Abstract
Part II (Chaps. 5, 6 and 7) evaluated/assessed the adequacy of the legal frameworks in the US and the UK and proposed some of the necessary amendments to enhance these legal frameworks and to ensure that the right to privacy is preserved, in light of the intrusive capabilities of the four particular PITs addressed. In addition to the proposed legal solutions, a number of technical and/or design solutions were proposed for each PIT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Indeed, however, the threats to privacy posed by digital services and social networking websites should not be overlooked and are increasingly becoming worrisome.
- 2.
Sollie and Düwell 2009.
- 3.
See Ibid.
- 4.
For further discussion, see the Memorandum by Victoria Williams for the House of Lords Constitution Committee inquiry into the impact of surveillance and data collection upon the privacy of citizens, available at: http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/8051402.htm. Accessed 17 February 2014.
- 5.
See Article 29 Data Protection Working Party, WP 171, Opinion 2/2010 on online behavioural advertising, 22 June 2010.
- 6.
See, for further discussion, the Memorandum by Victoria Williams for the House of Lords Constitution Committee inquiry into the impact of surveillance and data collection upon the privacy of citizens, available at: http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/8051402.htm. Accessed 17 February 2014.
- 7.
Indeed, the OECD Secretariat supports a “global privacy dialogue” that is intended to revisit the 1980 OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. See the DHS Privacy Office Annual Report to Congress, July 2007–July 2008, p. 77.
- 8.
See Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11/4 draft.
- 9.
Ibid., Article 23.
Reference
Sollie P, Düwell M (eds) (2009) Evaluating new technologies: methodological problems for the ethical assessment of technology developments. Springer, New York
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 T.M.C. Asser Press and the author(s)
About this chapter
Cite this chapter
Klitou, D. (2014). New Privacy Threats, Old Legal Approaches: Conclusions of Part II. In: Privacy-Invading Technologies and Privacy by Design. Information Technology and Law Series, vol 25. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-026-8_8
Download citation
DOI: https://doi.org/10.1007/978-94-6265-026-8_8
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-025-1
Online ISBN: 978-94-6265-026-8
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)