-
1
-
-
0024011426
-
Information technology and dataveillance
-
May
-
Clarke, R., 'Information Technology and Dataveillance', Communications of the ACM, Vol. 31, No. 5, May 1988, pp. 498-512.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 498-512
-
-
Clarke, R.1
-
2
-
-
0034566648
-
The surveillant assemblage
-
The authors note contemporary activities in bringing surveillance systems together, whether for control, governance, security, profit or entertainment, Haggerty, K.D., and R.V. Ericson, "The Surveillant Assemblage', British Journal of Sociology, Vol. 51, No. 4, 2000, pp. 605-22.
-
(2000)
British Journal of Sociology
, vol.51
, Issue.4
, pp. 605-622
-
-
Haggerty, K.D.1
Ericson, R.V.2
-
3
-
-
85145543438
-
Soft surveillance. The growth of mandatory volunteerism in collecting personal information
-
note T. Monahan (ed.), Routledge, New York
-
By "banalisation", we mean making surveillance commonplace (banal), so that it becomes something we as a society do not care about. Banalised forms of surveillance enter our daily life without notice, so that they become a common part of our sociopolitical and economic relations, so that we become acclimatised or accustomed to surveillance in general, even if we are not always aware of the deployment of particularly intrusive forms of surveillance. The term is used to indicate the increasing pervasiveness of surveillance, right down to the level of the individual (parents monitoring their children's whereabouts or taking pictures of what their neighbours are doing). Some examples could be the capture, storage and processing of fingerprints of frequent costumers of sporting complexes, in order to ease their access to and use of facilities, or the processing of large amounts of personal data in social networks for running "small entertaining applications". In the field of law enforcement, it could be represented by the disproportionate retention of DNA in cases involving petty crimes. This idea partially resonates with the concepts of "soft surveillance", developed in Marx, G.T., "Soft Surveillance. The Growth of Mandatory Volunteerism in Collecting Personal Information", in T. Monahan (ed.), Surveillance and Security, Technological Politics and Power in Everyday Life, Routledge, New York, 2006, pp. 37-56.
-
(2006)
Surveillance and Security, Technological Politics and Power in Everyday Life
, pp. 37-56
-
-
Marx, G.T.1
-
4
-
-
77955621640
-
Variations sur le thème de la banalisation de la surveillance
-
For more on banalisation, see Bellanova, R., P. De Hert and S. Gutwirth, "Variations sur le thème de la banalisation de la surveillance", Mouvements, No. 62, 2010.
-
(2010)
Mouvements
, Issue.62
-
-
Bellanova, R.1
De Hert, P.2
Gutwirth, S.3
-
6
-
-
77955597118
-
-
As defined in the Merriam-Webster Online Dictionary, The English word originates from the French verb "surveiller", which, literally translated, means "to watch over".
-
As defined in the Merriam-Webster Online Dictionary, http://www.merriam- webster.com/dictionary/surveillance. The English word originates from the French verb "surveiller", which, literally translated, means "to watch over".
-
-
-
-
7
-
-
43249137304
-
Taking a look at surveillance studies
-
March
-
Jenness, V., D.A. Smith and J. Stepan-Norris, "Taking a Look at Surveillance Studies", Contemporary Sociology: A Journal of Reviews, Vol. 36, No. 2, March 2007, pp. vii-viii.
-
(2007)
Contemporary Sociology: A Journal of Reviews
, vol.36
, Issue.2
-
-
Jenness, V.1
Smith, D.A.2
Stepan-Norris, J.3
-
8
-
-
77955620413
-
-
This is a quote from the full title of Bentham, Jeremy, Panopticon, 1787, a copy of which can be found at
-
This is a quote from the full title of Bentham, Jeremy, Panopticon, 1787, a copy of which can be found at http://cartome.org/panopticon2.htm.
-
-
-
-
9
-
-
0003823523
-
Discipline and punish: The birth of the prison
-
New York
-
Foucault, M., Discipline and Punish: The Birth of the Prison, Vintage Books, New York, 1995, p. 195.
-
(1995)
Vintage Books
, pp. 195
-
-
Foucault, M.1
-
10
-
-
0038956417
-
Surveillance and the capitalist state
-
Macmillan, London
-
Giddens, A., "Surveillance and the capitalist state", in A Contemporary Critique of Historical Materialism, Macmillan, London, 1981, pp. 169-176.
-
(1981)
A Contemporary Critique of Historical Materialism
, pp. 169-176
-
-
Giddens, A.1
-
12
-
-
34249939882
-
Histoire de la sexualité 1
-
Gallimard, Paris
-
Foucault, M., Histoire de la sexualité 1. La volonté de savoir, Gallimard, Paris, 1976;
-
(1976)
La Volonté de Savoir
-
-
Foucault, M.1
-
13
-
-
77955156894
-
Sécurité, territoire, population
-
Gallimard/Seuil, Paris
-
Foucault, M., Sécurité, territoire, population. Cours au Collège de France. 1977-78, Gallimard/Seuil, Paris, 1997.
-
(1997)
Cours Au Collège de France. 1977-78
-
-
Foucault, M.1
-
14
-
-
60749100311
-
La société de sécurité maximale
-
Marx, G.T., "La société de sécurité maximale", Déviance et société, 1988, pp. 147-166.
-
(1988)
Déviance et Société
, pp. 147-166
-
-
Marx, G.T.1
-
15
-
-
10844269093
-
Contrôle et devenir" and "Post-scriptum sur les sociétés de contrôle
-
Minuit, Paris
-
See also Deleuze G., "Contrôle et devenir" and "Post-scriptum sur les sociétés de contrôle" in Pourparlers, 1972-1990, Minuit, Paris, 1990, pp. 240-247
-
(1990)
Pourparlers, 1972-1990
, pp. 240-247
-
-
Deleuze, G.1
-
16
-
-
77955636554
-
-
English translation available at
-
, English translation available at: http://www.watsoninstitute.org/ infopeace/vy2k/deleuze-societies.cfm.
-
-
-
-
17
-
-
0010110878
-
The punitive city: Notes on the dispersal of social control
-
Cohen, S., "The punitive city: notes on the dispersal of social control", Contemporary crises, 1979, pp. 339-63;
-
(1979)
Contemporary Crises
, pp. 339-363
-
-
Cohen, S.1
-
19
-
-
0142150513
-
-
Lyon, D. (ed.), Routledge, London
-
Lyon, D. (ed.), Surveillance as Social Sorting: Privacy, risk and digital discrimination, Routledge, London, 2003.
-
(2003)
Surveillance As Social Sorting: Privacy, Risk and Digital Discrimination
-
-
-
22
-
-
77955621990
-
-
House of Lords Select Committee on the Constitution, The Stationery Office Limited, London, 6 Feb
-
House of Lords Select Committee on the Constitution, Surveillance: Citizens and the State, Vol. I: Report, The Stationery Office Limited, London, 6 Feb 2009, p. 5. http://www.parliament. the-stationery-office.com/pa/ld200809/ ldselect/ldconst/18/1802htm.
-
(2009)
Surveillance: Citizens and the State, Vol. I: Report
, pp. 5
-
-
-
24
-
-
35548933157
-
-
House of Lords
-
House of Lords, Lyon, D., Surveillance Studies: An Overview, Polity Press, Cambridge, 2007, op. cit., p. 10.
-
(2007)
Surveillance Studies: An Overview
, pp. 10
-
-
Lyon, D.1
-
25
-
-
0004073139
-
-
The close relationship between privacy and freedom has featured in many scholarly texts, but the classic is that of Westin. He defined privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. He goes on to say that "a balance that ensures strong citadels of individual and group privacy and limits both disclosure and surveillance is a prerequisite for liberal democratic societies". Atheneum, New York, p. 24, Privacy, as manifested in the secret ballot, is at the heart of democracy, but as Westin and others have argued it is not an absolute right and must be balanced against other values .
-
The close relationship between privacy and freedom has featured in many scholarly texts, but the classic is that of Westin. He defined privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others." He goes on to say that "a balance that ensures strong citadels of individual and group privacy and limits both disclosure and surveillance is a prerequisite for liberal democratic societies". Westin, Alan F., Privacy and Freedom, Atheneum, New York, 1967, p. 7, p. 24, Privacy, as manifested in the secret ballot, is at the heart of democracy, but as Westin and others have argued it is not an absolute right and must be balanced against other values .
-
(1967)
Privacy and Freedom
, pp. 7
-
-
Westin Alan, F.1
-
26
-
-
77955594438
-
-
Among the civil society organisations were the Electronic Frontier Foundation, the Electronic Privacy Information Center and Privacy International. Among the experts were Colin Bennett, Roger Clarke, David Flaherty, Joel Reidenberg and Marc Rotenberg.
-
http://thepublicvoice.org/madrid-declaration. Among the civil society organisations were the Electronic Frontier Foundation, the Electronic Privacy Information Center and Privacy International. Among the experts were Colin Bennett, Roger Clarke, David Flaherty, Joel Reidenberg and Marc Rotenberg.
-
-
-
-
27
-
-
77955642932
-
Tories promise to slash surveillance state programme
-
17 Sept
-
Athow, D., "Tories Promise To Slash Surveillance State Programme", ITProPortal, 17 Sept 2009. http://www.itproportal.com/portal/ news/article/2009/9/17/tories-promise-slash-surveillancestate-programme.
-
(2009)
ITProPortal
-
-
Athow, D.1
-
28
-
-
77955606058
-
Personal privacy threatened by snooping councils
-
A recent report of the Interception of Communications Commissioner, compiled by Sir Paul Kennedy, has stated that one in every 78 adults in UK is under surveillance and nearly 1400 requests are made by government agencies every day to snoop on the public. 10 August
-
A recent report of the Interception of Communications Commissioner, compiled by Sir Paul Kennedy, has stated that one in every 78 adults in UK is under surveillance and nearly 1400 requests are made by government agencies every day to snoop on the public. Athow, D., "Personal Privacy Threatened By Snooping Councils", ItProPortal, 10 August, 2009. http://www. itproportal. com/portal/news/article/2009/8/10/personal-privacy- threatenedsnopping-council.
-
(2009)
ItProPortal
-
-
Athow, D.1
-
29
-
-
0012801915
-
-
Home Office Research, Development and Statistics Directorate, August
-
There has been a lot of debate about the effectiveness of CCTV. A UK Home Office study found that "the best current evidence suggests CCTV reduces crime to a small degree. CCTV is most effective in reducing vehicle crime in car parks, but it had little or no effect on crime in public transport and city centre settings". Welsh, Brandon C., and David P. Farrington, Crime prevention effects of closed circuit, television: a systematic review, Home Office Research, Development and Statistics Directorate, August 2002.
-
(2002)
Crime Prevention Effects of Closed Circuit, Television: A Systematic Review
-
-
Welsh Brandon, C.1
Farrington, D.P.2
-
30
-
-
33644672558
-
-
Home Office Research, Development and Statistics Directorate, Feb While CCTV may not reduce crime, it does have the merit of recording crime the images of which may be helpful in apprehending those who have committed them.
-
A second study for the Home Office three years later concluded that "Assessed on the evidence presented in this report, CCTV cannot be deemed a success. It has cost a lot of money and it has not produced the anticipated benefits." It did say, however, that CCTV "has potential, if properly managed... [but] ill-conceived solutions are unlikely to work no matter what the investment." Gill, Martin, and Angela Spriggs, Assessing the impact o/ CCTV, Home Office Research, Development and Statistics Directorate, Feb 2005, pp. 120-121. While CCTV may not reduce crime, it does have the merit of recording crime the images of which may be helpful in apprehending those who have committed them.
-
(2005)
Assessing the Impact O/ CCTV
, pp. 120-121
-
-
Gill, M.1
Spriggs, A.2
-
31
-
-
84886546493
-
Types of self-surveillance: From abnormality to individuals 'at risk'
-
The term self-surveillance is typically used in a slightly different context in the existing literature. See, e.g., Vaz, P., and F. Bruno, "Types of Self-Surveillance: from abnormality to individuals 'at risk'", Surveillance and Society, Vol.1, Issue 3, 2003, pp. 272-291.
-
(2003)
Surveillance and Society
, vol.1
, Issue.3
, pp. 272-291
-
-
Vaz, P.1
Bruno, F.2
-
32
-
-
84892262169
-
-
Hildebrandt, M., and S. Gutwirth (eds.), Springer, Dordrecht
-
Hildebrandt, M., and S. Gutwirth (eds.), Profiling the European citizen, Cross-disciplinary perspectives, Springer, Dordrecht, 2008.
-
(2008)
Profiling the European Citizen, Cross-disciplinary Perspectives
-
-
-
33
-
-
77955621043
-
-
See www.google.com/health/
-
-
-
-
34
-
-
77955605301
-
-
See www.healthvault.com
-
-
-
-
35
-
-
33750296881
-
SenseCam: A retrospective memory aid
-
Springer
-
Hodges, S., L. Williams, E. Berry, S. Izadi, J. Srinivasan, A. Butler, G. Smyth, N. Kapur and K. Wood, "SenseCam: A retrospective memory aid", Ubiquitous Computing, Proceedings of Ubicomp 2006, Springer, pp. 177-193.
-
Ubiquitous Computing, Proceedings of Ubicomp 2006
, pp. 177-193
-
-
Hodges, S.1
Williams, L.2
Berry, E.3
Izadi, S.4
Srinivasan, J.5
Butler, A.6
Smyth, G.7
Kapur, N.8
Wood, K.9
-
36
-
-
77955651738
-
-
See the websites www.myzeo.com, www.directlife.philips. com and nikerunning.nike,com/nikeos/p/nikeplus/en-US/ products/sportband respectively.
-
-
-
-
37
-
-
77955638395
-
-
See the websites www.foursquare.com and www.gowalla.com.
-
-
-
-
39
-
-
70349421911
-
-
Group of Personalities in the field of Security Research, Office for Official Publications of the European Communities, Luxembourg
-
Group of Personalities in the field of Security Research, "Research for a Secure Europe", Office for Official Publications of the European Communities, Luxembourg, 2004. http://ec.europa. eu/enterprise/policies/ security/files/doc/gop-en.pdf.
-
(2004)
Research for A Secure Europe
-
-
-
40
-
-
45849115348
-
Security research: The next steps
-
European Commission, final, Brussels, 2004.
-
European Commission, "Security Research: The Next Steps", COM(2004) 590 final, Brussels, 2004. http://cordis.europa.eu/documents/ documentlibrary/69322111FR6.pdf.
-
(2004)
COM
, pp. 590
-
-
-
41
-
-
77955598430
-
Meeting the challenge: The european security research agenda
-
European Security Research Advisory Board (ESRAB), Office for Official Publications of the European Communities, Luxembourg
-
European Security Research Advisory Board (ESRAB), "Meeting the challenge: the European Security Research Agenda", A report from the European Security Research Advisory Board, Office for Official Publications of the European Communities, Luxembourg, 2006. http://ec.europa.eu/enterprise/ policies/security/files/esrab-report-en.pdf.
-
(2006)
A Report from the European Security Research Advisory Board
-
-
-
42
-
-
77955608924
-
-
ESRAB, op. cit.
-
ESRAB, op. cit.
-
-
-
-
43
-
-
77955627436
-
-
ESRAB, op. cit, European Commission, DG Enterprise and Industry, Brussels
-
ESRAB, op. cit, European Commission, "Towards a more secure society and increased industrial competitiveness: Security research projects under the 7th Framework Programme for Research", DG Enterprise and Industry, Brussels, 2009. ftp://ftp. cordis.europa.eu/pub/fp7/security/docs/towards-a- more-secure- pdf.
-
(2009)
Towards A More Secure Society and Increased Industrial Competitiveness: Security Research Projects under the 7th Framework Programme for Research
-
-
-
45
-
-
77955651737
-
-
EC, final, op. cit.
-
EC, COM(2004) 590 final, op. cit.
-
(2004)
COM
, pp. 590
-
-
-
46
-
-
77954136032
-
An area of freedom, security and justice serving the citizen
-
European Commission, final, Brussels, 2009. This Communication is the basis of the multi-annual programme in the area of freedom, security and justice, known as the Stockholm programme.
-
European Commission, "An area of freedom, security and justice serving the citizen", COM(2009) 262 final, Brussels, 2009. This Communication is the basis of the multi-annual programme in the area of freedom, security and justice, known as the Stockholm programme.
-
(2009)
COM
, pp. 262
-
-
-
47
-
-
77955613483
-
-
The Swedish Presidency [of the EU] says (at the last mentioned website) that "The vision for work with the Stockholm Programme is a more secure and open Europe where the rights of individuals are safeguarded."
-
See also: http://www.se2009.eu/en/the-presidency/work-programme/the- stockholm-programme. The Swedish Presidency [of the EU] says (at the last mentioned website) that "The vision for work with the Stockholm Programme is a more secure and open Europe where the rights of individuals are safeguarded."
-
-
-
-
48
-
-
77955639471
-
-
EDPS, op. cit., para 23.
-
EDPS, op. cit., para 23.
-
-
-
-
49
-
-
77955590921
-
-
version 1.3, Statewatch, London, 30 Sept
-
Bunyan, T., The Shape of Things to Come, version 1.3, Statewatch, London, 30 Sept 2008, p. 7.
-
(2008)
The Shape of Things to Come
, pp. 7
-
-
Bunyan, T.1
-
51
-
-
77955609266
-
Smart surveillance - Effective information for public safety
-
Grapevine, TX, 5-9 June
-
Cooke, R., and K. Scruggs, "Smart Surveillance - Effective Information for Public Safety", Paper presented at: 30th Annual Law Enforcement Information Management Conference, Grapevine, TX, 5-9 June 2006. http://www.iacptechnology.org/LEIM/2006Presentations/Smart-Surveillance%20- Cooke-and-Scruggs, pdf
-
(2006)
30th Annual Law Enforcement Information Management Conference
-
-
Cooke, R.1
Scruggs, K.2
-
52
-
-
77955639788
-
-
European Council, Framework Decision 2008/977/JHA of 27 November 2008 on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters, OJ L 350, 30 Dec. 2008, pp. 60-71.
-
European Council, Framework Decision 2008/977/JHA of 27 November 2008 on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters, OJ L 350, 30 Dec. 2008, pp. 60-71.
-
-
-
-
53
-
-
77955634555
-
-
The 1993 Treaty of Maastricht introduced the three pillar EU structure, The first pillar comprised European Community economic, social and environmental policies. The second pillar was that of the Common Foreign and Security Policy and the third pillar supported police and judicial cooperation. The Lisbon Treaty did away with the three pillar structure on 1 December 2009
-
The 1993 Treaty of Maastricht introduced the three pillar EU structure, The first pillar comprised European Community economic, social and environmental policies. The second pillar was that of the Common Foreign and Security Policy and the third pillar supported police and judicial cooperation. The Lisbon Treaty did away with the three pillar structure on 1 December 2009.
-
-
-
-
55
-
-
77953989814
-
Shortcomings in EU data protection in the third and second pillars. Can the lisbon treaty be expected to help?
-
See Hijmans, H., and A. Scirocco, "Shortcomings in EU Data Protection in the Third and Second Pillars. Can the Lisbon Treaty be Expected to Help?", Common Market Law Review, Vol. 46, No. 5, 2009, pp, 1493-97;
-
(2009)
Common Market Law Review
, vol.46
, Issue.5
, pp. 1493-97
-
-
Hijmans, H.1
Scirocco, A.2
-
56
-
-
70249148953
-
The data protection framework decision of 27 November 2008 regarding police and judicial cooperation in criminal matters. A modest achievement however not the improvement some have hoped for
-
De Hert, P., and M.V. Papakonstantinou, "The data protection framework decision of 27 November 2008 regarding police and judicial cooperation in criminal matters. A modest achievement however not the improvement some have hoped for", Computer Law and Security Review, Vol. 25, No. 5, 2009, pp, 403-14.
-
(2009)
Computer Law and Security Review
, vol.25
, Issue.5
, pp. 403-414
-
-
De Hert, P.1
Papakonstantinou, M.V.2
-
57
-
-
77955597117
-
-
Actually referring to Schengen I (Agreement between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the gradual abolition of checks at their common borders, entered in 1985) and Schengen II or CIS (Convention implementing the Schengen Agreement of 14 June 1985 between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the gradual abolition of checks at their common borders, entered in 1990)
-
Actually referring to Schengen I (Agreement between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the gradual abolition of checks at their common borders, entered in 1985) and Schengen II or CIS (Convention implementing the Schengen Agreement of 14 June 1985 between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the gradual abolition of checks at their common borders, entered in 1990).
-
-
-
-
58
-
-
77955627223
-
-
European Council, Brussels, 26 July
-
European Council, Europol Convention, Brussels, 26 July 1995. http://www.europol.europa.eu/index.asp?page=legal.
-
(1995)
Europol Convention
-
-
-
59
-
-
77955641299
-
-
European Council Decision of 28 February 2002 setting up Eurojust with a view to reinforcing the fight against serious crime (2002/187/JHA), OJ L 63/1, 2002.
-
European Council Decision of 28 February 2002 setting up Eurojust with a view to reinforcing the fight against serious crime (2002/187/JHA), OJ L 63/1, 2002.
-
-
-
-
60
-
-
77955629707
-
-
European Council, Decision 2008/615/JHA of 23 June 2008 on the stepping up of cross-border cooperation, particularly in combating terrorism and cross-border crime, OJ L 210, 6 Aug. 2008, pp. 1-11.
-
European Council, Decision 2008/615/JHA of 23 June 2008 on the stepping up of cross-border cooperation, particularly in combating terrorism and cross-border crime, OJ L 210, 6 Aug. 2008, pp. 1-11.
-
-
-
-
61
-
-
77955635565
-
-
European Court of Human Rights, Application no, 58243/00, Strasbourg, 1 July
-
European Court of Human Rights, Case of Liberty and others versus United Kingdom, Application no, 58243/00, Strasbourg, 1 July 2008.
-
(2008)
Case of Liberty and Others Versus United Kingdom
-
-
-
62
-
-
77955634554
-
-
European Court of Human Rights, Application nos. 30562/04 and 30566/ 04, Strasbourg, 4 Dec
-
European Court of Human Rights, Case of S. and Marper versus the United Kingdom, Application nos. 30562/04 and 30566/ 04, Strasbourg, 4 Dec 2008.
-
(2008)
Case of S. and Marper Versus the United Kingdom
-
-
-
63
-
-
79959513852
-
Nouveaux éclairages de la notion de la notion de 'donnée personnelle' et application audacieuse du critère de proportionnalité
-
January 2010
-
De Beer, D., P. De Hert, G. Gonzalez Fuster and S. Gutwirth, "Nouveaux éclairages de la notion de la notion de 'donnée personnelle' et application audacieuse du critère de proportionnalité", Obs. Cour européenne des droits de l'homme Grande Chambre S et Marper c, Royaume Uni, 4 décembre 2008, Revue Trimestrielle des Droits de l'Homme, no. 81, January 2010, pp. 141-61.
-
(2008)
Obs. Cour Européenne des Droits de L'homme Grande Chambre S et Marper C, Royaume Uni, 4 Décembre
, Issue.81
, pp. 141-161
-
-
De Beer, D.1
De Hert, P.2
Gonzalez Fuster, G.3
Gutwirth, S.4
-
64
-
-
77955610290
-
TJCE - Sentencia de 04.12.2008, S. y Marper c. Reino Unido
-
May-Aug.
-
See also Gonzalez Fuster, G., "TJCE - Sentencia de 04.12.2008, S. y Marper c. Reino Unido", Revista de Derecho Comunitario Europeo, no. 33, May-Aug. 2009, pp. 619-33.
-
(2009)
Revista de Derecho Comunitario Europeo
, Issue.33
, pp. 619-633
-
-
Gonzalez Fuster, G.1
-
65
-
-
77955652478
-
Police routinely arresting people to get DNA, inquiry claims
-
24 Nov The way in which the UK government will implement the ECtHR decision is particularly relevant in a context characterised by the proliferation of international and European legal instruments aiming at establishing DNA analysis files in each EU Member State and fostering their exchange.
-
Travis, A., "Police routinely arresting people to get DNA, inquiry claims", The Guardian, 24 Nov 2009. http://www.guardian. co.uk/politics/2009/nov/24/dna-database-inquiry. The way in which the UK government will implement the ECtHR decision is particularly relevant in a context characterised by the proliferation of international and European legal instruments aiming at establishing DNA analysis files in each EU Member State and fostering their exchange.
-
(2009)
The Guardian
-
-
Travis, A.1
-
66
-
-
77955650469
-
Prüm: A model "Prêtà-exporter"? The 2008 German-US agreement on data Exchange
-
12 March
-
See Bellanova, R., "Prüm: A Model "Prêtà- Exporter"? The 2008 German-US Agreement on Data Exchange", CEPS Challenge Paper No. 13, 12 March 2009.
-
(2009)
CEPS Challenge Paper No. 13
-
-
Bellanova, R.1
-
68
-
-
85044903749
-
Protection des données personnelles et mesures de sécurité: Vers une perspective transatlantique
-
On the EU and US privacy and data protection frameworks covering security measures, see also Bellanova, R., and P, De Hert, "Protection des données personnelles et mesures de sécurité: vers une perspective transatlantique", Cultures & Conflits, Vol. 74, 2009, pp. 63-80.
-
Cultures & Conflits
, vol.74
, Issue.2009
, pp. 63-80
-
-
Bellanova, R.1
De Hert, P.2
-
69
-
-
77955639470
-
-
We define "stakeholder" to mean anyone interested in or affected by an action by a third party
-
We define "stakeholder" to mean anyone interested in or affected by an action by a third party.
-
-
-
-
70
-
-
77955637055
-
-
www.european-privacy-seal.eu/.
-
-
-
-
73
-
-
25844488563
-
-
This definition combines two: one from the Treasury Board Secretariat of Canada, Ottawa, 31 August
-
This definition combines two: one from the Treasury Board Secretariat of Canada, Privacy Impact Assessment Guidelines: A framework to Manage Privacy Risks, Ottawa, 31 August 2002. http://www.tbs-sct.gc.ca/pubs-pol/ciopubs/pia- pefr/paipg-pefrld1-eng asp.
-
(2002)
Privacy Impact Assessment Guidelines: A Framework to Manage Privacy Risks
-
-
-
74
-
-
63849328022
-
Privacy impact assessment: Its origins and development
-
Clarke has also compiled a list of various definitions in Appendix 1 of his paper.
-
The other comes from Clarke, R., "Privacy impact assessment: Its origins and development", Computer Law and Security Review, Vol. 25, Issue 2, 2009, pp. 123-35. Clarke has also compiled a list of various definitions in Appendix 1 of his paper.
-
(2009)
Computer Law and Security Review
, vol.25
, Issue.2
, pp. 123-135
-
-
Clarke, R.1
-
76
-
-
77955648008
-
-
note
-
Another important term to distinguish in this context is "prior checking", which appears in Article 20 of the European Data Protection Directive and which says in part that "Member States shall determine the processing operations likely to present specific risks to the rights and freedoms of data subjects and shall check that these processing operations are examined prior to the start thereof," The European Data Protection Supervisor (EDPS) has a similar power under a Regulation of the European Parliament and Council, which obliges European Community institutions and bodies to inform the EDPS when they draw up administrative measures relating to the processing of personal data. See Regulation (EC) No 45/2001 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data, 18 Dec 2000. http://www.europarl.europa,eu/tools/disclaimer/documents/l- 00820010112en00010022.pdf
-
-
-
-
77
-
-
77955633577
-
-
International Organization for Standardization, ISO 22307: 2008: Financial services - Privacy impact assessment, Geneva, 16 Apr 2008.
-
International Organization for Standardization, ISO 22307: 2008: Financial services - Privacy impact assessment, Geneva, 16 Apr 2008. http://www.iso.org/iso/iso-catalogue/catalogue-tc/catalogue-detail.htm?csnumber= 40897.
-
-
-
-
78
-
-
77955593764
-
-
https://www.agpd.es/portalweb/canaldocumentacion/common/ estandares-resolucion-madrid-en.pdf
-
-
-
-
79
-
-
85029672701
-
Picturing algorithmic surveillance: The politics of facial recognition systems
-
[p.178]. The authors also make the useful observation that "If there is any 'law' in the history of technology it is that technologies are rarely used in ways that their inventors intended" - which is another reason why a PIA should be undertaken, i.e., so that stakeholders can give consideration to ways in which technologies might be used in addition to the way they are intended to be used.
-
Introna, Lucas D., and David Wood, "Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems", Surveillance & Society, Vol. 2, Issue 2/3, 2004, pp. 177-198 [p.178]. http://www.surveillance-and-society.org/cctv.htm. The authors also make the useful observation that "If there is any 'law' in the history of technology it is that technologies are rarely used in ways that their inventors intended" - which is another reason why a PIA should be undertaken, i.e., so that stakeholders can give consideration to ways in which technologies might be used in addition to the way they are intended to be used.
-
(2004)
Surveillance & Society
, vol.2
, Issue.2-3
, pp. 177-198
-
-
Introna Lucas, D.1
Wood, D.2
-
82
-
-
0037985451
-
Digitizing surveillance: Categorization, space, inequality
-
[p.231].
-
Graham, Stephen, and David Wood, "Digitizing Surveillance: Categorization, Space, Inequality", Critical Social Policy, Vol, 23, No. 2, 2003, pp. 227-248 [p.231].
-
(2003)
Critical Social Policy
, vol.23
, Issue.2
, pp. 227-248
-
-
Graham, S.1
Wood, D.2
-
83
-
-
34147170728
-
Privacy, data protection and law enforcement. Opacity of the individual and transparency of power
-
E. Claes, A. Duff & S. Gutwirth (eds.) Intersentia, Antwerp
-
De Hert, P., and S. Gutwirth, "Privacy, data protection and law enforcement. Opacity of the individual and transparency of power" in E. Claes, A. Duff & S. Gutwirth (eds.), Privacy and the criminal law, Intersentia, Antwerp, 2006.
-
(2006)
Privacy and the Criminal Law
-
-
De Hert, P.1
Gutwirth, S.2
-
84
-
-
77955633915
-
-
Bigo, D., E. Guittet and A. Scherrer (eds.) Athena, Montréal, October
-
Bigo, D., E. Guittet and A. Scherrer (eds.) Mobilités sous surveillance, comparaison Europe et Canada, Athena, Montréal, October 2009.
-
(2009)
Mobilités Sous Surveillance, Comparaison Europe et Canada
-
-
-
85
-
-
77955642640
-
Interpol proposes world face-recognition database
-
20 Oct
-
Page, L., "Interpol proposes world face-recognition database", The Register, 20 Oct 2008. http://www.theregister.co.uk/2008/10/20/interpol- face-scan-plan/.
-
(2008)
The Register
-
-
Page, L.1
-
86
-
-
77955619458
-
Should privacy impact assessments be mandatory?
-
2011 (forthcoming)
-
Wright, David, "Should privacy impact assessments be mandatory?", Communications of the ACM , 2011 (forthcoming).
-
(2011)
Communications of the ACM
-
-
Wright, D.1
-
87
-
-
77955606057
-
-
COST = Cooperation in Science and Technology. See
-
COST = Cooperation in Science and Technology. See http://www.liss-cost. eu/
-
-
-
|