Information Technology and Civil Liberties

  • James Michael
  • Yves Poullet
  • Wilhelm Steinmüller


“CIVIL liberties”, in the traditional sense, are those human activities which should be as free as possible from state control. The expression “civil rights” has two distinct meanings: in civil law countries with a Roman law tradition, the term “droit civil” means ordinary rights in private law, such as the right to enforce a contract in common law countries. The term is more closely related to “civil liberties” in meaning legally enforceable rights, usually against the state. This distinction, very roughly derived from the legal philosophy of Hohfeld, has partic­ular application to information.


Data Protection Civil Liberty Telecommunication Service Security Authority Integrate Service Digital Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Bull, H.P. [ 1984 ], Datenschutz oder die Angst vor dem Computer, München: Verlag C.H. Beck.Google Scholar
  2. [2]
    Burkert, H. [ 1982 ], “Institutions of Data Protection: An Attempt at a functional Explanation of European National Data Protection Laws”, Computer Law Journal, 3, 167–188.Google Scholar
  3. [3]
    Burkert, H. [ 1985 ], Datenschutz und Informations—und Kommunikationstechnik: Eine Problemskizze, Bonn: GMD Publications.Google Scholar
  4. [4]
    Burkert, H. [ 1988 ], “The Law of Information Technology—Basic concepts”, Datenschutz und Datensicherung, 8, 383–387.Google Scholar
  5. [5]
    Commission Nationale Informatique et Libertés (CNIL), [ 1988 ], Dix ans d’Informatique et Libertés, Paris: La Documentation Française.Google Scholar
  6. [6]
    CNIL, Rapports d’activité de la Commission Nationale de l’Informatique et des libertés, Paris: La Documentation Française (each year, since 1980 ).Google Scholar
  7. [7]
    Froystad, D. [ 1984 ], Data Protection in Practice: Identifying and Matching Element, Oslo: Complex.Google Scholar
  8. [8]
    Holvast, J. [1986], Op weg naar een risicoloze maatschappij?; Den Haag: Academic Service.Google Scholar
  9. [9]
    Informationsgesellschaft oder Überwachungsstaat,[1984], Symposium der Hessischen Landesregierung, Wiesbaden: Starck’sche Druckereigesellschaft m.b.H.Google Scholar
  10. [10]
    Perry, P. [ 1987 ], “Data Protection Update”, Computer Law and Practice, 4, 39–40.Google Scholar
  11. [11]
    Poullet, Y. [ 1987 ], “Les concepts fondamentaux de la protection des données et les nouvelles technologies de l’information”, Droit de l’Informatique, 4, 22–227.Google Scholar
  12. [12]
    Pounder, C.N.M., Kosten, M., Papadopoulos, S., Richard, A, [1987], Managing Data Protection,London CIPFA—C.C.S.Google Scholar
  13. [13]
    Rankin, T.M. [ 1986 ], “Business Secrets Across International Borders: One Aspect of the TDF Debate”, Computer Law and Practice, 2 /4, 106–118.Google Scholar
  14. [14]
    Savage, N. and Edwards, C. [ 1984 ], The Data Protection Act 1984, The Journal of Business Law, 320–325.Google Scholar
  15. [15]
    Schneider, J. [1984], “Datenschutz und Neue Medien”, N.J.W., 8, 390–398.Google Scholar
  16. [16]
    Selmer, K. [ 1988 ], “Data Protection Policy Trends”, T.D.R., 10, 19–25.Google Scholar
  17. [17]
    Steinmüller, W. [ 1983 ], “Information Technology and Information Law”, Information Age, 5, 39–46.Google Scholar
  18. [18]
    Steinmüller, W. [ 1984 ], “Consequences of Information Technology”, Information Age, 6, 163–177.Google Scholar
  19. [19]
    Tätigkeitsbericht des Bundesbeauftragten für den Datenschutz,Bonn: Bundestags-Drucksache (each year, since 1978).Google Scholar

Copyright information

© Springer Science+Business Media New York 1990

Authors and Affiliations

  • James Michael
  • Yves Poullet
  • Wilhelm Steinmüller

There are no affiliations available

Personalised recommendations