首页 > 最新文献

Information & Communications Technology Law最新文献

英文 中文
Information and communications technology law in changing times 信息和通信技术法在不断变化的时代
IF 1.5 Q1 LAW Pub Date : 2021-01-02 DOI: 10.1080/13600834.2020.1807135
B. Simpson, L. Collingwood
The articles in this special issue arise from papers presented at the Socio-Legal Studies Association Annual Conference in Leeds in 2019. Few would have predicted that within twelve months the Covi...
本期特刊中的文章来源于2019年在利兹举行的社会法律研究协会年会上发表的论文。很少有人会预测到,在12个月内,新冠肺炎。。。
{"title":"Information and communications technology law in changing times","authors":"B. Simpson, L. Collingwood","doi":"10.1080/13600834.2020.1807135","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807135","url":null,"abstract":"The articles in this special issue arise from papers presented at the Socio-Legal Studies Association Annual Conference in Leeds in 2019. Few would have predicted that within twelve months the Covi...","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"1 - 2"},"PeriodicalIF":1.5,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46671181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital disclosure: HIV status, mobile dating application design and legal responsibility 数字披露:艾滋病毒状况,手机约会应用程序设计和法律责任
IF 1.5 Q1 LAW Pub Date : 2021-01-02 DOI: 10.1080/13600834.2020.1807119
C. Giles
ABSTRACT Location-based mobile dating applications are often one of the richest sources of personal information readily accessible to strangers on the internet and in many cases this information now extends to a user’s HIV status and the date of their most recent sexual health test. Drawing on qualitative data collected from dating application users, this article considers how these features construct sexual health in a manner which reinforces the uneven distribution of responsibility for preventing HIV transmission. Examining the current legal framework covering HIV transmission criminalisation in England and Wales, this piece aims to illustrate the importance of understanding how these applications are used in practice, if they are to be used at trial.
摘要基于位置的移动约会应用程序通常是陌生人在互联网上容易访问的最丰富的个人信息来源之一,在许多情况下,这些信息现在扩展到用户的艾滋病毒状况和最近的性健康测试日期。根据从约会应用程序用户那里收集的定性数据,本文考虑了这些特征是如何构建性健康的,从而强化了预防艾滋病毒传播责任的不均衡分配。这篇文章考察了英格兰和威尔士目前涵盖艾滋病毒传播刑事定罪的法律框架,旨在说明了解这些应用程序在实践中如何使用的重要性,如果这些应用程序要在审判中使用的话。
{"title":"Digital disclosure: HIV status, mobile dating application design and legal responsibility","authors":"C. Giles","doi":"10.1080/13600834.2020.1807119","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807119","url":null,"abstract":"ABSTRACT Location-based mobile dating applications are often one of the richest sources of personal information readily accessible to strangers on the internet and in many cases this information now extends to a user’s HIV status and the date of their most recent sexual health test. Drawing on qualitative data collected from dating application users, this article considers how these features construct sexual health in a manner which reinforces the uneven distribution of responsibility for preventing HIV transmission. Examining the current legal framework covering HIV transmission criminalisation in England and Wales, this piece aims to illustrate the importance of understanding how these applications are used in practice, if they are to be used at trial.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"35 - 53"},"PeriodicalIF":1.5,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41527013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart contracts: a remedial analysis 智能合约:一种补救分析
IF 1.5 Q1 LAW Pub Date : 2020-08-12 DOI: 10.1080/13600834.2020.1807134
Robert Herian
ABSTRACT The perpetual script of a smart contract, that executes an agreement machine-to-machine without prejudice, guarantees performance of ‘contractual terms’ enabling the exchange or transaction of cryptoassets and other forms of property. Yet, smart contracts as recognisable or valid legal instruments within the boundaries of contract or property law remain uncertain and contentious. Contrary to perceptions of contractual streamlining and efficiency, understanding the uncertainty smart contracts produce lies in the technology's failure to meet many of the fundamental principles of contract law and theory concerning, for example, breach of promise and remedy for breach. Smart contracts appear to reduce contracting to a form and standard well below that developed by contract law and theory over many centuries in both civil and common law jurisdictions. Including elements of the law of restitution, this article's remedial analysis will examine smart contracts considering ‘traditional’ contract law to understand and, where possible, test the legal legitimacy of this post-human technology, and explore the potential of smart contracts to supplement or, in time, supersede traditional contract law.
智能合约的永久脚本,可以不带偏见地执行机器对机器的协议,保证“合同条款”的履行,从而实现加密资产和其他形式的财产的交换或交易。然而,智能合约作为合同或财产法范围内可识别或有效的法律工具仍然不确定和有争议。与对合同简化和效率的看法相反,理解智能合约产生的不确定性在于该技术未能满足合同法和理论的许多基本原则,例如,违反承诺和违约补救。智能合约似乎将合同简化为一种形式和标准,远低于民法和普通法司法管辖区几个世纪以来合同法和理论所发展的形式和标准。包括恢复法律的要素,本文的补救分析将考虑“传统”合同法来研究智能合约,以理解并在可能的情况下测试这种后人类技术的法律合法性,并探索智能合约补充或及时取代传统合同法的潜力。
{"title":"Smart contracts: a remedial analysis","authors":"Robert Herian","doi":"10.1080/13600834.2020.1807134","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807134","url":null,"abstract":"ABSTRACT The perpetual script of a smart contract, that executes an agreement machine-to-machine without prejudice, guarantees performance of ‘contractual terms’ enabling the exchange or transaction of cryptoassets and other forms of property. Yet, smart contracts as recognisable or valid legal instruments within the boundaries of contract or property law remain uncertain and contentious. Contrary to perceptions of contractual streamlining and efficiency, understanding the uncertainty smart contracts produce lies in the technology's failure to meet many of the fundamental principles of contract law and theory concerning, for example, breach of promise and remedy for breach. Smart contracts appear to reduce contracting to a form and standard well below that developed by contract law and theory over many centuries in both civil and common law jurisdictions. Including elements of the law of restitution, this article's remedial analysis will examine smart contracts considering ‘traditional’ contract law to understand and, where possible, test the legal legitimacy of this post-human technology, and explore the potential of smart contracts to supplement or, in time, supersede traditional contract law.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"17 - 34"},"PeriodicalIF":1.5,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48454630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Leveraging the ‘power’ of big data in the production of ‘responsible gamblers’: a Foucauldian perspective 利用大数据的“力量”培养“负责任的赌徒”:傅的观点
IF 1.5 Q1 LAW Pub Date : 2020-08-12 DOI: 10.1080/13600834.2020.1807117
Rachel Allsopp
ABSTRACT This article examines the big data practices employed by the online gambling industry to illustrate the wider societal power structures involved. As well as using data for commercial ends, gambling operators in the UK market are obligated by law to utilise gamblers’ data to protect problem gamblers. This paper argues that the use of data in this way can be interpreted as a form of social control when observed through a Foucauldian lens. Contrary to the dominant narrative of free and informed choice, gamblers’ behaviour is arguably being governed both at an individual level through disciplinary mechanisms of surveillance and correction, and at the level of the population through governmentality techniques applied to the gambling environment. Through big data practices and industry discourse, these mechanisms of power are used to frame the choices of individuals and shape them into a productive population of ‘responsible gamblers’.
摘要本文考察了网络赌博行业使用的大数据实践,以说明所涉及的更广泛的社会权力结构。除了将数据用于商业目的外,英国市场的博彩运营商也有法律义务利用赌徒的数据来保护问题赌徒。本文认为,以这种方式使用数据可以被解释为一种社会控制形式,当通过福柯的视角观察时。与自由和知情选择的主流叙事相反,赌徒的行为可以说是通过监督和纠正的纪律机制在个人层面受到控制,也可以通过应用于赌博环境的治理技术在民众层面受到控制。通过大数据实践和行业话语,这些权力机制被用来界定个人的选择,并将他们塑造成“负责任的赌徒”的多产群体。
{"title":"Leveraging the ‘power’ of big data in the production of ‘responsible gamblers’: a Foucauldian perspective","authors":"Rachel Allsopp","doi":"10.1080/13600834.2020.1807117","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807117","url":null,"abstract":"ABSTRACT This article examines the big data practices employed by the online gambling industry to illustrate the wider societal power structures involved. As well as using data for commercial ends, gambling operators in the UK market are obligated by law to utilise gamblers’ data to protect problem gamblers. This paper argues that the use of data in this way can be interpreted as a form of social control when observed through a Foucauldian lens. Contrary to the dominant narrative of free and informed choice, gamblers’ behaviour is arguably being governed both at an individual level through disciplinary mechanisms of surveillance and correction, and at the level of the population through governmentality techniques applied to the gambling environment. Through big data practices and industry discourse, these mechanisms of power are used to frame the choices of individuals and shape them into a productive population of ‘responsible gamblers’.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"54 - 74"},"PeriodicalIF":1.5,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43447253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deepfakes and image manipulation: criminalisation and control 深度造假和图像操纵:犯罪化和控制
IF 1.5 Q1 LAW Pub Date : 2020-07-16 DOI: 10.1080/13600834.2020.1794615
Tyrone Kirchengast
ABSTRACT Deepfakes are a form of human image synthesis where an existing picture or image is superimposed into a video to change the identity of those depicted in the video. The technology relies on machine learning or artificial intelligence to map an existing image, usually a photo of a person's face, to transfer that image to an existing video image. The technology emerged into the latter part of 2017, and has since given rise to apps and other programmes that allow users to create their own deepfakes. We already use filters and emojis to alter images by consent, however, deepfakes are particularly problematic because they allow for production of videos that are highly convincing, taken to be a real video of the person depicted. Deepfakes provide for the manipulation of all manner of video, but particular risks include videos produced to incite political deception, voter manipulation, commercial fraud, and ‘revenge porn’. The production of deepfake ‘revenge porn’ presents as especially insidious given the ability to transfer the face of any person onto an already existing pornographic video. Harm is exacerbated where that video is then disseminated, via the internet or by social media.
深度伪造是人类图像合成的一种形式,将现有的图片或图像叠加到视频中,以改变视频中所描述的人的身份。这项技术依靠机器学习或人工智能来映射现有的图像,通常是一张人脸的照片,然后将该图像转移到现有的视频图像上。这项技术出现在2017年下半年,此后出现了允许用户创建自己的深度伪造的应用程序和其他程序。我们已经在征得同意的情况下使用滤镜和表情符号来改变图像,然而,深度造假尤其成问题,因为它们允许制作高度可信的视频,被认为是所描绘人物的真实视频。深度造假提供了对各种视频的操纵,但特别的风险包括煽动政治欺骗、选民操纵、商业欺诈和“复仇色情”的视频。deepfake“复仇色情”的制作尤其阴险,因为它能够将任何人的脸转移到已经存在的色情视频上。当视频通过互联网或社交媒体传播时,危害就会加剧。
{"title":"Deepfakes and image manipulation: criminalisation and control","authors":"Tyrone Kirchengast","doi":"10.1080/13600834.2020.1794615","DOIUrl":"https://doi.org/10.1080/13600834.2020.1794615","url":null,"abstract":"ABSTRACT Deepfakes are a form of human image synthesis where an existing picture or image is superimposed into a video to change the identity of those depicted in the video. The technology relies on machine learning or artificial intelligence to map an existing image, usually a photo of a person's face, to transfer that image to an existing video image. The technology emerged into the latter part of 2017, and has since given rise to apps and other programmes that allow users to create their own deepfakes. We already use filters and emojis to alter images by consent, however, deepfakes are particularly problematic because they allow for production of videos that are highly convincing, taken to be a real video of the person depicted. Deepfakes provide for the manipulation of all manner of video, but particular risks include videos produced to incite political deception, voter manipulation, commercial fraud, and ‘revenge porn’. The production of deepfake ‘revenge porn’ presents as especially insidious given the ability to transfer the face of any person onto an already existing pornographic video. Harm is exacerbated where that video is then disseminated, via the internet or by social media.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"308 - 323"},"PeriodicalIF":1.5,"publicationDate":"2020-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1794615","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43028756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Regulating law enforcement access to electronic evidence across borders: the United States approach 监管执法部门跨境获取电子证据:美国的做法
IF 1.5 Q1 LAW Pub Date : 2020-07-14 DOI: 10.1080/13600834.2020.1794617
Halefom H. Abraha
ABSTRACT Several initiatives are underway to address the jurisdictional and conflicts-of-law challenges triggered by the ubiquity of cloud data storage. By introducing a new approach for international cooperation through the Clarifying Lawful Overseas Use of Data Act (CLOUD Act), the United States of America (US) leads the cross-border data access reform agenda. The US approach deserves closer scrutiny, given its impact in shaping international standards that govern law enforcement access to cloud data, as well as its influence on other impending reform initiatives. While a number of blogs and reports have been written about the CLOUD Act, a comprehensive academic analysis appears to be lacking. This article addresses this gap by examining the extraterritorial reach of the US government’s law enforcement powers, and conversely the powers of foreign governments to obtain data held by US-based service providers. Most importantly, this article scrutinises the adequacy of the substantive and procedural safeguards stipulated under the CLOUD Act.
