Skip to main content

New Privacy Threats, Old Legal Approaches: Conclusions of Part II

  • Chapter
  • First Online:
Privacy-Invading Technologies and Privacy by Design

Part of the book series: Information Technology and Law Series ((ITLS,volume 25))

  • 2315 Accesses

Abstract

Part II (Chaps. 5, 6 and 7) evaluated/assessed the adequacy of the legal frameworks in the US and the UK and proposed some of the necessary amendments to enhance these legal frameworks and to ensure that the right to privacy is preserved, in light of the intrusive capabilities of the four particular PITs addressed. In addition to the proposed legal solutions, a number of technical and/or design solutions were proposed for each PIT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Indeed, however, the threats to privacy posed by digital services and social networking websites should not be overlooked and are increasingly becoming worrisome.

  2. 2.

    Sollie and Düwell 2009.

  3. 3.

    See Ibid.

  4. 4.

    For further discussion, see the Memorandum by Victoria Williams for the House of Lords Constitution Committee inquiry into the impact of surveillance and data collection upon the privacy of citizens, available at: http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/8051402.htm. Accessed 17 February 2014.

  5. 5.

    See Article 29 Data Protection Working Party, WP 171, Opinion 2/2010 on online behavioural advertising, 22 June 2010.

  6. 6.

    See, for further discussion, the Memorandum by Victoria Williams for the House of Lords Constitution Committee inquiry into the impact of surveillance and data collection upon the privacy of citizens, available at: http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/8051402.htm. Accessed 17 February 2014.

  7. 7.

    Indeed, the OECD Secretariat supports a “global privacy dialogue” that is intended to revisit the 1980 OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. See the DHS Privacy Office Annual Report to Congress, July 2007–July 2008, p. 77.

  8. 8.

    See Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11/4 draft.

  9. 9.

    Ibid., Article 23.

Reference

  • Sollie P, Düwell M (eds) (2009) Evaluating new technologies: methodological problems for the ethical assessment of technology developments. Springer, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Demetrius Klitou .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 T.M.C. Asser Press and the author(s)

About this chapter

Cite this chapter

Klitou, D. (2014). New Privacy Threats, Old Legal Approaches: Conclusions of Part II. In: Privacy-Invading Technologies and Privacy by Design. Information Technology and Law Series, vol 25. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-026-8_8

Download citation

Publish with us

Policies and ethics

Societies and partnerships