Vulnerability and Data Protection Law

Vulnerability and Data Protection Law
Author :
Publisher : Oxford University Press
Total Pages : 305
Release :
ISBN-10 : 9780192697516
ISBN-13 : 019269751X
Rating : 4/5 (16 Downloads)

Synopsis Vulnerability and Data Protection Law by : Gianclaudio Malgieri

Vulnerability has traditionally been viewed through the lens of specific groups of people, such as ethnic minorities, children, the elderly, or people with disabilities. With the rise of digital media, our perceptions of vulnerable groups and individuals have been reshaped as new vulnerabilities and different vulnerable sub-groups of users, consumers, citizens, and data subjects emerge. Vulnerability and Data Protection Law not only depicts these problems but offers the reader a detailed investigation of the concept of data subjects and a reconceptualization of the notion of vulnerability within the General Data Protection Regulation. The regulation offers a forward-facing set of tools that-though largely underexplored-are essential in rebalancing power asymmetries and mitigating induced vulnerabilities in the age of artificial intelligence. Considering the new risks and potentialities of the digital market, the new awareness about cognitive weaknesses, and the new philosophical sensitivity about the condition of human vulnerability, the author looks for a more general and layered definition of the data subject's vulnerability that goes beyond traditional labels. In doing so, he seeks to promote a 'vulnerability-aware' interpretation of the GDPR. A heuristic analysis that re-interprets the whole GDPR, this work is essential for both scholars of data protection law and for policymakers looking to strengthen regulations and protect the data of vulnerable individuals.

International Cybersecurity and Privacy Law in Practice

International Cybersecurity and Privacy Law in Practice
Author :
Publisher : Kluwer Law International B.V.
Total Pages : 429
Release :
ISBN-10 : 9789403532141
ISBN-13 : 9403532149
Rating : 4/5 (41 Downloads)

Synopsis International Cybersecurity and Privacy Law in Practice by : Charlotte A. Tschider

As jurisdictions increasingly pass new cybersecurity and privacy laws, it is crucial that attorneys secure a working knowledge of information technology to effectively advise organizations that collect and process data. This essential book—now extensively updated to reflect the dramatic legal changes that have taken place in the few short years since its first edition—remains the preeminent in-depth survey and analysis of privacy and cybersecurity laws worldwide. It also provides a deeply informed guide on how to apply legal requirements to protect an organization’s interests and anticipate future compliance developments. With detailed attention to relevant supranational, regional, and national privacy and data protection laws and frameworks, the author describes and analyzes the legal strategies and responsibilities attached to the following and more: prompt, secure ways to identify threats, manage vulnerabilities, and respond to “incidents” and data breaches; most common types of cyberattacks used today; transparency and consent; rights of revocation, erasure, and correction; de-identification and anonymization procedures; data localization; cross-jurisdictional data transfer; contract negotiation; encryption, de-identification, anonymization, and pseudonymization; and Artificial Intelligence as an emerging technology that will require more dynamic and challenging conversations. Balancing legal knowledge with technical awareness and business acumen, this book is an indispensable resource for attorneys who must provide advice on strategic implementations of new technologies, advise on the impact of certain laws on the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities. It will also be of value to other practitioners, such as security personnel and compliance professionals, who will benefit from a broad perspective exploring privacy and data protection laws and their connection with security technologies and broader organizational compliance objectives.

Research Handbook on Privacy and Data Protection Law

Research Handbook on Privacy and Data Protection Law
Author :
Publisher : Edward Elgar Publishing
Total Pages : 480
Release :
ISBN-10 : 9781786438515
ISBN-13 : 1786438518
Rating : 4/5 (15 Downloads)

Synopsis Research Handbook on Privacy and Data Protection Law by : González, Gloria

This Research Handbook is an insightful overview of the key rules, concepts and tensions in privacy and data protection law. It highlights the increasing global significance of this area of law, illustrating the many complexities in the field through a blend of theoretical and empirical perspectives.

Reforming European Data Protection Law

Reforming European Data Protection Law
Author :
Publisher : Springer
Total Pages : 409
Release :
ISBN-10 : 9789401793858
ISBN-13 : 9401793859
Rating : 4/5 (58 Downloads)

Synopsis Reforming European Data Protection Law by : Serge Gutwirth

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Harboring Data

Harboring Data
Author :
Publisher : Stanford University Press
Total Pages : 368
Release :
ISBN-10 : 9780804772594
ISBN-13 : 0804772592
Rating : 4/5 (94 Downloads)

Synopsis Harboring Data by : Andrea M. Matwyshyn

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.

Breached!

Breached!
Author :
Publisher : Oxford University Press
Total Pages : 257
Release :
ISBN-10 : 9780190940577
ISBN-13 : 0190940573
Rating : 4/5 (77 Downloads)

Synopsis Breached! by : Daniel J. Solove

A novel account of how the law contributes to the insecurity of our data and a bold way to rethink it. Digital connections permeate our lives-and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is alarming how difficult it is to create rules for securing our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on privacy and data security, argue that the law fails because, ironically, it focuses too much on the breach itself. Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through a different approach to data security rules. Current law is counterproductive. It pummels organizations that have suffered a breach but doesn't address the many other actors that contribute to the problem: software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more. Although humans are the weakest link for data security, policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. Drawing from public health theory and a nuanced understanding of risk, Solove and Hartzog set out a holistic vision for data security law-one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and works by accepting human limitations rather than being in denial of them. The book closes with a roadmap for how we can reboot law and policy surrounding data security.

