{"title":"Assessing privacy criteria for drm using eu privacy legislation","authors":"Anja Becker, A. Arnab, Mercè Serra","doi":"10.1145/1456520.1456534","DOIUrl":null,"url":null,"abstract":"The main aim of this paper is to examine privacy protection legislations within the European Union (EU) and their implications for the deployment of Digital Rights Management (DRM) systems. For this purpose we note that there are two EU legislations of particular interest: Directive 95/46/EC and Directive 2002/58/EC. Based on these directives, we derive a list of elementary criteria for DRM systems and analyse the extent to which modern DRM systems may be built adhering to these requirements. In particular, we consider these implications in reference to a prospective deployment of an OMA DRM v2.0 system. Furthermore, we present seals for IT services and IT products that represent a way of standardizing privacy requirements for implementations.","PeriodicalId":124354,"journal":{"name":"ACM Digital Rights Management Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Digital Rights Management Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1456520.1456534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
The main aim of this paper is to examine privacy protection legislations within the European Union (EU) and their implications for the deployment of Digital Rights Management (DRM) systems. For this purpose we note that there are two EU legislations of particular interest: Directive 95/46/EC and Directive 2002/58/EC. Based on these directives, we derive a list of elementary criteria for DRM systems and analyse the extent to which modern DRM systems may be built adhering to these requirements. In particular, we consider these implications in reference to a prospective deployment of an OMA DRM v2.0 system. Furthermore, we present seals for IT services and IT products that represent a way of standardizing privacy requirements for implementations.