security in Wireless Sensor Networks. http://www.cs.utk.edu/∼saraogi/594paper.pdf. Accessed 5 August 2008
30. Scherer J (ed) (2005) Telecommunication Laws in Europe. Tottel Publishing, West Sussex
SERENITY Project. A1 Deliverable - A1.D3.1 - Initial Set of Security and Privacy Patterns at Organizational Level. EU-IST-IP 6th Framework Programme - SERENITY 27587.
SERENITY Project. A4 Deliverable - A4.D2.2 - Basic set of Information Collection Mechanisms for Run-Time S&D Monitoring. EU-IST-IP 6th Framework Programme - SERENITY 27587.
SERENITY Project. A5 Deliverable - A5.D2.3 - Patterns and Integration Schemes Languages. EU-IST-IP 6th Framework Programme - SERENITY 27587.
SERENITY Project. A7 Deliverable - A7.D1.1 - Scenario Selection and Definition. EU-IST-IP 6th Framework Programme - SERENITY 27587.
Solove DJ (2005) The New Vulnerability: Data Security and Personal Information. SSRN Electronic Library. http://ssrn.com/abstract=583483. Accessed 15 May 2008
36. Solove DJ, Rotenberg M, Schwartz PM (2006) Information Privacy Law. Aspen Publishers, New York
Spiekermann S (2005) Perceived Control: Scales for Privacy in Ubiquitous Computing. SSRN Electronic Library. http://ssrn.com/abstract=761109. Accessed 15 May 2008
Stankovic JA, Cao Q, Doan T, Fang L, He Z, Kiran R, Lin S, Son S, Stoleru R, Wood A (2005) Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges. http://faculty.cs.tamu.edu/stoleru/papers/stankovic05wsn.pdf. Accessed 5 August 2008
von Wright GH (1951) Deontic logic. Mind:1-15
Wahlgren P (1992) Automation of Legal Reasoning: A Study on Artificial Intelligence. Kluwer Law and Taxation Publishers, Deventer
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Krausová, A., Dumortier, J. (2009). Legal Issues of Ambient Intelligence in the SERENITY Project. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_16
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)