Vulnerability, Childhood and the Law

Vulnerability, Childhood and the Law
Author :
Publisher : Springer
Total Pages : 74
Release :
ISBN-10 : 9783319786865
ISBN-13 : 3319786865
Rating : 4/5 (65 Downloads)

Synopsis Vulnerability, Childhood and the Law by : Jonathan Herring

This book will challenge the orthodox view that children cannot have the same rights as adults because they are particularly vulnerable. It will argue that we should treat adults and children in the same way as the child liberationists claim. However, the basis of that claim is not that children are more competent than we traditionally given them credit for, but rather that adults are far less competent than we give them credit for. It is commonly assumed that children are more vulnerable. That is why we need to have a special legal regime for children. Children cannot have all the same rights as adults and need especial protect from harms. While in the 1970s “child liberationists” mounted a sustained challenge to this image, arguing that childhood was a form of slavery and that the assumption that children lacked capacity was unsustainable. This movement has significantly fallen out of favour, particularly given increasing awareness of child abuse and the multiple ways that children can be harmed at the hands of adults. This book will explore the concept of vulnerability, the way it used to undermine the interests of children and our assumptions that adults are not vulnerable in the same way that children are. It will argue that a law based around mutual vulnerability can provide an approach which avoids the need to distinguish adults and children.

Data Protection Implementation Guide

Data Protection Implementation Guide
Author :
Publisher : Kluwer Law International B.V.
Total Pages : 463
Release :
ISBN-10 : 9789403529011
ISBN-13 : 9403529016
Rating : 4/5 (11 Downloads)

Synopsis Data Protection Implementation Guide by : Brendan Quinn

The complexities of implementing the General Data Protection Regulation (GDPR) continue to grow as it progresses through new and ever-changing technologies, business models, codes of conduct, and decisions of the supervisory authorities, and the courts. This eminently practical guide to implementing the GDPR – written in an original, problem-solving style by a highly experienced data protection expert with equal knowledge of both law and technology – provides a step-by-step project management approach to building a GDPR-compliant data protection system, assessing, and documenting the risks and then implementing these changes through processes at the operational level. With detailed attention to case law (Member State, ECJ, and ECHR), especially where affecting high-risk areas that have attracted scrutiny, the guidance proceeds systematically through such topics and issues as the following: required documentation, policies, and procedures; risk assessment tools and analysis frameworks; children’s data; employee and health data; international transfers post-Schrems II; data subject rights including the right of access; data retention and erasure; tracking and surveillance; and effects of technologies such as artificial intelligence, biometrics, and machine learning. With its practical examples derived from the author’s experience in building GDPR-compliant software, as well as its analysis of case law and enforcement priorities, this incomparable guide enables company data protection officers and compliance staff to advise on key issues with full awareness of the legal and reputational risks and how to mitigate them. It is also sure to be of immeasurable value to concerned regulators and policymakers at all government levels. “…it's going to be the go to resource for practitioners.” Tom Gilligan, Data Protection Consultant, September 2021 "I purchased this book recently and I’m very glad I did. It’s the textbook I have been waiting for. As someone relatively new to data protection, I was finding it very difficult to find books on the practical side of data protection. This book is very clearly laid out with practical examples and case law given for each topic, which is immensely helpful. I would recommend it to any data protection practitioners." Jennifer Breslin, LLM CIPP/E, AIPP Member

The Risk-Based Approach to Data Protection

The Risk-Based Approach to Data Protection
Author :
Publisher : Oxford University Press, USA
Total Pages : 305
Release :
ISBN-10 : 9780198837718
ISBN-13 : 0198837712
Rating : 4/5 (18 Downloads)

Synopsis The Risk-Based Approach to Data Protection by : Raphaël Gellert

The concept of a risk-based approach to data protection came to the fore during the overhaul process of the EU's General Data Protection Regulation (GDPR). At its core, it consists of endowing the regulated organizations that process personal data with increased responsibility for complying with data protection mandates. Such increased compliance duties are performed through risk management tools. This book provides a comprehensive analysis of this legal and policy development, which considers a legal, historical, and theoretical perspective. By framing the risk-based approach as a sui generis implementation of a specific regulation model known as meta regulation, this book provides a recollection of the policy developments that led to the adoption of the risk-based approach in light of regulation theory and debates. It also discusses a number of salient issues pertaining to the risk-based approach, such as its rationale, scope, and meaning; the role for regulators; and its potential and limits. The book also looks at they way it has been undertaken in major statutes with a focus on key provisions, such as data protection impact assessments or accountability. Finally, the book devotes considerable attention to the notion of risk. It explains key terms such as risk assessment and management. It discusses in-depth the role of harms in data protection, the meaning of a data protection risk, and the difference between risks and harms. It also critically analyses prevalent data protection risk management methodologies and explains the most important caveats for managing data protection risks.

APEC Privacy Framework

APEC Privacy Framework
Author :
Publisher :
Total Pages : 48
Release :
ISBN-10 : UCBK:C096499073
ISBN-13 :
Rating : 4/5 (73 Downloads)

Synopsis APEC Privacy Framework by :