Skip to main content

Data Protection Directive 95/46/EC

  • Chapter
  • First Online:
Data Security Breaches and Privacy in Europe

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Absract

This chapter will consider the background of the Data Protection Directive what it provides in the context of data security breaches. As data security breaches are covered under Art.17 of the Data Protection Directive, the provision will be considered in more detail with reference to recent examples involving data security breaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Cagnazzo, L., P. Taticchi., F. Fuiano, Impacts of ISO 9000 on business performances: a literature review at http://unipg.academia.edu/LucaCagnazzo/Papers/193302/Impacts_of_ISO_9000_on_Business_Performances_a_Literature_Review, last accessed 21 October 2011. ICO, (at http://www.27000.org/), last accessed 4th January 2013.

  2. 2.

    BBC news. Timeline: child benefits records loss available at http://news.bbc.co.uk/1/hi/7104368.stm, dated 25 June 2008; Leydon, J. Information security breaches quadrupled in 2007 available at http://www.theregister.co.uk/2008/01/02/data_breaches_skyrocket/, dated 2 January 2008.

  3. 3.

    See footnote 2.

  4. 4.

    ICO. Report data breaches or risk tougher sanctions, warns the ICO available at www.ico.gov.uk/~/media/documents/…/data_breaches_260110.ashx, dated 27 January 2010. See latest guidelines issued by the ICO on Data security breach management available at www.ico.gov.uk/…/data_protection/…/guidance_on_data_security_br…, dated July 2011. For a background into information security, see Moore, T., R. Clayton and R. Anderson. The economics of online crime available at http://www.sfu.ca/iccrc/content/econ.onlinecrime.pdf, last accessed 5 July 2013.

  5. 5.

    See footnote 4.

  6. 6.

    See Art. 2, para. 4 on “Security of processing”, Citizens Directive 2009/136/EC at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:337:0011:0036:En:PDF, last accessed December 2011 and Orrick, Data protection alert available at http://www.orrick.com/fileupload/2389.pdf; Outlaw News, Communication providers should log personal data security breaches monthly, Information Commissioner says available at http://www.out-law.com/en/articles/2011/december/communications-providers-should-log-personal-data-security-breaches-monthly-information-commissioner-says/, dated 12 December 2011.

  7. 7.

    Baker, L.B. and J. Finkle, Sony PlayStation suffers massive data breach available at http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426 dated 26 April 2011; Sony data breach: 100 m reasons to beef up security available at http://www.computerweekly.com/news/1280097348/Sony-data-breach-100m-reasons-to-beef-up-security, dated 3 May 2011; Guardian Technology Blog. Sony suffers second data breach with theft of 25m more user details available at http://www.guardian.co.uk/technology/blog/2011/may/03/sony-data-breach-online-entertainment, last accessed 19 December 2011.

  8. 8.

    See Chap. 6 on the Data Protection Regulation.

  9. 9.

    A.M. Matwyshyn (ed.), Harbouring data: information security, law, and the corporation, 2009, p. 229.

  10. 10.

    See footnote 9.

  11. 11.

    Zetter, K. “Reporting of information security breaches” In: A.M. Matwyshyn (ed.), Harbouring data: information security, law and the corporation, op. cit. n. 16, p. 51.

  12. 12.

    See footnote 11, at p. 53.

  13. 13.

    See footnote 11.

  14. 14.

    See footnote 11, at p. 61.

  15. 15.

    See footnote 11, at p. 62.

  16. 16.

    See footnote 11.

  17. 17.

    See Chap. 6 on the Data Protection Regulation.

  18. 18.

    See ICO. Report data breaches or risk tougher sanctions, warns the ICO, op. cit. n. 12.

  19. 19.

    ICO. 1000 data breaches reported to the ICO available at http://www.ico.gov.uk/~/media/documents/pressreleases/2010/1000_DATA_BREACHES280510.ashx, dated 28 May 2010 and ICO: Likely breaches of the DPA received between 6 April 2010 and 22 March 2011, by sector available at http://www.ico.gov.uk/about_us/how_we_comply/disclosure_log/~/media/documents/disclosure_log/IRQ0382403b.ashx, dated 15 April 2011 and ICO Report on the Annual findings of the Information Commissioner’s Office, Annual Track, 2011 available at http://www.ico.gov.uk/about_us/research/~/media/documents/library/Corporate/Research_and_reports/annual_track_2011_organisations.ashx, last accessed 9th February 2012 and AlertBoot. UK private sector breaches up 58 % YOY available at http://www.ico.gov.uk/about_us/research/~/media/documents/library/Corporate/Research_and_reports/annual_track_2011_organisations.ashx, dated 9 November 2011.

References

  1. Treaty on the European (2011) at http://eur-lex.europa.eu/en/treaties/dat/11992M/htm/11992M.html, Now replaced by the Lisbon Treaty (TFEU) at http://europa.eu/lisbon_treaty/index_en.htm, Accessed 21 Oct 2011

  2. European Commission (2011) Commission’s first report on the transposition of the Data Protection Directive at http://ec.europa.eu/justice/policies/privacy/lawreport/report_en.htm. Accessed Dec 2011

  3. ICO (2013) Information Security 7 http://www.ico.gov.uk/for_organisations/data_protection/the_guide/principle_7.aspx. Accessed 4 Jan 2013

  4. The Register (2011) ICO: NHS data security breaches are just “plain daft” available at http://www.theregister.co.uk/2011/10/06/nhs_data_security_breaches/. Accessed 6 Oct 2011

  5. Feisted A (2011) “Data security: breaches can result in huge costs” Financial Times, available at http://www.ft.com/cms/s/0/beac7484-04c8-11e1-b309-00144feabdc0.html#axzz1gn1UfhFn. Accessed 8 Nov 2011

  6. Leonhard W (2011) “What the latest data security breaches really mean” available at http://www.infoworld.com/t/data-security/what-the-latest-data-security-breaches-really-mean-239. Accessed 6 Jun 2011

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rebecca Wong .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Wong, R. (2013). Data Protection Directive 95/46/EC. In: Data Security Breaches and Privacy in Europe. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-5586-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5586-7_2

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5585-0

  • Online ISBN: 978-1-4471-5586-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics