-
2
-
-
77957945930
-
-
Judicial actions to remove a harmful publication from the internet often end up in slow procedures that further increase the harm. The effectiveness of judicial actions is therefore often very low
-
Judicial actions to remove a harmful publication from the internet often end up in slow procedures that further increase the harm. The effectiveness of judicial actions is therefore often very low.
-
-
-
-
3
-
-
77957957787
-
-
See the criticism of the Google Buzz default settings, expressed in the open letter referred to in footnote 22 below
-
See the criticism of the Google Buzz default settings, expressed in the open letter referred to in footnote 22 below.
-
-
-
-
4
-
-
77957939702
-
On the leakage of personally identifiable information via online social networks
-
Depending on the survey considered, only 45% of all users (according to some surveys even only 3%) change the default settings available at See also R. Gross and A. Acquisti "Information Revelation and Privacy in Online Social Networks (The Facebook case)", ACM Workshop on Privacy in the Electronic Society (WPES) available at www.heinz.cmu.edu/%7Eacquisti/papers/privacy- facebook-gross-acquisti.pdf; and I. Brown, "Data protection: the new technical and political environment", Computers & Law, February/March 2010
-
Depending on the survey considered, only 45% of all users (according to some surveys even only 3%) change the default settings. See Krishnamurthy B. and C.E. Wills, "On the Leakage of Personally Identifiable Information Via Online Social Networks", paper presented at the SIGCOMM 2009 conference, available at http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/ p7.pdf. See also R. Gross and A. Acquisti, "Information Revelation and Privacy in Online Social Networks (The Facebook case)", ACM Workshop on Privacy in the Electronic Society (WPES), 2005, available at www.heinz.cmu.edu/%7Eacquisti/papers/privacy-facebook-gross-acquisti.pdf; and I. Brown, "Data protection: the new technical and political environment", Computers & Law, February/March 2010, p. 42.
-
(2005)
Paper Presented at the SIGCOMM 2009 Conference
, pp. 42
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
5
-
-
73649128920
-
Social networking: A conceptual analysis of a data controller
-
R. Wong, "Social networking: a conceptual analysis of a data controller", Communications Law, Vol.14, No.5, 2009, p. 143.
-
(2009)
Communications Law
, vol.14
, Issue.5
, pp. 143
-
-
Wong, R.1
-
6
-
-
77957955266
-
Data protection: The new technical and political environment
-
available at www.compseconline.com/publications/prodclaw.htm computer law & secu rity review 2 0267-3649/e see front matter 2010 Patrick Van Eecke & Maarten Truyens. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.clsr.2010.07.006
-
I. Brown, "Data protection: the new technical and political environment", Computers & Law, February/March 2010, p. 41. available at www.sciencedirect.com www.compseconline.com/publications/prodclaw.htm comp u t e r law & s e c u rity rev iew 2 6 ( 2 0 1 0 ) 5 3 5 e5 4 6 0267-3649/e see front matter 2010 Patrick Van Eecke & Maarten Truyens. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.clsr.2010.07.006
-
(2010)
Computers & Law, February/March 2010
, vol.26
, Issue.41
, pp. 535-546
-
-
Brown, I.1
-
7
-
-
77957931872
-
Opinion 5/2009 on online social networking (hereinafter "opinion 163")
-
o.c approved on 12 June 2009, available at the Working Partys website 12-15; OFCOM, Social Networking: A quantitative and qualitative research report into attitudes, behaviours and use, 2 April 2008, p. 53
-
R. Wong, o.c, Opinion 5/2009 on online social networking (hereinafter "Opinion 163"), approved on 12 June 2009, available at the Working Partys website, p. 4; ENISA Position Paper No. 1, o.c., p. 12e15; OFCOM, Social Networking: A quantitative and qualitative research report into attitudes, behaviours and use, 2 April 2008, p. 53.
-
ENISA Position Paper No. 1, O.c.
, pp. 4
-
-
Wong, R.1
-
12
-
-
77957970269
-
Behavioural targeting of online advertisements and the future of data protection
-
February/March 2009 Working Party 29, Opinion 2/2010 on online behavioural advertising, adopted on 22 June 2010, available on the Working Partys website
-
A.M. Matwyshyn, "Behavioural Targeting of Online Advertisements and the Future of Data Protection", Computers & Law, February/March 2009, p. 24e26; Working Party 29, Opinion 2/2010 on online behavioural advertising, adopted on 22 June 2010, available on the Working Partys website.
-
Computers & Law
, pp. 24-26
-
-
Matwyshyn, A.M.1
-
14
-
-
77957965122
-
-
o.c. ENISA Position Paper No. 1, o.c., p. 9
-
Rome memorandum, o.c., p.3; ENISA Position Paper No. 1, o.c., p. 9.
-
Rome Memorandum
, pp. 3
-
-
-
15
-
-
77957963446
-
-
Several new services constitute an interesting illustration. For example, Blippy.com enables a user to provide his friends with full access to his credit card payments; Belysio.com enables a user to inform his friends about his (geographical) whereabouts; Twitter.com allows a user to inform the public at large about his daily activities
-
Several new services constitute an interesting illustration. For example, Blippy.com enables a user to provide his friends with full access to his credit card payments; Belysio.com enables a user to inform his friends about his (geographical) whereabouts; Twitter.com allows a user to inform the public at large about his daily activities.
-
-
-
-
19
-
-
77957941518
-
-
I.e. the previously mentioned Opinion 163
-
I.e. the previously mentioned Opinion 163.
-
-
-
-
20
-
-
77957967106
-
-
See footnote 9
-
See footnote 9.
-
-
-
-
22
-
-
77957944860
-
-
See www.priv.gc.ca/media/nr-c/2010/let-100420-e.cfm The letter, the authorities express their concerns about privacy issues related to Google Buzz (particularly the initial default settings for Google Buzz)
-
See www.priv.gc.ca/media/nr-c/2010/let-100420-e.cfm. The letter was sent by the data protection authorities of Canada, France, Germany, Israel, Italy, Ireland, Netherlands, New Zealand, Spain and the United Kingdom. In the letter, the authorities express their concerns about privacy issues related to Google Buzz (particularly the initial default settings for Google Buzz).
-
The Letter Was Sent by the Data Protection Authorities of Canada, France, Germany, Israel, Italy, Ireland, Netherlands, New Zealand, Spain and the United Kingdom
-
-
-
23
-
-
77957960295
-
-
Available at
-
Available at www.priv.gc.ca/cf-dc/2009/2009-008-0716-e.cfm.
-
-
-
-
25
-
-
77957948351
-
-
For an overview, see R. Wong, o.c., p. 145 and 146
-
For an overview, see R. Wong, o.c., p. 145 and 146.
-
-
-
-
27
-
-
77957951300
-
-
This position was repeated in Opinion 163, p. 5
-
This position was repeated in Opinion 163, p. 5.
-
-
-
-
30
-
-
77957950275
-
-
" Session cookies" are merely temporary cookies, which are automatically deleted when the browser is closed. As a result, such cookies do not lend themselves to becoming a gateway for the collection of personal data. Also, many permanent ("persistent") cookies are used for merely technical reasons, without any hidden purpose to collect personal data
-
" Session cookies" are merely temporary cookies, which are automatically deleted when the browser is closed. As a result, such cookies do not lend themselves to becoming a gateway for the collection of personal data. Also, many permanent ("persistent") cookies are used for merely technical reasons, without any hidden purpose to collect personal data.
-
-
-
-
32
-
-
77957931675
-
-
For example a consumer who would place an order with an American supplier by telephone See below, section 3.4.1
-
For example a consumer who would place an order with an American supplier by telephone. See below, section 3.4.1.
-
-
-
-
33
-
-
77957966470
-
-
See nr. 69 (own emphasis): "If Article 25 of Directive 95/46 were interpreted to mean that there is transfer [of data] to a third country every time that personal data are loaded onto an internet page, that transfer would necessarily be a transfer to all the third countries where there are the technical means needed to access the internet. The special regime provided for by Chapter IV of the directive would thus necessarily become a regime of general application, as regards operations on the internet. Thus, if the Commission found, pursuant to Article 25(4) of Directive 95/46, that even one third country did not ensure adequate protection, the Member States would be obliged to prevent any personal data being placed on the internet."
-
See nr. 69 (own emphasis): "If Article 25 of Directive 95/46 were interpreted to mean that there is transfer [of data] to a third country every time that personal data are loaded onto an internet page, that transfer would necessarily be a transfer to all the third countries where there are the technical means needed to access the internet. The special regime provided for by Chapter IV of the directive would thus necessarily become a regime of general application, as regards operations on the internet. Thus, if the Commission found, pursuant to Article 25(4) of Directive 95/46, that even one third country did not ensure adequate protection, the Member States would be obliged to prevent any personal data being placed on the internet."
-
-
-
-
34
-
-
77957936409
-
-
The notification duty (article 18) is another example. It is highly questionable whether the European legislator would have imposed this notification duty when it would have been aware that even the most basic actions on the internet may qualify as a processing of personal data, and thus require the submission of the notification
-
The notification duty (article 18) is another example. It is highly questionable whether the European legislator would have imposed this notification duty when it would have been aware that even the most basic actions on the internet may qualify as a processing of personal data, and thus require the submission of the notification.
-
-
-
-
35
-
-
77957946388
-
-
R. Wong, o.c., p. 142
-
R. Wong, o.c., p. 142.
-
-
-
-
36
-
-
77957948745
-
-
In the same vein: C. Kuner, o.c., nrs. 2.23 to 2.26
-
In the same vein: C. Kuner, o.c., nrs. 2.23 to 2.26
-
-
-
-
37
-
-
77957939701
-
-
Identity in the Information Society, September 2009
-
B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, "Social networks and Web 20: are users also bound by data protection regulations?", Identity in the Information Society, September 2009.
-
Social Networks and Web 20: Are Users Also Bound by Data Protection Regulations?
-
-
Van Alsenoy, B.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
38
-
-
77957964077
-
-
For example, the users web browsing behaviour, as registered by the log files and cookies
-
For example, the users web browsing behaviour, as registered by the log files and cookies.
-
-
-
-
39
-
-
77957966265
-
-
If both the user and the social networks servers are located outside the European Union, then it could be argued that the Directive does not apply (not even according to the "cookie theory" upheld by Working Party 29)
-
If both the user and the social networks servers are located outside the European Union, then it could be argued that the Directive does not apply (not even according to the "cookie theory" upheld by Working Party 29).
-
-
-
-
40
-
-
77957953973
-
-
note
-
Bebo (www.bebo.com/Privacy2.jsp) "Bebo may transfer information about you and your use of Bebo, such as your IP-address, information stored via cookies, and other demographic information about you, to our advertising affiliates (such as Advertising.com), partners (including Yahoo! and its affiliates) and other third parties. This information may be used to provide advertising, promotions and other products and services that may be of particular interest to you."; Myspace (www.myspace.com/index.cfm/ fuseactionmisc. privacy): "MySpace also may share your PII with Affiliated Companies if it has a business reason to do so."; Hyves (www.hyves.nl/privacy/): "Hyves uses the information about you to let Hyves respond better to your wishes and needs. It can for instance be used to make sure that you will see adverts better suited to you. Were trying to match adverts and campaigns to your profile."; Myspace (www.facebook.com/terms. php): "For content that is covered by intellectual property rights, like photos and videos ("IP content"), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sublicensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook ("IP License")."
-
-
-
-
41
-
-
77957941951
-
-
For example using the users age or hobbies to display personalised advertisements
-
For example using the users age or hobbies to display personalised advertisements.
-
-
-
-
42
-
-
77957946581
-
-
For example Myspace, LinkedIn, Bebo and Hyves
-
For example Myspace, LinkedIn, Bebo and Hyves.
-
-
-
-
43
-
-
77957958017
-
-
See below, section 5.2.3
-
See below, section 5.2.3.
-
-
-
-
44
-
-
77957964302
-
-
Opinion 1/2010 on the concepts of "controller" and "processor", 16 February 2010
-
Opinion 1/2010 on the concepts of "controller" and "processor", 16 February 2010.
-
-
-
-
45
-
-
77957940472
-
-
See the conclusion on p. 33: "However, [the Working Party] has not found any reason to think that the current distinction between controllers and processors would no longer be relevant and workable in that perspective."
-
See the conclusion on p. 33: "However, [the Working Party] has not found any reason to think that the current distinction between controllers and processors would no longer be relevant and workable in that perspective."
-
-
-
-
46
-
-
77957956272
-
-
See, for example, the explanation of the concept of "means" on p. 14: "means does not only refer to the technical ways of processing personal data, but also to the "how" of processing, which includes questions like "which data shall be processed", "which third parties shall have access to this data", "when data shall data be deleted"
-
See, for example, the explanation of the concept of "means" on p. 14: "means does not only refer to the technical ways of processing personal data, but also to the "how" of processing, which includes questions like "which data shall be processed", "which third parties shall have access to this data", "when data shall data be deleted".
-
-
-
-
47
-
-
77957934472
-
-
For example, "purpose and means" is interpreted as "purpose or means": "while determining the purpose of the processing would in any case trigger the qualification as controller, determining the means would imply control only when the determination concerns the essential elements of the means." (p. 14)
-
For example, "purpose and means" is interpreted as "purpose or means": "while determining the purpose of the processing would in any case trigger the qualification as controller, determining the means would imply control only when the determination concerns the essential elements of the means." (p. 14).
-
-
-
-
49
-
-
77957945256
-
-
For example when a law or established legal practice has imposed the distribution of responsibilities
-
For example when a law or established legal practice has imposed the distribution of responsibilities.
-
-
-
-
51
-
-
77957956510
-
-
See, for example, the quotes in footnotes 47 and 52
-
See, for example, the quotes in footnotes 47 and 52.
-
-
-
-
52
-
-
77957957179
-
-
See p. 19: "joint control will arise when different parties determine with regard to specific processing operations either the purpose or those essential elements of the means which characterize a controller"
-
See p. 19: "joint control will arise when different parties determine with regard to specific processing operations either the purpose or those essential elements of the means which characterize a controller".
-
-
-
-
53
-
-
77957937206
-
-
See p. 21
-
See p. 21.
-
-
-
-
54
-
-
77957964710
-
-
Although the Opinion explicitly mentions the example of social networks in the section on joint controllership, it does not explicitly state that the social network operator and the users are effectively considered joint controllers
-
Although the Opinion explicitly mentions the example of social networks in the section on joint controllership, it does not explicitly state that the social network operator and the users are effectively considered joint controllers.
-
-
-
-
55
-
-
77957942579
-
-
In some cases (such as LinkedIn), the social network is deliberately targeted at professionals
-
In some cases (such as LinkedIn), the social network is deliberately targeted at professionals.
-
-
-
-
56
-
-
77957932504
-
-
Rome memorandum, o.c., p. 2
-
Rome memorandum, o.c., p. 2.
-
-
-
-
57
-
-
77957951928
-
-
Recital 12 of the Directive
-
Recital 12 of the Directive.
-
-
-
-
58
-
-
77957945929
-
-
Art. 9 of the Directive also refers to the exemption for journalistic purposes, or for the purpose of artistic or literary expression (see also Opinion 163, p. 6). In our opinion, this exemption will only rarely apply in the context of social networks. See also C-73/07, OJC44 (21 February 2009), regarding the publication of publicly available tax data from Finish citizens
-
Art. 9 of the Directive also refers to the exemption for journalistic purposes, or for the purpose of artistic or literary expression (see also Opinion 163, p. 6). In our opinion, this exemption will only rarely apply in the context of social networks. See also C-73/07, OJC44 (21 February 2009), regarding the publication of publicly available tax data from Finish citizens. A newspaper publishing this data was considered to fall within the scope of the exemption for journalistic purposes.
-
A Newspaper Publishing This Data Was Considered to Fall Within the Scope of the Exemption for Journalistic Purposes
-
-
-
59
-
-
77957967328
-
-
Case C-101/01 of 6 november 2003
-
Case C-101/01 of 6 november 2003.
-
-
-
-
60
-
-
77957943310
-
-
See nrs. 46e48
-
See nrs. 46e48.
-
-
-
-
62
-
-
77957960936
-
-
Opinion 163, o.c., p. 6 and 7
-
Opinion 163, o.c., p. 6 and 7.
-
-
-
-
63
-
-
77957954187
-
-
For example, the default settings of Facebook allow every (even non-registered) user to get access to thumbnail pictures of random friends of users; the popular social network site LinkedIn presents itself as a professionally-oriented social network; the privacy policy of Twitter states that "our default is almost always to make the information you provide public"; etc
-
For example, the default settings of Facebook allow every (even non-registered) user to get access to thumbnail pictures of random friends of users; the popular social network site LinkedIn presents itself as a professionally-oriented social network; the privacy policy of Twitter states that "our default is almost always to make the information you provide public"; etc.
-
-
-
-
64
-
-
77957931259
-
SNS privacy practices: Canada, the EU and beyond
-
In the same vein: P. James, "SNS Privacy Practices: Canada, the EU and Beyond", Computers & Law, November 2009, p. 28.
-
(2009)
Computers & Law, November
, pp. 28
-
-
James, P.1
-
65
-
-
77957955635
-
-
In addition, many social network operators partially expose their network to third parties through the use of so-called application programming interfaces ("API"), for example to foster the exchange of data. Many social networks (including Hi5.com, MySpace, Google/Orkut, Netlog, Friendster and Yahoo!) have also subscribed to the "OpenSocial" initiative (code.google.com/apis/opensocial), which provides a common interface for social networks
-
In addition, many social network operators partially expose their network to third parties through the use of so-called application programming interfaces ("API"), for example to foster the exchange of data. Many social networks (including Hi5.com, MySpace, Google/Orkut, Netlog, Friendster and Yahoo!) have also subscribed to the "OpenSocial" initiative (code.google.com/apis/opensocial), which provides a common interface for social networks. The privacy impact of such APIs depends significantly on the access granted by the social network operator.
-
The Privacy Impact of Such APIs Depends Significantly on the Access Granted by the Social Network Operator
-
-
-
69
-
-
77957947137
-
-
See for example the terms of use of Facebook MySpace: "Third party applications (such as widgets) created by third party developers may also be available on the MySpace Services.. (.) However, MySpace does not control the third party developers, and cannot dictate their actions. When a Member engages with a third party application, that Member is interacting with the third party developer, not with MySpace."
-
See for example the terms of use of Facebook: "Facebook is not just a website. It is also a service for sharing your information on Facebook-enhanced applications and websites. You can control how you share information with those third party applications." and MySpace: "Third party applications (such as widgets) created by third party developers may also be available on the MySpace Services.. (.) However, MySpace does not control the third party developers, and cannot dictate their actions. When a Member engages with a third party application, that Member is interacting with the third party developer, not with MySpace."
-
Facebook Is Not Just A Website. It Is Also A Service for Sharing Your Information on Facebook-enhanced Applications and Websites. You Can Control How You Share Information with Those Third Party Applications
-
-
-
70
-
-
77957946820
-
-
C. Kuner, o.c., section 2.10
-
C. Kuner, o.c., section 2.10.
-
-
-
-
71
-
-
77957965120
-
-
o.c.
-
G. González Fuster and S. Gutwirth, o.c., p. 354. Position of Working Party 29: see Opinion nr. 4/2007 on the concept of personal data (WP 136), adopted on 20 June 2007 (p. 16 and 17), as well as Opinion 1/2008 on data protection issues related to search engines, adopted on 8 April 2008, p. 8
-
Position of Working Party 29: See Opinion Nr. 4/2007 on the Concept of Personal Data (WP 136), Adopted on 20 June 2007 (P. 16 and 17), As Well As Opinion 1/2008 on Data Protection Issues Related to Search Engines, Adopted on 8 April 2008, P. 8
, pp. 354
-
-
González Fuster, G.1
Gutwirth, S.2
-
72
-
-
77957965328
-
-
In addition to the obligations imposed by the legal framework, the Working Party also requests social network operators to: ensure privacy-friendly default settings; warn users to get the consent of third parties in order to publish their personal data; publish a clearly visible hyperlink to the complaints procedure on the homepage of het social network; allow the use of pseudonyms on the network; etc
-
In addition to the obligations imposed by the legal framework, the Working Party also requests social network operators to: ensure privacy-friendly default settings; warn users to get the consent of third parties in order to publish their personal data; publish a clearly visible hyperlink to the complaints procedure on the homepage of het social network; allow the use of pseudonyms on the network; etc.
-
-
-
-
73
-
-
77957962416
-
-
See, for example 16 January 2008 (press release French CNIL); "CBP treedt op tegen onrechtmatig verzamelen van persoonsgegevens op internet", 24 March 2009 (press release Dutch College Bescherming Persoonsgegevens); "Facebook faces UK data probe", available at theregister.co.uk/2007/ 11/20/facebook-uk-data-protection/
-
See, for example, "Facebook et vie privée, face face", 16 January 2008 (press release French CNIL); "CBP treedt op tegen onrechtmatig verzamelen van persoonsgegevens op internet", 24 March 2009 (press release Dutch College Bescherming Persoonsgegevens); "Facebook faces UK data probe", available at theregister.co.uk/2007/11/20/facebook-uk- data-protection/.
-
Facebook et Vie Privée, Face A Face
-
-
-
74
-
-
77957940066
-
-
Lindqvist case, see section 3.4.1 above
-
Lindqvist case, see section 3.4.1 above.
-
-
-
-
75
-
-
77957943532
-
-
In the same vein: T. Leonard and A. Mention, o.c., p. 103; B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, o.c., p. 11
-
In the same vein: T. Leonard and A. Mention, o.c., p. 103; B. Van Alsenoy, J. Ballet, A. Kuczerawy and J. Dumortier, o.c., p. 11.
-
-
-
-
76
-
-
77957949172
-
-
See Rome memorandum, o.c., p. 5, referring to a statement of Facebook, according to which less than 0.25% of all users effectively consult the privacy policy
-
See Rome memorandum, o.c., p. 5, referring to a statement of Facebook, according to which less than 0.25% of all users effectively consult the privacy policy.
-
-
-
-
77
-
-
77957951728
-
-
G. González Fuster and S. Gutwirth, o.c., p. 354e355
-
G. González Fuster and S. Gutwirth, o.c., p. 354e355.
-
-
-
-
78
-
-
77957960935
-
Will social networking services survive only at the expense of privacy?
-
November
-
P. Hutchinson, "Will social networking services survive only at the expense of privacy?", Computers & Law, November 2009, p. 31.
-
(2009)
Computers & Law
, pp. 31
-
-
Hutchinson, P.1
-
79
-
-
77957936620
-
-
For example, in our opinion, a user does not require explicit consent in order to publish a holiday group photo or a blog in which a user describes a visit of a museum. On the contrary, explicit consent will be required to publish a photo that depicts a drunken friend or the children of a family member
-
For example, in our opinion, a user does not require explicit consent in order to publish a holiday group photo or a blog in which a user describes a visit of a museum. On the contrary, explicit consent will be required to publish a photo that depicts a drunken friend or the children of a family member.
-
-
-
-
80
-
-
77957948168
-
-
See section 3.9 of the Opinion
-
See section 3.9 of the Opinion.
-
-
-
-
81
-
-
77957953780
-
-
For example, the Facebook privacy policy (www.facebook.com/policy.php) states in section 6: "Even after you remove information from your profile or delete your account, copies of that information may remain viewable elsewhere to the extent it has been shared with others, it was otherwise distributed pursuant to your privacy settings, or it was copied or stored by other users".conversely, the privacy policy of LinkedIn states An independent survey seems to boil down to the same result for MySpace
-
For example, the Facebook privacy policy (www.facebook.com/policy.php) states in section 6: "Even after you remove information from your profile or delete your account, copies of that information may remain viewable elsewhere to the extent it has been shared with others, it was otherwise distributed pursuant to your privacy settings, or it was copied or stored by other users".conversely, the privacy policy of LinkedIn states "If you update any of your information, we may keep a copy of the information which you originally provided to us in our archives for uses documented herein." An independent survey seems to boil down to the same result for MySpace (see
-
If You Update Any of Your Information, We May Keep A Copy of the Information Which You Originally Provided to Us in Our Archives for Uses Documented Herein
-
-
-
82
-
-
77957939283
-
-
See, however, our general reservations regarding privacy policies in section 12 above. Burying important privacy aspects in long privacy policies is increasingly criticized by Working Party 29 and the national data protection authorities
-
See, however, our general reservations regarding privacy policies in section 12 above. Burying important privacy aspects in long privacy policies is increasingly criticized by Working Party 29 and the national data protection authorities.
-
-
-
-
83
-
-
77957960296
-
-
See Commission Decision 2000/520/EC of 26.7.2000 on the adequacy of the protection provided by the safe harbor privacy principles and related frequently asked questions issued by the US Department of Commerce
-
See Commission Decision 2000/520/EC of 26.7.2000 on the adequacy of the protection provided by the safe harbor privacy principles and related frequently asked questions issued by the US Department of Commerce.
-
-
-
-
85
-
-
77957965122
-
-
o.c. The use of the "Binding Corporate Rules", which is focused on multinationals, is not relevant in the relation between users and social network operators
-
Rome memorandum, o.c., p. 2. The use of the "Binding Corporate Rules", which is focused on multinationals, is not relevant in the relation between users and social network operators.
-
Rome Memorandum
, pp. 2
-
-
-
86
-
-
77957950047
-
-
See the prior discussion in section 3.4.1 above
-
See the prior discussion in section 3.4.1 above.
-
-
-
-
87
-
-
77957961599
-
-
See nr. 62: "It is in that light that it must be examined whether the Community legislature intended, for the purposes of the application of Chapter IV of Directive 95/46, to include within the expression transfer [of data] to a third country within the meaning of Article 25 of that directive activities such as those carried out by Mrs Lindqvist. It must be stressed that the fifth question asked by the referring court concerns only those activities and not those carried out by the hosting providers."
-
See nr. 62: "It is in that light that it must be examined whether the Community legislature intended, for the purposes of the application of Chapter IV of Directive 95/46, to include within the expression transfer [of data] to a third country within the meaning of Article 25 of that directive activities such as those carried out by Mrs Lindqvist. It must be stressed that the fifth question asked by the referring court concerns only those activities and not those carried out by the hosting providers.".
-
-
-
-
88
-
-
77957937827
-
-
See nr. 68
-
See nr. 68.
-
-
-
-
89
-
-
77957956273
-
-
See the Commission Decision of 5 February 2010 on standard contractual clauses for the transfer of personal data to processors established in third countries, under Directive 95/46/EC
-
See the Commission Decision of 5 February 2010 on standard contractual clauses for the transfer of personal data to processors established in third countries, under Directive 95/46/EC.
-
-
-
-
90
-
-
77957958873
-
-
The user could, for example, have informed the data subjects about his publication intention at the moment the picture was taken by the user
-
The user could, for example, have informed the data subjects about his publication intention at the moment the picture was taken by the user.
-
-
-
-
91
-
-
77957963862
-
-
For example when a user would publish a photo depicting third parties. When the social network operator would analyse such photo using facial recognition software, then personal data is being processed. Unless the social network operator would be able to correctly identify the persons depicted on the photo and would dispose of their contact details, it will be virtually impossible to properly identify the data subjects involved
-
For example when a user would publish a photo depicting third parties. When the social network operator would analyse such photo using facial recognition software, then personal data is being processed. Unless the social network operator would be able to correctly identify the persons depicted on the photo and would dispose of their contact details, it will be virtually impossible to properly identify the data subjects involved.
-
-
-
-
92
-
-
77957961831
-
-
See, for example (suicidemachine.org), which allows users to easily unsubscribe from social networks. Another example is the pleaserobme.com website, which mocks users who publicly announce (tweet) that they have left home, thereby exposing themselves to robbery
-
See, for example, the "Virtual Suicide Machine" (suicidemachine.org), which allows users to easily unsubscribe from social networks. Another example is the pleaserobme.com website, which mocks users who publicly announce (tweet) that they have left home, thereby exposing themselves to robbery.
-
Virtual Suicide Machine
-
-
-
93
-
-
77957955044
-
-
R. Wong, o.c., p. 143
-
R. Wong, o.c., p. 143.
-
-
-
-
94
-
-
77957956076
-
-
In the same sense: R. Wong, o.c., p. 144
-
In the same sense: R. Wong, o.c., p. 144.
-
-
-
-
95
-
-
77957953358
-
-
See the announcement of 9 July 2009, available at ec.europa.eu/justice- home/news/consulting-public/news-consulting-0003-en.htm
-
See the announcement of 9 July 2009, available at ec.europa. eu/justice-home/news/consulting-public/news-consulting-0003- en.htm.
-
-
-
|