首页 > 最新文献

Information Privacy Law eJournal最新文献

英文 中文
Comments on 'A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers' 对“FTC工作人员关于在快速变化的时代保护消费者隐私的初步报告:为企业和政策制定者提供的建议框架”的评论
Pub Date : 2011-01-19 DOI: 10.2139/ssrn.1743695
Avi Goldfarb, Catherine Tucker
These comments are prepared with the aim of clarifying the contribution, insights, and context of the academic research we have done in the area of digital privacy.
这些评论的目的是澄清我们在数字隐私领域所做的学术研究的贡献、见解和背景。
{"title":"Comments on 'A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers'","authors":"Avi Goldfarb, Catherine Tucker","doi":"10.2139/ssrn.1743695","DOIUrl":"https://doi.org/10.2139/ssrn.1743695","url":null,"abstract":"These comments are prepared with the aim of clarifying the contribution, insights, and context of the academic research we have done in the area of digital privacy.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127906917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
The Federal Trade Commission and Privacy: Defining Enforcement and Encouraging the Adoption of Best Practices - Version 2.0 联邦贸易委员会与隐私:定义执行和鼓励采用最佳实践- 2.0版
Pub Date : 2010-12-31 DOI: 10.2139/SSRN.1733217
A. Serwin
This article is Version 2.0 of this working paper and it examines the history of privacy enforcement by the Federal Trade Commission, including the FTC’s jurisdiction under Section 5, and its privacy enforcement matters, as well as the FTC's recently issued report, "Protecting Consumer Privacy in an Era of Rapid Change: A proposed Framework for Businesses and Policymakers", in which the FTC examines past enforcement models, noting their failings. In light of the FTC’s examination of past enforcement models, this article then analyzes these models, including the accountability-centric model that has previously been utilized in the United States, as well as the FTC’s proposed solution to the privacy problems of the Web 2.0 World--the adoption of best practices, including a "privacy by design" framework. The article then argues that the method to achieve the FTC’s goal of voluntary adoption of best practices is to focus on proportional protection for data based upon the sensitivity of the data in question, and to create a "safe harbor" from enforcement for businesses that choose to adopt the framework. This proposed framework could be linked in a meaningful way to existing EU processes, such as Binding Corporate Rules or the existing EU Safe Harbor program. By combining these elements, the FTC can achieve meaningful and focused self-regulation and provide appropriate protection to consumers, while giving business an incentive to adopt best-practices, and also increase the level of international cooperation regarding privacy.
本文是本工作文件的2.0版,它考察了联邦贸易委员会隐私执法的历史,包括联邦贸易委员会在第5条下的管辖权,及其隐私执法事项,以及联邦贸易委员会最近发布的报告,“在快速变化的时代保护消费者隐私:为企业和政策制定者提出的框架”,其中联邦贸易委员会考察了过去的执法模式,指出了它们的缺陷。根据FTC对过去执法模式的考察,本文随后分析了这些模式,包括之前在美国使用的以问责制为中心的模式,以及FTC针对Web 2.0世界的隐私问题提出的解决方案——采用最佳实践,包括“设计隐私”框架。然后,文章认为,实现联邦贸易委员会自愿采用最佳实践的目标的方法是,根据相关数据的敏感性,重点关注对数据的比例保护,并为选择采用该框架的企业创建一个执法的“安全港”。这个提议的框架可以以一种有意义的方式与现有的欧盟程序联系起来,例如“约束性公司规则”或现有的欧盟安全港计划。通过结合这些要素,联邦贸易委员会可以实现有意义和重点的自我监管,并为消费者提供适当的保护,同时激励企业采用最佳做法,并提高有关隐私的国际合作水平。
