Skip to main content

Article 29 Working Party: Future of Privacy

  • Chapter
  • First Online:
Data Security Breaches and Privacy in Europe

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

This chapter reviews the recent opinion by the Article 29 Working Party on the Future of Privacy. In particular, the role that privacy enhancing technologies (often known as “PETS”) play in the context of information security and the accountability principle on which security breach notifications is based that will be introduced in the forthcoming Data Protection Regulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Art. 29 Working Party. “The future of privacy”, WP 168, at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2009/wp168_en.pdf, adopted 1 December 2011; Wong, R. “Data Protection: the future of privacy”, (2011) 27(1) CLSR 53–57. More details can be found in recital 110 of the proposed Data Protection Regulation available at http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm, dated 25 January 2012. These proposals are still tentative subject to approval at EU level and European Commission proposes a comprehensive reform of the data protection rules available at http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm, dated 25 January 2012.

  2. 2.

    Europa, Privacy Enhancing Technologies (PETs) available at http://europa.eu/rapid/press-release_MEMO-07-159_en.htm, dated 2 May 2007.

  3. 3.

    See European Commission. First report on the implementation of the Data Protection Directive at para. 4.3 available at http://eur-lex.europa.eu/LexUriServ/site/en/com/2003/com2003_0265en01.pdf, dated 15 May 2003.

  4. 4.

    Art. 29 Working Party Opinion., op. cit. n. 31 at para. 45.

  5. 5.

    See footnote 4.

  6. 6.

    Abel, W. and B. Schafer. The German Constitutional Court on the Right in Confidentiality and Integrity of Information Technology Systems—a case report on BVerfG, NJW 2008, 822 (2009) 6:1SCRIPTed106, http://www.law.ed.ac.uk/ahrc/script-ed/vol6-1/abel.asp.

  7. 7.

    ICO. Privacy by design: an overview of privacy enhancing technologies, available at http://www.ico.org.uk/for_organisations/data_protection/topic_guides/~/media/documents/pdb_report_html/PBD_PETS_PAPER.ashx, dated 26th November 2008 and ICO, Privacy by design available at http://www.ico.org.uk/news/current_topics/privacy_by_design_conference, last accessed 9th April 2013.

  8. 8.

    See footnote 7, at para. 52.

  9. 9.

    See footnote 7, at para. 56.

  10. 10.

    European Commission. Proposal for a European Regulation available at http://statewatch.org/news/2011/dec/eu-com-draft-dp-reg-inter-service-consultation.pdf, last accessed 4th January 2013.

  11. 11.

    See footnote 10.

  12. 12.

    Krontiris, I. Online privacy: towards informational self-determination on the internet available at http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=11061, dated February 2011.

  13. 13.

    For an in-depth study, see LSE. Study on the economic benefits of PETS, final report to the European Commission, available at

    http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_pets_16_07_10_en.pdf, dated July 2010.

  14. 14.

    See footnote 13.

  15. 15.

    Op. cit. n. 31.

  16. 16.

    See footnote 14 at p. 21.

  17. 17.

    A good starting point into the discussion on cloud computing is a collection of essays in S. Gutwirth (ed.) (et al.). Computers, privacy and data protection: an element of choice, 2011, pp. 345–457. See also ENISA, Cloud computing risk assessment, dated 20 November 2009 available at http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment and NIST definition of cloud computing at http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, dated September 2011 and NIST, Final version of NIST cloud computing definition published, dated 25 October 2011 available at http://www.nist.gov/itl/csd/cloud-102511.cfm. W.K. Hon, C. Millard and I. Walden ‘Who is responsible for “Personal Data” in Cloud Computing’ available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1783577 and W.K. Hon, C. Millard and I. Walden ‘Who is responsible for “Personal Data” in Cloud Computing?, Part 2’, available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1794130.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rebecca Wong .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Wong, R. (2013). Article 29 Working Party: Future of Privacy. In: Data Security Breaches and Privacy in Europe. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-5586-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5586-7_4

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5585-0

  • Online ISBN: 978-1-4471-5586-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics