Advertisement

Privacy and Data Protection in Electronic Communications

  • Lilian Mitrou
  • Konstantinos Moulinos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)

Abstract

The digitalisation of networks thus offering of new services may entail inherent risks to privacy of the user, as well as possible inhibitions on his/her freedom of communication. This paper addresses issues of privacy and fair processing of personal data in electronic communications. It focuses on the analysis of the Directive 2002/58/EC “on privacy and electronic communications”. Emphasis is given on the provisions concerning traffic data and on the prohibition of the use of cookies as an expression of confidentiality and protection of anonymity. This paper further refers with the intention to introduce technology neutral rules and argues that this objective is a contradiction per se as each regulator, when setting out to regulate, still has a given, particular technology in mind. We argue that protection of privacy should be achieved through rather than despite technology.

Keywords

Personal Data Data Protection Traffic Data Electronic Communication Privacy Risk 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Albert, J.: Privacy on the Internet: Protecting and Empowering Users, EC Conference, Data Protection Conference on the Implementation of 95/46/EC. In: Workshop 2: Developments in the Information Society: Internet and Privacy Enhancing Technologies (2002)Google Scholar
  2. 2.
    Broughon, J., Eft, K.: Security and privacy risks of doing business on the Web, http://istpub.berkeley.edu:4201/bcc/Summer2000/
  3. 3.
    Data Protection Working Party. In: Privacy on the Internet – An integrated EU Approach to online Data Protection (2000) Google Scholar
  4. 4.
    Dinant, J.M.: The arrival of the new Internet network numbering system and its major risks to data protection. In: 23rd Int. Conference on Privacy and Personal Data Protection (2001) Google Scholar
  5. 5.
    Flaherty, D.: Privacy Impact Assessments: an essential tool for data protection. In: 22nd International Conference on Privacy and Personal Data Protection, Venice (2000) Google Scholar
  6. 6.
    Gritzalis, D., Moulinos, K., Kostis, K.: A Privacy-Enhancing e-business Model Based on Infomediaries. In: Workshop on Mathematical Methods, Models, and Architectures for Computer Networks Security, St. Petersburg, Russia (2001)Google Scholar
  7. 7.
    OECD. Guidelines for the Security of Information Systems and Networks, Paris (2002)Google Scholar
  8. 8.
    Privacy International. Working Paper on Data Retention presented at EU Forum on Cybercrime (2001), http://www.privacyinternational.org/issues/cybercrime/eu
  9. 9.
    Reidenberg, J.: Lex Informatica: The Formulation of Information Policy Rules Through Technology. Texas Law Review 86(3) (1998)Google Scholar
  10. 10.
    Roßnagel, A., Pfitzmann, A., Garstka, H.: Modernisierung des Datenschutzrechts. In: Gutachten im Auftrag des Bundesministerium des Innern, Berlin (2001)Google Scholar
  11. 11.
    Schwartz, P.: Privacy and Democracy in Cyberspace. Vanderbilt Law Rev. 52 (1609)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Lilian Mitrou
    • 1
  • Konstantinos Moulinos
    • 2
  1. 1.Department of Information and Communication SystemsUniversity of the Aegean KarlovassiSamosGreece
  2. 2.Hellenic Data Protection AuthorityAthensGreece

Personalised recommendations