{"title":"The Federal Trade Commission and Privacy: Defining Enforcement and Encouraging the Adoption of Best Practices - Version 2.0","authors":"A. Serwin","doi":"10.2139/SSRN.1733217","DOIUrl":"https://doi.org/10.2139/SSRN.1733217","url":null,"abstract":"This article is Version 2.0 of this working paper and it examines the history of privacy enforcement by the Federal Trade Commission, including the FTC’s jurisdiction under Section 5, and its privacy enforcement matters, as well as the FTC's recently issued report, \"Protecting Consumer Privacy in an Era of Rapid Change: A proposed Framework for Businesses and Policymakers\", in which the FTC examines past enforcement models, noting their failings. In light of the FTC’s examination of past enforcement models, this article then analyzes these models, including the accountability-centric model that has previously been utilized in the United States, as well as the FTC’s proposed solution to the privacy problems of the Web 2.0 World--the adoption of best practices, including a \"privacy by design\" framework. The article then argues that the method to achieve the FTC’s goal of voluntary adoption of best practices is to focus on proportional protection for data based upon the sensitivity of the data in question, and to create a \"safe harbor\" from enforcement for businesses that choose to adopt the framework. This proposed framework could be linked in a meaningful way to existing EU processes, such as Binding Corporate Rules or the existing EU Safe Harbor program. By combining these elements, the FTC can achieve meaningful and focused self-regulation and provide appropriate protection to consumers, while giving business an incentive to adopt best-practices, and also increase the level of international cooperation regarding privacy.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying the Electronic Communications Privacy Act in the Workplace: Struggling to Keep Pace with Paradigm Shifts in Technology 在工作场所应用电子通信隐私法:努力跟上技术范式转变的步伐
Pub Date : 2010-12-18 DOI: 10.2139/SSRN.1728197
R. Sprague
What are the legal boundaries of an employee’s privacy in this interconnected, electronic-communication age, one in which thoughts and ideas that would have been spoken personally and privately in ages past are now instantly sent to friends and family via computer? This paper analyzes employee privacy rights in light of modern work-related monitoring and surveillance technologies and practices and the possible application of the Electronic Communications Privacy Act (ECPA) to those monitoring practices. The analysis in this paper demonstrates that employees have minimal work-related privacy rights. While the ECPA may provide some privacy protections for employees, due to rapid changes in technology, the extent of privacy protections are unclear and in flux. Until the ECPA can be modernized to take into account twenty-first century technologies, there will be no clear boundaries for employee privacy.
在这个相互联系的电子通讯时代,员工的隐私在法律上的界限是什么?在这个时代,过去个人和私下谈论的想法和想法,现在可以通过电脑立即发送给朋友和家人。本文从现代与工作相关的监控技术和实践出发,分析了雇员的隐私权,以及《电子通信隐私法》(Electronic Communications privacy Act, ECPA)在这些监控实践中的可能应用。本文的分析表明,员工的工作隐私权利是最小的。虽然ECPA可以为员工提供一些隐私保护,但由于技术的快速变化,隐私保护的范围并不明确且不断变化。除非ECPA能够现代化,以考虑到21世纪的技术,否则员工隐私将没有明确的界限。
{"title":"Applying the Electronic Communications Privacy Act in the Workplace: Struggling to Keep Pace with Paradigm Shifts in Technology","authors":"R. Sprague","doi":"10.2139/SSRN.1728197","DOIUrl":"https://doi.org/10.2139/SSRN.1728197","url":null,"abstract":"What are the legal boundaries of an employee’s privacy in this interconnected, electronic-communication age, one in which thoughts and ideas that would have been spoken personally and privately in ages past are now instantly sent to friends and family via computer? This paper analyzes employee privacy rights in light of modern work-related monitoring and surveillance technologies and practices and the possible application of the Electronic Communications Privacy Act (ECPA) to those monitoring practices. The analysis in this paper demonstrates that employees have minimal work-related privacy rights. While the ECPA may provide some privacy protections for employees, due to rapid changes in technology, the extent of privacy protections are unclear and in flux. Until the ECPA can be modernized to take into account twenty-first century technologies, there will be no clear boundaries for employee privacy.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133799127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A informação disponível como pressuposto tácito da recuperação na ciência da informação moderna (Available Information as a Tacit Precondition of Retrieval in Modern Information Science) 在现代信息科学中,可用信息作为检索的默示前提
Pub Date : 2010-09-29 DOI: 10.18617/liinc.v6i2.357
Miguel Said Vieira
Resumo Identifica como objetivo da ciencia da informacao — a partir de BUSH — sanar a explosao informacional por meio da recuperacao da informacao disponivel; argumenta que o campo, embora venha problematizando a significacao dessa informacao, ainda coloca pouca enfase nos processos (exemplificados pela propriedade intelectual) que pre-determinam as informacoes disponiveis em um sistema. Sugere que a concepcao de ecologia informacional (SARACEVIC) pode ser relevante para recolocar a questao do acesso ao conhecimento, mas com ressalvas; e que nesse sentido o ambientalismo informacional (BOYLE) e os estudos sobre bens comuns intelectuais sao caminhos importantes para estudo. Palavras-chave acesso ao conhecimento; informacao disponivel; propriedade intelectual; ambientalismo informacional; bens comuns intelectuais Abstract The article identifies as an objective of information science – since BUSH – to remedy the informational explosion through the retrieval of available information; argues that although the field has been questioning the meaningfulness of this information, it still places little emphasis on the processes (such as intellectual property) that predetermine the information available in a system. It suggests that the conception of informational ecology (SARACEVIC) can be relevant to restate the issue of access to knowledge, but with reservations; and that, in that sense, informational environmentalism (BOYLE) and studies on intellectual commons are important research pathways. Keywords access to knowledge; available information; intellectual property; informational environmentalism; intellectual commons.
摘要确定了信息科学的目标——从布什开始——通过恢复可用的信息来治愈信息爆炸;他认为,尽管该领域一直在质疑这些信息的意义,但它仍然很少强调预先决定系统中可用信息的过程(以知识产权为例)。建议信息生态学的概念(SARACEVIC)可能与重新提出获取知识的问题有关,但有条件;从这个意义上说,信息环境主义(博伊尔)和知识公地研究是重要的研究途径。关键词知识获取;对于防护服;知识产权;环保信息;《知识公地摘要》这篇文章自布什以来被确定为信息科学的一个目标,即通过检索现有信息来纠正信息爆炸;他认为,尽管该领域对这一信息的意义提出了质疑,但它仍然很少强调预先决定系统中可获得的信息的程序(如知识产权)。它建议,信息生态学的概念(SARACEVIC)可能与保留获取知识的问题有关,但有保留;在这方面,信息环境主义(BOYLE)和知识共享研究是重要的研究途径。关键词获取知识;可用的信息;知识产权;信息environmentalism;知识共享许可协议。
{"title":"A informação disponível como pressuposto tácito da recuperação na ciência da informação moderna (Available Information as a Tacit Precondition of Retrieval in Modern Information Science)","authors":"Miguel Said Vieira","doi":"10.18617/liinc.v6i2.357","DOIUrl":"https://doi.org/10.18617/liinc.v6i2.357","url":null,"abstract":"Resumo Identifica como objetivo da ciencia da informacao — a partir de BUSH — sanar a explosao informacional por meio da recuperacao da informacao disponivel; argumenta que o campo, embora venha problematizando a significacao dessa informacao, ainda coloca pouca enfase nos processos (exemplificados pela propriedade intelectual) que pre-determinam as informacoes disponiveis em um sistema. Sugere que a concepcao de ecologia informacional (SARACEVIC) pode ser relevante para recolocar a questao do acesso ao conhecimento, mas com ressalvas; e que nesse sentido o ambientalismo informacional (BOYLE) e os estudos sobre bens comuns intelectuais sao caminhos importantes para estudo. Palavras-chave acesso ao conhecimento; informacao disponivel; propriedade intelectual; ambientalismo informacional; bens comuns intelectuais Abstract The article identifies as an objective of information science – since BUSH – to remedy the informational explosion through the retrieval of available information; argues that although the field has been questioning the meaningfulness of this information, it still places little emphasis on the processes (such as intellectual property) that predetermine the information available in a system. It suggests that the conception of informational ecology (SARACEVIC) can be relevant to restate the issue of access to knowledge, but with reservations; and that, in that sense, informational environmentalism (BOYLE) and studies on intellectual commons are important research pathways. Keywords access to knowledge; available information; intellectual property; informational environmentalism; intellectual commons.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Scalable Approach to Data Tokenization 一种新的可扩展的数据标记方法
Pub Date : 2010-06-19 DOI: 10.2139/ssrn.1627284
Ulf T. Mattsson
This is a new approach to tokenize data which eliminates challenges associated with standard centralized tokenization. Particularly in high volume operations, the usual way of generating tokens is prone to issues that impact the availability and performance of the data. From a security standpoint, it is critical to address the issue of collisions caused when tokenization solutions assign the same token to two separate pieces of data. This next generation tokenization solution addresses all of these issues. System performance, availability and scaling are enhanced, numeric and alpha tokens are generated to protect a wide range of high-risk data, key management is greatly simplified, and collisions are eliminated. This new approach has the potential to change where tokenization can be used.
这是一种标记数据的新方法,它消除了与标准集中式标记化相关的挑战。特别是在大容量操作中,生成令牌的常用方法容易出现影响数据可用性和性能的问题。从安全的角度来看,当令牌化解决方案将相同的令牌分配给两个独立的数据片段时,解决冲突问题是至关重要的。下一代标记化解决方案解决了所有这些问题。增强了系统性能、可用性和可扩展性,生成了数字和alpha令牌来保护大范围的高风险数据,大大简化了密钥管理,并消除了冲突。这种新方法有可能改变标记化的使用范围。
{"title":"A New Scalable Approach to Data Tokenization","authors":"Ulf T. Mattsson","doi":"10.2139/ssrn.1627284","DOIUrl":"https://doi.org/10.2139/ssrn.1627284","url":null,"abstract":"This is a new approach to tokenize data which eliminates challenges associated with standard centralized tokenization. Particularly in high volume operations, the usual way of generating tokens is prone to issues that impact the availability and performance of the data. From a security standpoint, it is critical to address the issue of collisions caused when tokenization solutions assign the same token to two separate pieces of data. This next generation tokenization solution addresses all of these issues. System performance, availability and scaling are enhanced, numeric and alpha tokens are generated to protect a wide range of high-risk data, key management is greatly simplified, and collisions are eliminated. This new approach has the potential to change where tokenization can be used.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129939908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Legality of Deep Packet Inspection 深度包检测的合法性
Pub Date : 2010-06-17 DOI: 10.2139/ssrn.1628024
A. Daly
Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.
深度数据包检测是一种能够检查通过互联网发送的信息包内容的技术。互联网最初是使用“端到端连接”作为其设计的一部分而建立的,允许网络节点向网络的所有其他节点发送数据包,而不需要中间的网络元素来维护有关传输的状态信息。就这样,互联网被创建为一个“哑”网络,“智能”设备(如个人电脑)位于网络的末端或“最后一英里”。哑网络不会干扰应用程序的操作,也不会对应用程序的需求敏感,因此它对通过它发送的所有信息(或多或少)都是平等的。然而,深度包检查允许在网络上不是端点的地方检查包。在实践中,这允许诸如互联网服务提供商(isp)或政府之类的实体观察正在发送的信息的内容,甚至可能操纵它。事实上,深度数据包检测的存在和实现可能会深刻地挑战互联网的平等主义和开放特征。本文将首先从技术角度阐述什么是深度包检测以及它是如何工作的,然后再研究它是如何被政府和公司在实践中使用的。使用深度数据包检查已经产生了法律问题,这涉及到基本权利(尤其是互联网用户),如言论自由和隐私,以及更多的经济问题,如竞争和版权。将考虑这些问题,并对深度包检测的使用是否符合法律进行评估。在欧洲和北美的司法管辖区,深度数据包检测的使用将成为重点,在这些地区,深度数据包检测已经引发了辩论,特别是在讨论网络中立性的背景下。本文还将纳入对互联网尊重和展示的价值观(如开放、平等和中立)的更基本评估,然后根据这些价值观制定对这项技术使用的法律和监管回应。
{"title":"The Legality of Deep Packet Inspection","authors":"A. Daly","doi":"10.2139/ssrn.1628024","DOIUrl":"https://doi.org/10.2139/ssrn.1628024","url":null,"abstract":"Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. \u0000 \u0000This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133723482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
New Challenges to Data Protection Study - Country Report: Germany 数据保护的新挑战研究-国别报告:德国
Pub Date : 2010-05-15 DOI: 10.2139/SSRN.1638959
D. Korff
This report is one of 11 country reports produced for the "New Challenges to Data Protection" study, commissioned by the European Commission, and describes the ways in which German data protection law addresses the challenges posed by the new social-technical-political environment described in Working Paper No. 1, by Dr Ian Brown.NB: The final report, an executive summary of the final report, both by Douwe Korff and Ian Brown (et al), and one of two working papers, as well as two further country reports (on France and the UK) and a Comparative Chart, all by Douwe Korff, all also produced for the New Challenges study, can be found separately on the present ssrn page. The other working paper, by Ian Brown, can be found on his ssrn page: http://ssrn.com/author=892424.
本报告是欧盟委员会委托为“数据保护的新挑战”研究编写的11个国家报告之一,描述了德国数据保护法如何应对伊恩·布朗博士在第1号工作文件中所描述的新的社会-技术-政治环境所带来的挑战。注:杜威·柯夫和伊恩·布朗(等人)撰写的最终报告、最终报告的执行摘要、杜威·柯夫撰写的两份工作文件中的一份、另外两份国别报告(关于法国和英国)和一份比较图表,都是为《新挑战》研究编写的,可在本网站单独找到。另一篇由伊恩•布朗撰写的工作论文可以在他的ssrn页面上找到:http://ssrn.com/author=892424。
{"title":"New Challenges to Data Protection Study - Country Report: Germany","authors":"D. Korff","doi":"10.2139/SSRN.1638959","DOIUrl":"https://doi.org/10.2139/SSRN.1638959","url":null,"abstract":"This report is one of 11 country reports produced for the \"New Challenges to Data Protection\" study, commissioned by the European Commission, and describes the ways in which German data protection law addresses the challenges posed by the new social-technical-political environment described in Working Paper No. 1, by Dr Ian Brown.NB: The final report, an executive summary of the final report, both by Douwe Korff and Ian Brown (et al), and one of two working papers, as well as two further country reports (on France and the UK) and a Comparative Chart, all by Douwe Korff, all also produced for the New Challenges study, can be found separately on the present ssrn page. The other working paper, by Ian Brown, can be found on his ssrn page: http://ssrn.com/author=892424.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Challenges to Data Protection Study - Working Paper No. 2: Data Protection Laws in the EU: The Difficulties in Meeting the Challenges Posed by Global Social and Technical Developments 资料保障的新挑战研究-工作文件第2号:欧盟的资料保障法例:应付全球社会及科技发展所带来的挑战的困难
Pub Date : 2010-01-15 DOI: 10.2139/SSRN.1638949
D. Korff
This the second of two working papers produced for the "New Challenges to Data Protection" study, commissioned by the European Commission. This paper discusses the difficulties that arise if one tries to apply the main EC Directive on data protection (Directive 95/46/EC) and the data protection laws in the EU Member States that implement it, as currently drafted, to the new global social and technical context described in Working Paper No. 1, by Dr. Ian Brown. It does this by means of a comparative-legal analysis, taking into account the six European and five non-European countries studied: Czech Republic, Denmark, France, Germany, Greece, United Kingdom, USA (Federal, California and New Jersey), Australia, Hong Kong, India and Japan. NB: Working Paper No. 1, on "The Challenges to European Data Protection Laws and Principles," can be found on Ian Brown's ssrn webpage: http://ssrn.com/author=892424. The findings of the paper presented here are summarised in another document: "Comparative Chart: Divergencies Between Data Protection Laws in the EU," which can be separately downloaded from the present ssrn page, as can the country reports on France, Germany and the UK, also written by Douwe Korff.
这是为欧盟委员会委托的“数据保护新挑战”研究撰写的两份工作文件中的第二份。本文讨论了如果试图将欧盟关于数据保护的主要指令(指令95/46/EC)和欧盟成员国实施该指令的数据保护法应用于Ian Brown博士在第1号工作文件中描述的新的全球社会和技术背景时所出现的困难。它采用比较法律分析的方法,考虑到所研究的六个欧洲和五个非欧洲国家:捷克共和国、丹麦、法国、德国、希腊、联合王国、美国(联邦、加利福尼亚和新泽西)、澳大利亚、香港、印度和日本。注:关于“对欧洲数据保护法律和原则的挑战”的第一号工作文件可在伊恩·布朗的ssrn网页上找到:http://ssrn.com/author=892424。这篇论文的发现总结在另一份文件中:“比较图表:欧盟数据保护法之间的差异”,可以从当前的ssrn页面单独下载,同样可以从Douwe Korff撰写的法国,德国和英国的国家报告中下载。
{"title":"New Challenges to Data Protection Study - Working Paper No. 2: Data Protection Laws in the EU: The Difficulties in Meeting the Challenges Posed by Global Social and Technical Developments","authors":"D. Korff","doi":"10.2139/SSRN.1638949","DOIUrl":"https://doi.org/10.2139/SSRN.1638949","url":null,"abstract":"This the second of two working papers produced for the \"New Challenges to Data Protection\" study, commissioned by the European Commission. This paper discusses the difficulties that arise if one tries to apply the main EC Directive on data protection (Directive 95/46/EC) and the data protection laws in the EU Member States that implement it, as currently drafted, to the new global social and technical context described in Working Paper No. 1, by Dr. Ian Brown. It does this by means of a comparative-legal analysis, taking into account the six European and five non-European countries studied: Czech Republic, Denmark, France, Germany, Greece, United Kingdom, USA (Federal, California and New Jersey), Australia, Hong Kong, India and Japan. NB: Working Paper No. 1, on \"The Challenges to European Data Protection Laws and Principles,\" can be found on Ian Brown's ssrn webpage: http://ssrn.com/author=892424. The findings of the paper presented here are summarised in another document: \"Comparative Chart: Divergencies Between Data Protection Laws in the EU,\" which can be separately downloaded from the present ssrn page, as can the country reports on France, Germany and the UK, also written by Douwe Korff.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Protection of Privacy in the Economic Sphere Before the European Court of Justice 欧洲法院对经济领域隐私的保护
Pub Date : 2009-10-01 DOI: 10.2139/SSRN.2394179
Peter Oliver
This article focuses on five recent judgments of the ECJ and CFI: ProMusicae, Varec, Pergan, Bavarian Lager and Satamedia. Taking as its starting-point the case law of the European Court of Human Rights (ECtHR) on Article 8 ECHR and on Articles 7 and 8 of the Charter of Fundamental Rights, the author considers how the Community Courts have approached the protection of privacy in the economic sphere (i.e. as regards matters relating to undertakings within the meaning of Arts. 81 and 82 EC and the economic aspects of the lives of natural persons) in the various relevant sectors, especially: data protection, the protection of business and other professional secrets, defamation and inspections (Hoechst and Roquette). Within each of these sectors, particular attention is paid to the specific provisions and case law relating to competition. Inevitably, the inherent tension between the protection of privacy and the principle of transparency repeatedly comes to the fore. Generally speaking, the author welcomes the approach taken by the Community courts, notably their increased emphasis on fundamental rights. However, he claims that, where the case law of the ECtHR is uncertain, this emphasis has at times occurred at the expense of the uniformity of Community law and even of legal certaintly - a development which is of particular concern when the unity of the internal market is at stake. The judgments in ProMusicae and Satamedia are then criticized in this regard.
本文主要关注欧洲法院和原讼法庭最近的五个判决:ProMusicae, Varec, Pergan, Bavarian Lager和Satamedia。以作为其出发点欧洲人权法院的判例法确立)第八条ECHR和文章7和8的基本权利宪章》,作者认为社区法院如何走近隐私保护在经济领域(例如,至于有关事业在艺术的意义。81年和82年电子商务和经济方面的自然人的生命)在各种相关领域,尤其是:数据保护、商业和其他专业秘密保护、诽谤和检查(Hoechst and Roquette)。在每一个部门内,都特别注意与竞争有关的具体规定和判例法。不可避免地,保护隐私和透明度原则之间的内在紧张关系一再出现。总的来说,发件人欢迎共同体法院所采取的办法,特别是它们更加强调基本权利。然而,他声称,在欧洲人权法院的判例法不确定的情况下,这种强调有时是以牺牲共同体法律的统一性,甚至是法律上的统一性为代价的- -当内部市场的统一性受到威胁时,这种发展是特别令人关切的。ProMusicae和Satamedia的判决在这方面受到了批评。
{"title":"The Protection of Privacy in the Economic Sphere Before the European Court of Justice","authors":"Peter Oliver","doi":"10.2139/SSRN.2394179","DOIUrl":"https://doi.org/10.2139/SSRN.2394179","url":null,"abstract":"This article focuses on five recent judgments of the ECJ and CFI: ProMusicae, Varec, Pergan, Bavarian Lager and Satamedia. Taking as its starting-point the case law of the European Court of Human Rights (ECtHR) on Article 8 ECHR and on Articles 7 and 8 of the Charter of Fundamental Rights, the author considers how the Community Courts have approached the protection of privacy in the economic sphere (i.e. as regards matters relating to undertakings within the meaning of Arts. 81 and 82 EC and the economic aspects of the lives of natural persons) in the various relevant sectors, especially: data protection, the protection of business and other professional secrets, defamation and inspections (Hoechst and Roquette). Within each of these sectors, particular attention is paid to the specific provisions and case law relating to competition. Inevitably, the inherent tension between the protection of privacy and the principle of transparency repeatedly comes to the fore. Generally speaking, the author welcomes the approach taken by the Community courts, notably their increased emphasis on fundamental rights. However, he claims that, where the case law of the ECtHR is uncertain, this emphasis has at times occurred at the expense of the uniformity of Community law and even of legal certaintly - a development which is of particular concern when the unity of the internal market is at stake. The judgments in ProMusicae and Satamedia are then criticized in this regard.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122123856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Americans Reject Tailored Advertising and Three Activities that Enable It 美国人拒绝定制广告和三种使之成为可能的活动
Pub Date : 2009-09-29 DOI: 10.2139/SSRN.1478214
J. Turow, J. King, C. Hoofnagle, A. Bleakley, Michael Hennessy
This nationally representative telephone (wire-line and cell phone) survey explores Americans' opinions about behavioral targeting by marketers, a controversial issue currently before government policymakers. Behavioral targeting involves two types of activities: following users' actions and then tailoring advertisements for the users based on those actions. While privacy advocates have lambasted behavioral targeting for tracking and labeling people in ways they do not know or understand, marketers have defended the practice by insisting it gives Americans what they want: advertisements and other forms of content that are as relevant to their lives as possible.Contrary to what many marketers claim, most adult Americans (66%) do not want marketers to tailor advertisements to their interests. Moreover, when Americans are informed of three common ways that marketers gather data about people in order to tailor ads, even higher percentages - between 73% and 86% - say they would not want such advertising. Even among young adults, whom advertisers often portray as caring little about information privacy, more than half (55%) of 18-24 years-old do not want tailored advertising. And contrary to consistent assertions of marketers, young adults have as strong an aversion to being followed across websites and offline (for example, in stores) as do older adults.This survey finds that Americans want openness with marketers. If marketers want to continue to use various forms of behavioral targeting in their interactions with Americans, they must work with policymakers to open up the process so that individuals can learn exactly how their information is being collected and used, and then exercise control over their data. We offer specific proposals in this direction. An overarching one is for marketers to implement a regime of information respect toward the public rather than to treat them as objects from which they can take information in order to optimally persuade them.
这项具有全国代表性的电话(有线电话和手机)调查探讨了美国人对营销人员行为定位的看法,这是目前摆在政府决策者面前的一个有争议的问题。行为定位包括两种类型的活动:跟踪用户的行为,然后根据这些行为为用户量身定制广告。虽然隐私倡导者猛烈抨击行为定位以人们不知道或不理解的方式跟踪和标记人们,但营销人员却为这种做法辩护,坚称它给了美国人想要的东西:广告和其他形式的内容,尽可能与他们的生活相关。与许多营销人员声称的相反,大多数美国成年人(66%)不希望营销人员根据他们的兴趣定制广告。此外,当美国人被告知营销人员收集人们数据以定制广告的三种常见方式时,甚至更高的百分比(73%至86%)表示他们不想要这样的广告。即使在被广告商描述为不太关心信息隐私的年轻人中,也有超过一半(55%)的18-24岁的人不想要量身定制的广告。与市场营销人员的一贯主张相反,年轻人和老年人一样,对在网上和线下(例如,在商店里)被跟踪有着强烈的反感。这项调查发现,美国人希望对营销人员开诚布公。如果营销人员想在与美国人的互动中继续使用各种形式的行为定位,他们必须与政策制定者合作,开放这一过程,以便个人能够准确地了解他们的信息是如何被收集和使用的,然后对他们的数据进行控制。我们在这方面提出了具体建议。最重要的一点是,营销人员要对公众实施一种尊重信息的制度,而不是把他们当作可以从中获取信息的对象,以便以最佳方式说服他们。
{"title":"Americans Reject Tailored Advertising and Three Activities that Enable It","authors":"J. Turow, J. King, C. Hoofnagle, A. Bleakley, Michael Hennessy","doi":"10.2139/SSRN.1478214","DOIUrl":"https://doi.org/10.2139/SSRN.1478214","url":null,"abstract":"This nationally representative telephone (wire-line and cell phone) survey explores Americans' opinions about behavioral targeting by marketers, a controversial issue currently before government policymakers. Behavioral targeting involves two types of activities: following users' actions and then tailoring advertisements for the users based on those actions. While privacy advocates have lambasted behavioral targeting for tracking and labeling people in ways they do not know or understand, marketers have defended the practice by insisting it gives Americans what they want: advertisements and other forms of content that are as relevant to their lives as possible.Contrary to what many marketers claim, most adult Americans (66%) do not want marketers to tailor advertisements to their interests. Moreover, when Americans are informed of three common ways that marketers gather data about people in order to tailor ads, even higher percentages - between 73% and 86% - say they would not want such advertising. Even among young adults, whom advertisers often portray as caring little about information privacy, more than half (55%) of 18-24 years-old do not want tailored advertising. And contrary to consistent assertions of marketers, young adults have as strong an aversion to being followed across websites and offline (for example, in stores) as do older adults.This survey finds that Americans want openness with marketers. If marketers want to continue to use various forms of behavioral targeting in their interactions with Americans, they must work with policymakers to open up the process so that individuals can learn exactly how their information is being collected and used, and then exercise control over their data. We offer specific proposals in this direction. An overarching one is for marketers to implement a regime of information respect toward the public rather than to treat them as objects from which they can take information in order to optimally persuade them.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116169774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 341
期刊
Information Privacy Law eJournal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1