摘要:针对云数据存储的普遍性所引发的管辖权和法律冲突挑战,目前正在采取多项举措。通过《澄清海外合法使用数据法》(CLOUD法案)引入一种新的国际合作方法,美利坚合众国(US)领导了跨境数据访问改革议程。考虑到美国的做法在制定管理执法部门访问云数据的国际标准方面的影响,以及对其他即将到来的改革举措的影响,美国的做法值得仔细审查。尽管已经有许多关于《云法案》的博客和报告,但似乎缺乏全面的学术分析。本文通过研究美国政府执法权的域外范围,以及外国政府获取美国服务提供商持有的数据的权力,来解决这一差距。最重要的是,本文仔细审查了《云法案》规定的实质性和程序性保障措施的充分性。
{"title":"Regulating law enforcement access to electronic evidence across borders: the United States approach","authors":"Halefom H. Abraha","doi":"10.1080/13600834.2020.1794617","DOIUrl":"https://doi.org/10.1080/13600834.2020.1794617","url":null,"abstract":"ABSTRACT Several initiatives are underway to address the jurisdictional and conflicts-of-law challenges triggered by the ubiquity of cloud data storage. By introducing a new approach for international cooperation through the Clarifying Lawful Overseas Use of Data Act (CLOUD Act), the United States of America (US) leads the cross-border data access reform agenda. The US approach deserves closer scrutiny, given its impact in shaping international standards that govern law enforcement access to cloud data, as well as its influence on other impending reform initiatives. While a number of blogs and reports have been written about the CLOUD Act, a comprehensive academic analysis appears to be lacking. This article addresses this gap by examining the extraterritorial reach of the US government’s law enforcement powers, and conversely the powers of foreign governments to obtain data held by US-based service providers. Most importantly, this article scrutinises the adequacy of the substantive and procedural safeguards stipulated under the CLOUD Act.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"4 2","pages":"324 - 353"},"PeriodicalIF":1.5,"publicationDate":"2020-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1794617","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41293569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The controller’s role in determining ‘high risk’ and data protection impact assessment (DPIA) in developing digital smart city 控制器在确定“高风险”和数据保护影响评估(DPIA)中的作用,以发展数字智慧城市
IF 1.5 Q1 LAW Pub Date : 2020-07-07 DOI: 10.1080/13600834.2020.1790092
Shakila Bu-Pasha
ABSTRACT Article 35 of the General Data Protection Regulation (GDPR) states that data controllers are required to carry out data protection impact assessment (DPIA) if a processing operation, particularly involving the use of new technologies, is ‘likely to result in a high risk to the rights and freedoms of natural persons’. The focus in this paper is on the role and responsibilities of data controllers in a smart city platform in assessing ‘high risk’ and the importance of impact assessment in relation to data processing with the latest technologies for the protection of personal data.
摘要《通用数据保护条例》第35条规定,如果处理操作,特别是涉及新技术的使用,“可能对自然人的权利和自由造成高风险”,数据控制者必须进行数据保护影响评估。本文的重点是智能城市平台中数据控制者在评估“高风险”方面的作用和责任,以及与使用最新技术保护个人数据的数据处理相关的影响评估的重要性。
{"title":"The controller’s role in determining ‘high risk’ and data protection impact assessment (DPIA) in developing digital smart city","authors":"Shakila Bu-Pasha","doi":"10.1080/13600834.2020.1790092","DOIUrl":"https://doi.org/10.1080/13600834.2020.1790092","url":null,"abstract":"ABSTRACT Article 35 of the General Data Protection Regulation (GDPR) states that data controllers are required to carry out data protection impact assessment (DPIA) if a processing operation, particularly involving the use of new technologies, is ‘likely to result in a high risk to the rights and freedoms of natural persons’. The focus in this paper is on the role and responsibilities of data controllers in a smart city platform in assessing ‘high risk’ and the importance of impact assessment in relation to data processing with the latest technologies for the protection of personal data.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"391 - 402"},"PeriodicalIF":1.5,"publicationDate":"2020-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1790092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49611479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The (UK) Freedom of Information Act’s disclosure process is broken: where do we go from here? (英国)《信息自由法》的披露程序被打破了:我们该何去何从?
