Skip to main content

Introduction to Enforcing Privacy

  • Chapter
  • First Online:
Enforcing Privacy

Part of the book series: Law, Governance and Technology Series ((ISDP,volume 25))

  • 1518 Accesses

Abstract

This chapter introduces the book. It delineates what is meant by enforcing privacy. It makes the point that enforcement can contribute to the legitimacy of privacy rules. Regulators endowed with legitimate authority to define and impose norms can easily lose that authority if they have no effective way of enforcing these rules. We argue that regulators and privacy advocates should not circumscribe privacy to equate with only data protection. Other types of privacy deserve protection and enforcement too. While this book is primarily concerned with data protection, many of the measures discussed in these pages are applicable to the enforcement of all types of privacy. Enforcement typically means the activity of a regulator to ensure that third parties comply with a law or regulation or code. But we and our co-authors view privacy enforcement as an activity that goes beyond regulatory enforcement. Privacy advocates and members of the public play or can play an important role in enforcing privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Linkomies, Laura, and Stewart Dresner, “Multinationals face increasing pressure from DPAs. A Belgian court supported the Belgian DPA’s record breaking 250,000 Euros per day fine on Facebook”, Privacy Laws & Business, Issue 138, 2015, pp. 1–4.

  2. 2.

    See Cadiot, Sarah, and Laura De Boel, “Safe Harbor invalid: What to expect after the ruling?”, Privacy Laws & Business, Issue 137, 2015, pp. 1, 3.

  3. 3.

    See Soós, Andrea Klára, “ECJ clarifies meaning of territorial scope in DP Directive”, Privacy Laws & Business, Issue 137, 2015, pp. 1, 5.

  4. 4.

    For an overview of recent proposals for modernising information privacy law in the USA, the European Union, Australia and New Zealand, see Gunasekara, Gehan, “Paddling in unison or just paddling? International trends in reforming information privacy law”, International Journal of Law and Information Technology, 2013, pp. 1–37. Also, on the matter of accountability in Australia, the United States (e.g., Title V, Gramm-Leach-Bliley Act of 1999) and Canada (e.g., Sch. 1, Principle 1, Personal Information Protection and Electronic Documents Act (PIPEDA ), 2000), see Crompton, Malcolm, Christine Cowper and Christopher Jefferis, “The Australian Dodo Case: An Insight for Data Protection Regulation ”, BNA World Data Protection Report, Vol. 9, No. 1, 2009, pp. 5–8.

  5. 5.

    Morgan, Bronwen, and Karen Yeung, An introduction to Law and Regulation , Cambridge University Press, 2007, p. 10.

  6. 6.

    Reed, Chris, “Cloud Governance: The Way Forward” in Christopher Millard (ed.), Cloud Computing Law, Oxford University Press, 2013, p. 374.

  7. 7.

    See De Hert, Paul and Vagelis Papakonstantinou, “The EDPS as a Unique Stakeholder in the European Data Protection Landscape, Fulfilling the Explicit and Non-explicit Expectations”, in Hielke Hijmans and Herke Kranenborg (eds.), Data Protection Anno 2014: How to Restore Trust ? Contributions in honour of Peter Hustinx , European Data Protection Supervisor (2004–2014), Intersentia, 2014, pp. 237–252. See also “EDPS aims to be proactive and focus on external relations”, Privacy Laws & Business, Issue 133, 2015, pp. 1–4.

  8. 8.

    Gellert, Raphaël, and Serge Gutwirth, “The legal construction of privacy and data protection”, Computer Law & Security Review, Vol. 29, 2013, pp. 522–530; González Fuster, Gloria, The Emergence of Personal Data Protection as a Fundamental Right of the EU, Springer, 2014; Lynskey, Orla, “Deconstructing Data Protection: The ‘Added- Value’ of a Right to Data Protection in the EU Legal Order”, International and Comparative Law Quarterly, Vol. 63, 2014, pp. 569–597.

  9. 9.

    Kuner, Chris, Fred H. Cate, Christopher Millard and Dan J. B. Svantesson, “Taking Stock after Four Years”, International Data Privacy Law, Vol. 4, No. 2, 2014, pp. 87–88. See also Zalnieriute, Monika, “An international constitutional moment for data privacy in the times of mass-surveillance ”, International Journal of Law and Information Technology, Vol. 23, 2015, pp. 99–133.

  10. 10.

    Clarke , Roger, “What’s “Privacy”?.” Version of 7 August 2006. http://www.rogerclarke.com/DV/Privacy.html. Finn, Rachel, David Wright and Michael Friedewald, “Seven Types of Privacy ”, in Serge Gutwirth, Yves Poullet et al. (eds.), European data protection: coming of age?, Springer, Dordrecht, 2013.

  11. 11.

    Wright, David, and Paul De Hert (eds.), Privacy Impact Assessment , Springer, Dordrecht, 2012.

  12. 12.

    Reed, Chris, “Cloud Governance: The Way Forward”, in Christopher Millard (ed.), Cloud Computing Law, Oxford University Press, 2013, p. 362.

  13. 13.

    “The most obvious reason why this should be so is that the Internet is global in reach, and thus cuts across the hierarchical structures of national law.” Reed, ibid., p. 365.

  14. 14.

    Ibid., p. 374.

  15. 15.

    Ibid.

  16. 16.

    Morgan and Yeung, op. cit., p. 101.

References

  • Clarke, Roger, “What’s “Privacy”?.” Version of 7 August 2006. http://www.rogerclarke.com/DV/Privacy.html.

  • Crompton, Malcolm, Christine Cowper and Christopher Jefferis, “The Australian Dodo Case: An Insight for Data Protection Regulation”, BNA World Data Protection Report, Vol. 9, No. 1, 2009, pp. 5–8.

    Google Scholar 

  • De Hert, Paul, and Vagelis Papakonstantinou, “The EDPS as a Unique Stakeholder in the European Data Protection Landscape, Fulfilling the Explicit and Non-explicit Expectations”, in Hielke Hijmans and Herke Kranenborg (eds.), Data Protection Anno 2014: How to Restore Trust? Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004–2014), Intersentia, 2014, pp. 237–252.

    Google Scholar 

  • Finn, Rachel, David Wright and Michael Friedewald, “Seven Types of Privacy”, in Serge Gutwirth, Yves Poullet et al. (eds.), European data protection: coming of age?, Springer, Dordrecht, 2013.

    Google Scholar 

  • Gellert, Raphaël, and Serge Gutwirth, “The legal construction of privacy and data protection”, Computer Law & Security Review, Vol. 29, 2013, pp. 522–530.

    Article  Google Scholar 

  • González Fuster, Gloria, The Emergence of Personal Data Protection as a Fundamental Right of the EU, Springer, 2014.

    Google Scholar 

  • Gunasekara, Gehan, “Paddling in unison or just paddling? International trends in reforming information privacy law”, International Journal of Law and Information Technology, 2013, pp. 1–37.

    Google Scholar 

  • Hijmans, Hielke, and Herke Kranenborg (eds.), Data Protection Anno 2014: How to Restore Trust? Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004–2014), Intersentia, 2014, pp. 237–252.

    Google Scholar 

  • Kuner, Chris, Fred H. Cate, Christopher Millard, and Dan J. B. Svantesson, “Taking Stock after Four Years”, International Data Privacy Law, Vol. 4, No. 2, 2014, pp. 87–88.

    Article  Google Scholar 

  • Lynskey, Orla, “Deconstructing Data Protection: The ‘Added- Value’ of a Right to Data Protection in the EU Legal Order”, International and Comparative Law Quarterly, Vol. 63, 2014, pp. 569–597.

    Article  Google Scholar 

  • Privacy Laws & Business, “EDPS aims to be proactive and focus on external relations”, Issue 133, 2015, pp. 1–4.

    Google Scholar 

  • Reed, Chris, “Cloud Governance: The Way Forward”, in Christopher Millard (ed.), Cloud Computing Law, Oxford University Press, 2013.

    Google Scholar 

  • Wright, David, and Paul De Hert (eds.), Privacy Impact Assessment, Springer, Dordrecht, 2012.

    Google Scholar 

  • Zalnieriute, Monika, “An international constitutional moment for data privacy in the times of mass-surveillance”, International Journal of Law and Information Technology, Vol. 23, 2015, pp. 99–133.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Wright .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Wright, D., De Hert, P. (2016). Introduction to Enforcing Privacy. In: Wright, D., De Hert, P. (eds) Enforcing Privacy. Law, Governance and Technology Series(), vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-25047-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25047-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25045-8

  • Online ISBN: 978-3-319-25047-2

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics