Skip to main content

Western European Initiatives

  • Chapter
Handbook of Personal Data Protection
  • 124 Accesses

Abstract

Present Western European concepts on data protection are a direct result of experiences arising from World War II. The general tendencies of the former Fascist and Nazi governments to amass great amounts of personal details on both its citizens and its vanquished subjects, have led to a current sensitivity of Western Europeans to government and private entities maintaining personal information without the knowledge or consent of data subjects. To understand this unique concern, a brief recollection of the events before and during the Nazi era in Europe is required.

’If everybody minded their own business,’ said the Duchess in a hoarse growl, ’the world would go round a deal faster than it does.’

— Lewis Carroll, Alice’s Adventures in Wonderland

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jacques Delarue, The Gestapo, New York: Paragon House Publishers, 1987. p. 129.

    Google Scholar 

  2. Organization for Economic Cooperation and Development, Present Situation and Trends in Privacy Protection in the OECD Area. p. 6.

    Google Scholar 

  3. Transnational Data and Communications Report, April 1989, p. 25.

    Google Scholar 

  4. Ibid. p. 8.

    Google Scholar 

  5. Transborder Data and Communications Report, February 1990, p. 24.

    Google Scholar 

  6. Transnational Data and Communications Report, April 1990, pp. 25–6.

    Google Scholar 

  7. Transnational Data and Communications Report, February 1988, p. 25.

    Google Scholar 

  8. Transnational Data and Communications Report, November 1989, p. 1989.

    Google Scholar 

  9. Press and Information Office of the Federal Government, Bulletin: Data Protection in the Federal Republic of Germany, January 11, 1980, p. 5.

    Google Scholar 

  10. Angela Kolb, ’Data Protection in Eastern Germany,’ Transnational Data and Communications Report, May/June 1991, p. 34.

    Google Scholar 

  11. Hessian Data Protection Commissioner, 17th Annual Report, Wiesbaden: Hessischen Datenschutzbeauftragten, 1988.

    Google Scholar 

  12. Organization for Economic Cooperation and Development, Information Computer Communications Policy: Present Situation and Trends in Privacy Protection in the OECD Area. January 1989, Paris, p. 8.

    Google Scholar 

  13. (Kalaalit Nunaat is the official Inuit name for the self-governing territory of Greenland).

    Google Scholar 

  14. Larry Derfner, ’Data Peddling is Rife in State Offices,’ Jerusalem Post International Edition, 22 September 1990, page 5.

    Google Scholar 

  15. Asher Wallfish, ’Inadmissible Erosion of Freedom,’ The Jerusalem Post International Edition, June 29, 1991, p. 15.

    Google Scholar 

  16. Wayne Madsen, ’Effect of Transborder Data Flow Upon Information Security and Integrity,’ Information Age, Vol. 11, No. 3, July 1989, p. 136.

    Google Scholar 

  17. Cees J. Hamelink, Transnational Data Flows in the Information Age. Studentlitteratur AB, Chartwell-Bratt Ltd., Stockholm and Bromley, Kent, UK, 1984. p. 100.

    Google Scholar 

  18. Swedish Committee on the Vulnerability of Computer Systems (SARK). Report: Vulnerability of the Computerized Society, Government Printing Office, Stockholm, 1983.

    Google Scholar 

  19. Transnational Data and Communications Report, May 1990, pp. 24–5.

    Google Scholar 

  20. David Northmore, Freedom of Information Handbook, London: Bloomsbury, 1990, pp. 74–5.

    Google Scholar 

  21. Report on the Criminal Record and Information System, London: National Council for Civil Liberties, June 1991, p. 6.

    Google Scholar 

  22. Ibid. p. 1.

    Google Scholar 

  23. Ibid., p. 8.

    Google Scholar 

  24. Ibid., p. 1.

    Google Scholar 

  25. Ibid., pp. 76–7.

    Google Scholar 

  26. Nigel Burke, ’A Nation of Narks,’ The Spectator, September 17, 1990, p. 8.

    Google Scholar 

  27. Ibid., p. 8.

    Google Scholar 

  28. Report on the Criminal Record and Information System, p. 4.

    Google Scholar 

  29. Ibid., p. 2

    Google Scholar 

  30. Ibid.

    Google Scholar 

  31. Ibid., p. 2.

    Google Scholar 

  32. Northmore, p. 74.

    Google Scholar 

  33. Ibid., p. 36.

    Google Scholar 

  34. Benjamin Wright, ’Computer Mediated Communication and the Law,’ in The Matrix: Computer Networks and Conferencing Systems Worldwide, ed. John S. Quarterman. Bedford, Massachusetts: Digital Press, 1990. p. 651.

    Google Scholar 

  35. What Are Your Views? Monitoring and Assessment of the Data Protection Act 1984, Wilmslow, UK: Office of the Data Protection Registrar, May 1988, p. 66.

    Google Scholar 

Download references

Authors

Copyright information

© 1992 Palgrave Macmillan, a division of Macmillan Publishers Limited

About this chapter

Cite this chapter

Madsen, W. (1992). Western European Initiatives. In: Handbook of Personal Data Protection. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12806-8_3

Download citation

Publish with us

Policies and ethics