IF 1.5 Q1 LAW Pub Date : 2020-06-25 DOI: 10.1080/13600834.2020.1785663
Henry Pearce
ABSTRACT This article builds on previous literature in the data protection and freedom and information field, which has argued that the ‘release and forget’ disclosure model utilised by the (UK) Freedom of Information Act 2000 (FOIA) is unfit for purpose in the context of personal data that have been subject to a process of anonymisation, and that reform is necessary. Rather than outlining a detailed proposal for reform, the article intends to stoke debate in this area by highlighting a range of issues and factors that could help inform discussions regarding what shape any reform of the FOIA’s disclosure model should take. The article argues that the notions of privacy and data protection by design, data licensing, risk, contextual controls, metadata, and privacy enhancing technologies, should all have a role to play in respect of improving how anonymised data are disclosed under the FOIA.
摘要本文建立在数据保护、自由和信息领域的先前文献的基础上,这些文献认为,(英国)《2000年信息自由法》(FOIA)所使用的“发布和忘记”披露模式不适合用于经过匿名化过程的个人数据,因此有必要进行改革。这篇文章没有概述详细的改革建议,而是打算通过强调一系列问题和因素来引发这一领域的辩论,这些问题和因素可能有助于就《信息自由法》披露模式的任何改革应该采取何种形式进行讨论。文章认为,设计、数据许可、风险、上下文控制、元数据和隐私增强技术的隐私和数据保护概念,都应该在改善《信息自由法》下匿名数据的披露方式方面发挥作用。
{"title":"The (UK) Freedom of Information Act’s disclosure process is broken: where do we go from here?","authors":"Henry Pearce","doi":"10.1080/13600834.2020.1785663","DOIUrl":"https://doi.org/10.1080/13600834.2020.1785663","url":null,"abstract":"ABSTRACT This article builds on previous literature in the data protection and freedom and information field, which has argued that the ‘release and forget’ disclosure model utilised by the (UK) Freedom of Information Act 2000 (FOIA) is unfit for purpose in the context of personal data that have been subject to a process of anonymisation, and that reform is necessary. Rather than outlining a detailed proposal for reform, the article intends to stoke debate in this area by highlighting a range of issues and factors that could help inform discussions regarding what shape any reform of the FOIA’s disclosure model should take. The article argues that the notions of privacy and data protection by design, data licensing, risk, contextual controls, metadata, and privacy enhancing technologies, should all have a role to play in respect of improving how anonymised data are disclosed under the FOIA.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"354 - 390"},"PeriodicalIF":1.5,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1785663","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46134681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sharing national security information in Finland 在芬兰共享国家安全信息
IF 1.5 Q1 LAW Pub Date : 2020-05-12 DOI: 10.1080/13600834.2020.1759277
Mikael Lohse
ABSTRACT Safeguarding Finland’s national security is a collaborative function of the intelligence authorities and their clients and partners. This collaboration requires a sharing of national security information within the intelligence community, and with other public authorities – both domestic and foreign – as well as with enterprises and corporations. The first objective of this article is to distinguish norms regulating the sharing of national security information from the intelligence and data processing legislation, and to organise this legal substance into three categories: Disclosure of information in (1) national co-operation, (2) international co-operation, and for (3) crime prevention. The second objective is to identify areas of development in each of these three categories and accordingly suggest law and policy recommendations for the future.
摘要维护芬兰的国家安全是情报部门及其客户和合作伙伴的合作职能。这种合作需要在情报界内部、与国内外其他公共当局以及与企业和公司共享国家安全信息。本文的第一个目的是将规范国家安全信息共享的规范与情报和数据处理立法区分开来,并将这一法律实质分为三类:(1)国家合作、(2)国际合作和(3)预防犯罪中的信息披露。第二个目标是确定这三类中每一类的发展领域,并据此提出未来的法律和政策建议。
{"title":"Sharing national security information in Finland","authors":"Mikael Lohse","doi":"10.1080/13600834.2020.1759277","DOIUrl":"https://doi.org/10.1080/13600834.2020.1759277","url":null,"abstract":"ABSTRACT Safeguarding Finland’s national security is a collaborative function of the intelligence authorities and their clients and partners. This collaboration requires a sharing of national security information within the intelligence community, and with other public authorities – both domestic and foreign – as well as with enterprises and corporations. The first objective of this article is to distinguish norms regulating the sharing of national security information from the intelligence and data processing legislation, and to organise this legal substance into three categories: Disclosure of information in (1) national co-operation, (2) international co-operation, and for (3) crime prevention. The second objective is to identify areas of development in each of these three categories and accordingly suggest law and policy recommendations for the future.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"279 - 290"},"PeriodicalIF":1.5,"publicationDate":"2020-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1759277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48964031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predictions from data analytics: Does Malaysian data protection law apply? 来自数据分析的预测:马来西亚数据保护法是否适用?
IF 1.5 Q1 LAW Pub Date : 2020-05-04 DOI: 10.1080/13600834.2020.1759276
T. San
ABSTRACT As data analytics become prevalent in industries in Malaysia to draw predictions about individuals’ habits and behaviour, it is important that certainty exists about the legal status of predictions vis-à-vis data protection law. The predictions can be privacy-intrusive and threaten individuals’ autonomy, although this may not always be so. The Malaysian Personal Data Protection Act 2010 is silent on the legal status of predictions. This paper examines whether the Malaysian Parliament should extend the Act to provide control to individuals over predictions about themselves. In doing so, the paper explores the position in the EU, Japan, Australia and the USA. The finding is that in those jurisdictions, predictions are within the remit of data protection law. It is argued that this is an over-generalisation and is inconsonant with commercial realities. The author advocates that a different approach be adopted to achieve a balance between individuals’ interest to control their data and commercial needs to use predictions without undue hindrance.
摘要随着数据分析在马来西亚的行业中越来越普遍,以对个人的习惯和行为进行预测,重要的是要确定预测相对于数据保护法的法律地位。这些预测可能会侵犯隐私,威胁个人的自主权,尽管情况并非总是如此。2010年《马来西亚个人数据保护法》对预测的法律地位保持沉默。本文探讨了马来西亚议会是否应该扩大该法案的范围,以控制个人对自己的预测。在这样做的过程中,本文探讨了欧盟、日本、澳大利亚和美国的立场。研究结果表明,在这些司法管辖区,预测属于数据保护法的管辖范围。有人认为,这是一种过度概括,与商业现实不符。作者主张采取不同的方法,在个人控制数据的兴趣和在没有不当阻碍的情况下使用预测的商业需求之间实现平衡。
{"title":"Predictions from data analytics: Does Malaysian data protection law apply?","authors":"T. San","doi":"10.1080/13600834.2020.1759276","DOIUrl":"https://doi.org/10.1080/13600834.2020.1759276","url":null,"abstract":"ABSTRACT As data analytics become prevalent in industries in Malaysia to draw predictions about individuals’ habits and behaviour, it is important that certainty exists about the legal status of predictions vis-à-vis data protection law. The predictions can be privacy-intrusive and threaten individuals’ autonomy, although this may not always be so. The Malaysian Personal Data Protection Act 2010 is silent on the legal status of predictions. This paper examines whether the Malaysian Parliament should extend the Act to provide control to individuals over predictions about themselves. In doing so, the paper explores the position in the EU, Japan, Australia and the USA. The finding is that in those jurisdictions, predictions are within the remit of data protection law. It is argued that this is an over-generalisation and is inconsonant with commercial realities. The author advocates that a different approach be adopted to achieve a balance between individuals’ interest to control their data and commercial needs to use predictions without undue hindrance.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"291 - 307"},"PeriodicalIF":1.5,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1759276","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48876872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information & Communications Technology Law
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1