Legal Issues of Ambient Intelligence in the SERENITY Project

  • Alžběta Krausová
  • Jos Dumortier
Part of the Advances in Information Security book series (ADIS, volume 45)


The successful functionality of the solutions proposed by the SERENITY project will only be achieved when they fit into the existing legal framework. Therefore, when developing software and hardware solutions, developers must respect requirements set out by law. The aim of this chapter is to define legal challenges that arise with the advent of the Ambient Intelligence, and to explain how SERENITY deals with the challenge of legal compliance. To do this, we will first describe how the legal requirements are translated into a machinereadable form in the SERENITY project, and introduce the concept of so called legal patterns. The application of relevant legal principles on data protection will be illustrated using two particular scenarios. We will then focus on practical legal problems related to daily operations of SERENITY technical solutions. Finally, we conclude with an evaluation of the SERENITY approach and its outcomes


Wireless Sensor Network Personal Data Health Care Centre Data Controller Ambient Intelligence 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aggarwal G, Bawa M, Ganesan P, Garcia-Molina H, Kenthapadi K, Mishra N, Motwani R, Srivastava U, Thomas D, Widom J, Xu Y (2004) Vision Paper: Enabling Privacy for the Paranoids. VLDB Endowment Inc. Accessed 5 August 2008
  2. 2.
    Article 29 Data Protection Working Party (2006) Opinion 8/2006 on the review of the regulatory Framework for Electronic Communications and Services, with focus on the ePrivacy Directive. European Commission. Accessed 28 May 2008
  3. 3.
    Article 29 Data Protection Working Party (2008) Opinion 2/2008 on the review of the Directive 2002/58/EC on privacy and electronic communications (ePrivacy Directive). European Commission. Accessed 1 October 2008
  4. 4.
    4. Augusto JC and McGullagh P (2007) Ambient Intelligence: Concepts and Applications. Int'l J. Computer Science and Information Systems 4:1-28Google Scholar
  5. 5.
    5. Avižienis A, Laprie JC, Randell B, Landwehr C (2004) Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1:11-33CrossRefGoogle Scholar
  6. 6.
    6. Bygrave Lee A (2002) Data Protection Law: Approaching Its Rationale, Logic and Limits. Kluwer Law International, HagueGoogle Scholar
  7. 7.
    7. Cai Y (ed) (2005) Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems. Springer-Verlag, Berlin, HeidelbergGoogle Scholar
  8. 8.
    Compagna L, El Khoury P, Krausová A, Massacci F, Zannone N (2008) How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artificial Intelligence and Law. doi: 10.1007/s10506-008-9067-3Google Scholar
  9. 9.
    Compagna L, El Khoury P, Massacci F, Thomas R, Zannone N (2007) How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL '07: Proceedings of the 11th international conference on Artificial intelligence and law: 149-153Google Scholar
  10. 10.
    Cybex (2006) The Admissibility of Electronic Evidence in Court. Cybex. Accessed 14 July 2008
  11. 11.
    11. Escuredo-Pascual A, Hosein I (2004) Questioning Lawful Access to Traffic Data. Communications of the ACM 3:77-82CrossRefGoogle Scholar
  12. 12.
    FP7 ICT Advisory Group (2008) Working Group Report on “ICT and Sustainability (including Energy and Environment)”. ISTweb. Accessed 21 August 2008Google Scholar
  13. 13.
    13. Gadzheva M (2008) Privacy in the Age of Transparency: The New Vulnerability of the Individual. Social Science Computer Review 26:60-74CrossRefGoogle Scholar
  14. 14.
    Gruetser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-Aware Location Sensor Networks. Accessed 5 August 2008
  15. 15.
    Hohfeld WN (1913) Fundamental legal conceptions as applied to judicial reasoning. Yale Law Journal: 16-59Google Scholar
  16. 16.
    Hoofnagle CJ (2005) Privacy Self Regulation: A Decade of Disappointment. SSRN Electronic Library. Accessed 18 July 2008
  17. 17.
    IST Advisory Group (1999) Orientations for Workprogramme 2000 and beyond. ISTweb. Accessed 21 August 2008Google Scholar
  18. 18.
    IST Advisory Group (2002) Software technologies, embedded systems and distributed systems: A European strategy towards an Ambient Intelligent environment. ISTweb. Accessed 21 August 2008Google Scholar
  19. 19.
    IST Advisory Group (2002) Trust, dependability, security and privacy for IST in FP6. IST-web. Accessed 21 August 2008Google Scholar
  20. 20.
    IST Advisory Group (2003) Ambient Intelligence: From Vision to Reality. ISTweb. Accessed 16 July 2008Google Scholar
  21. 21.
    IST Advisory Group (2004) Experience and Application Research: Involving Users in the Development of Ambient Intelligence. ISTweb. Accessed 21 August 2008Google Scholar
  22. 22.
    IST Advisory Group (2006) ISTAG Report on Shaping Europe's Future Through ICT. IST-web. Accessed 21 August 2008Google Scholar
  23. 23.
    IST Advisory Group (2006) ISTAG Report on Orientations for Work Programme in FP7. ISTweb. Accessed 21 August 2008Google Scholar
  24. 24.
    Kosta E, Pitkänen O, Niemelä M, Kaasinen E (2008) Ethical-Legal Challenges in User-Centric AmI Services. Third International Conference on Internet and Web Applications and Services: 19-24Google Scholar
  25. 25.
    Korff D (2002) EC Study on Implementation of Data Protection Directive: Comparative Summary of National Laws. European Commission. Accessed 21 January 2008
  26. 26.
    Mason S with specialist contributors (2007) Electronic Evidence: Disclosure, Discovery and Admissibility. LexisNexis Butterworths, SuffolkGoogle Scholar
  27. 27.
    27. Pedersen DM (1997) Psychological Functions of Privacy. Journal of Environmental Psychology 17:147-156CrossRefGoogle Scholar
  28. 28.
    28. Perrig A, Stankovic J, Wagner D (2004) Security in Wireless Sensor Networks. Communications of the ACM 6:53-57CrossRefGoogle Scholar
  29. 29.
    Saraogi M (2005) Security in Wireless Sensor Networks.∼saraogi/594paper.pdf. Accessed 5 August 2008
  30. 30.
    30. Scherer J (ed) (2005) Telecommunication Laws in Europe. Tottel Publishing, West SussexGoogle Scholar
  31. 31.
    SERENITY Project. A1 Deliverable - A1.D3.1 - Initial Set of Security and Privacy Patterns at Organizational Level. EU-IST-IP 6th Framework Programme - SERENITY 27587.Google Scholar
  32. 32.
    SERENITY Project. A4 Deliverable - A4.D2.2 - Basic set of Information Collection Mechanisms for Run-Time S&D Monitoring. EU-IST-IP 6th Framework Programme - SERENITY 27587.Google Scholar
  33. 33.
    SERENITY Project. A5 Deliverable - A5.D2.3 - Patterns and Integration Schemes Languages. EU-IST-IP 6th Framework Programme - SERENITY 27587.Google Scholar
  34. 34.
    SERENITY Project. A7 Deliverable - A7.D1.1 - Scenario Selection and Definition. EU-IST-IP 6th Framework Programme - SERENITY 27587.Google Scholar
  35. 35.
    Solove DJ (2005) The New Vulnerability: Data Security and Personal Information. SSRN Electronic Library. Accessed 15 May 2008
  36. 36.
    36. Solove DJ, Rotenberg M, Schwartz PM (2006) Information Privacy Law. Aspen Publishers, New YorkGoogle Scholar
  37. 37.
    Spiekermann S (2005) Perceived Control: Scales for Privacy in Ubiquitous Computing. SSRN Electronic Library. Accessed 15 May 2008
  38. 38.
    Stankovic JA, Cao Q, Doan T, Fang L, He Z, Kiran R, Lin S, Son S, Stoleru R, Wood A (2005) Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges. Accessed 5 August 2008
  39. 39.
    von Wright GH (1951) Deontic logic. Mind:1-15Google Scholar
  40. 40.
    Wahlgren P (1992) Automation of Legal Reasoning: A Study on Artificial Intelligence. Kluwer Law and Taxation Publishers, DeventerGoogle Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  1. 1.IBBTLeuvenBelgium
  2. 2.IBBTLeuvenBelgium

Personalised recommendations