-
1
-
-
84917282296
-
-
Pressemitteilung vom 04.06.2008
-
Arbeitskreis, "Vorratsdatenspeicherung." 2008. Pressemitteilung vom 04.06.2008, available at http://www.vorratsdatenspeicherung.de.
-
(2008)
Vorratsdatenspeicherung
-
-
-
2
-
-
84898109368
-
Protecting privacy against the police in the European Union: The data retention directive
-
Bignami, Francesca. 2007. "Protecting privacy against the police in the European Union: The data retention directive." Duke Law School Working Paper Series - Paper 76, available at http://1sr.nellco.org.
-
(2007)
Duke Law School Working Paper Series - Paper 76
-
-
Bignami, F.1
-
3
-
-
84916995614
-
Bürgerrechte und TKG-Novelle - Datenschutzrechtliche Auswirkungen der Neufassung des Telekommunikationsgesetzes
-
Breyer, P. 2004. "Bürgerrechte und TKG-Novelle - Datenschutzrechtliche Auswirkungen der Neufassung des Telekommunikationsgesetzes." Recht der Datenverarbeitung Heft 4:147-53.
-
(2004)
Recht der Datenverarbeitung Heft
, vol.4
, pp. 147-153
-
-
Breyer, P.1
-
4
-
-
80051807578
-
Telecommunications data retention and human rights: The compatibility of blanket traffic data retention with the ECHR
-
Breyer, P. 2005. "Telecommunications data retention and human rights: The compatibility of blanket traffic data retention with the ECHR." European Law Journal 11 (3):365-75.
-
(2005)
European Law Journal
, vol.11
, Issue.3
, pp. 365-375
-
-
Breyer, P.1
-
5
-
-
84917144937
-
-
März (Beschluss vom 11. März 2008-1 BvR 256/08)
-
Bundesverfassungsgericht-Pressestelle, "Pressemitteilung Nr. 37/2008 vom 19." März 2008 (Beschluss vom 11. März 2008-1 BvR 256/08), available at http://www.bundesverfassungsgericht.de.
-
(2008)
Pressemitteilung Nr. 37/2008 vom 19
-
-
-
7
-
-
0141448145
-
Enforcement issues-Mandatory retention of traffic data in the EU: Possible impact on privacy and on-line anonymity
-
edited by C. Nicoll, J.E.J. Prince and J.M., van Dellen, The Hague: TMC Asser Press
-
Coemans, C. and J. Dumortier. 2003. "Enforcement issues-Mandatory retention of traffic data in the EU: Possible impact on privacy and on-line anonymity." In Digital Anonymity and the Law, edited by C. Nicoll, J.E.J. Prince and J.M., van Dellen, 161-83. The Hague: TMC Asser Press.
-
(2003)
Digital Anonymity and the Law
, pp. 161-183
-
-
Coemans, C.1
Dumortier, J.2
-
8
-
-
85125799773
-
Memorandum of laws concerning the legality of data retention with regard to the rights guaranteed by the European Convention on Human Rights
-
Covington and Burling, LLP. 2003. "Memorandum of laws concerning the legality of data retention with regard to the rights guaranteed by the European Convention on Human Rights." Privacy International. Available at http://www.privacyinternational.org.
-
(2003)
Privacy International
-
-
-
9
-
-
0344497349
-
Data retention-Privacy, anonymity, and accountability online
-
Crump, Catherine. 2003. "Data retention-Privacy, anonymity, and accountability online." Stanford Law Review 56:191-229.
-
(2003)
Stanford Law Review
, vol.56
, pp. 191-229
-
-
Crump, C.1
-
12
-
-
33748194891
-
Balancing security and liberty within the European Human Rights Framework. A critical reading of the Court's case law in the light of surveillance and criminal law enforcement strategies after 9/11
-
de Hert, P. 2005. "Balancing security and liberty within the European Human Rights Framework. A critical reading of the Court's case law in the light of surveillance and criminal law enforcement strategies after 9/11." Utrecht Law Review 1:68-96.
-
(2005)
Utrecht Law Review
, vol.1
, pp. 68-96
-
-
de Hert, P.1
-
14
-
-
84880878662
-
Freiheit durch Sicherheit? Wie viel Schutz der inneren Sicherheit verlangt und verträgt das deutsche Grundgesetz?
-
Denninger, Erhard. 2002. "Freiheit durch Sicherheit? Wie viel Schutz der inneren Sicherheit verlangt und verträgt das deutsche Grundgesetz?" Kritische Justiz 35 (4):467-75.
-
(2002)
Kritische Justiz
, vol.35
, Issue.4
, pp. 467-475
-
-
Denninger, E.1
-
15
-
-
84917088138
-
Freedom versus security? Internal security in the area of tension between a constitutional state and a preventive state
-
Online Redaktion
-
Denninger, Erhard. 2004. " Freedom versus security? Internal security in the area of tension between a constitutional state and a preventive state." Goethe-Institut - Online Redaktion Available at http://www.goethe.de.
-
(2004)
Goethe-Institut
-
-
Denninger, E.1
-
17
-
-
84917126612
-
Bundesverfassungsgericht versus Politik. Eine kommentierende Dokumentation der jüngsten Entscheidungen zu drei Sicherheitsgesetzen
-
Erd, Rainer. 2008. "Bundesverfassungsgericht versus Politik. Eine kommentierende Dokumentation der jüngsten Entscheidungen zu drei Sicherheitsgesetzen." Kritische Justiz 41(2):118-33.
-
(2008)
Kritische Justiz
, vol.41
, Issue.2
, pp. 118-133
-
-
Erd, R.1
-
22
-
-
85125802559
-
Amicus Curiae brief that is to be presented to the European Court of Justice regarding the action started on July 6, 2006 -
-
European Parliament (Case C-301/06)
-
German Working Group Against Data Retention. 2007. Amicus Curiae brief that is to be presented to the European Court of Justice regarding the action started on July 6, 2006 - Ireland vs. Council of the European Union, European Parliament (Case C-301/06). Available at http://www.edri.org.
-
(2007)
Ireland vs. Council of the European Union
-
-
-
25
-
-
77954766268
-
Freiheit und Sicherheit in Angesicht terroristischer Anschläge
-
Hoffmann-Riem, W. 2002. "Freiheit und Sicherheit in Angesicht terroristischer Anschläge." Zeitschrift für Rechtspolitik 35:497-505.
-
(2002)
Zeitschrift für Rechtspolitik
, vol.35
, pp. 497-505
-
-
Hoffmann-Riem, W.1
-
30
-
-
84917296256
-
-
(Rome Memorandum)
-
IWGDPT (International Working Group on Data Protection in Telecommunications). 2008. Report and Guidance on Privacy in Social Network Services (Rome Memorandum), Available at http://www.berlin-privacy-group.org.
-
(2008)
Report and Guidance on Privacy in Social Network Services
-
-
-
31
-
-
77955498866
-
Should ICT regulations be technology-neutral?
-
edited by B.-J. Koops, M. Lips, C. Prins, andM. Schellekens, TheHague:T.M.C. Asser Press
-
Koops, Bert-Jaap. 2006. "Should ICT regulations be technology-neutral?" In Starting Points for ICT Regulation. Deconstructing Prevalent Policy One-liners, edited by B.-J. Koops, M. Lips, C. Prins, andM. Schellekens, 77-108. TheHague:T.M.C. Asser Press.
-
(2006)
Starting Points for ICT Regulation. Deconstructing Prevalent Policy One-liners
, pp. 77-108
-
-
Koops, B.-J.1
-
33
-
-
33744771767
-
Watching the watchers: Surveillance, transparency and political freedom in the war on terror
-
Kreimer, S.F. 2004. "Watching the watchers: Surveillance, transparency and political freedom in the war on terror." University of Pennsylvania Journal of Constitutional Law 7:133-81.
-
(2004)
University of Pennsylvania Journal of Constitutional Law
, vol.7
, pp. 133-181
-
-
Kreimer, S.F.1
-
34
-
-
33846573188
-
Liberty, security and terrorism: The legal position in Germany, Part 2
-
Lepsius, Oliver. 2004. "Liberty, security and terrorism: The legal position in Germany, Part 2." German Law Journal 5(6). Available at http://www.germanlawjournal.com.
-
(2004)
German Law Journal
, vol.5
, Issue.6
-
-
Lepsius, O.1
-
35
-
-
84884314607
-
Human dignity and the downing of aircraft: The German Federal Constitutional Court strikes down a prominent anti-terrorism provision in the New Air-Transport Security Act
-
Lepsius, Oliver. 2006. "Human dignity and the downing of aircraft: The German Federal Constitutional Court strikes down a prominent anti-terrorism provision in the New Air-Transport Security Act." German Law Journal 7(9). Available at http://www.germanlawjournal.com.
-
(2006)
German Law Journal
, vol.7
, Issue.9
-
-
Lepsius, O.1
-
36
-
-
2642578546
-
Technologies, security and privacy in the Post-9/11 European information society
-
Levi, M. and D.S. Wall. 2004. "Technologies, security and privacy in the Post-9/11 European information society." Journal ofLaw and Society 31(2):194-220.
-
(2004)
Journal ofLaw and Society
, vol.31
, Issue.2
, pp. 194-220
-
-
Levi, M.1
Wall, D.S.2
-
37
-
-
85191776628
-
Cyberspace: Beyond information society
-
ed. John Armitage and Joanne Roberts, New York: Athlone Press
-
Lyon, David. 2002. "Cyberspace: Beyond information society." In Living with Cyberspace: Technology and Society in the Twenty-First Century, ed. John Armitage and Joanne Roberts, 21-33, New York: Athlone Press.
-
(2002)
Living with Cyberspace: Technology and Society in the Twenty-First Century
, pp. 21-33
-
-
Lyon, D.1
-
38
-
-
34147215372
-
Murky conceptual waters: The public and the private
-
Marx, Gary. 2001. "Murky conceptual waters: The public and the private." Ethics and Information technology 3:157-69.
-
(2001)
Ethics and Information technology
, vol.3
, pp. 157-169
-
-
Marx, G.1
-
39
-
-
84979847704
-
Data retention in Ireland: Privacy, policy and proportionality
-
McIntyre, T.J. 2008. "Data retention in Ireland: Privacy, policy and proportionality." Computer Law and Security Report 24(4):326-34.
-
(2008)
Computer Law and Security Report
, vol.24
, Issue.4
, pp. 326-334
-
-
McIntyre, T.J.1
-
40
-
-
84917098559
-
A Pandora's box for rights and liberties
-
edited by A. Acquisti, S. De Capitani di Vimercati, S. Gritzalis and C. Lambrinoudakis, Auerbach Publications
-
Mitrou, Lilian. 2008. "A Pandora's box for rights and liberties." In Digital Privacy: Theory, Technologies and Practices, edited by A. Acquisti, S. De Capitani di Vimercati, S. Gritzalis and C. Lambrinoudakis, 409-32. Auerbach Publications.
-
(2008)
Digital Privacy: Theory, Technologies and Practices
, pp. 409-432
-
-
Mitrou, L.1
-
41
-
-
85125802650
-
Privacy and data protection in electronic communications
-
edited by V. Gorodetsky, L. Popyack, and V. Skormin, Berlin-Heidelberg: Springer
-
Mitrou, E. and K. Moulinos. 2003. "Privacy and data protection in electronic communications." In Proceedings Int. Workshop Computer Network Security, edited by V. Gorodetsky, L. Popyack, and V. Skormin, 432-36. Berlin-Heidelberg: Springer.
-
(2003)
Proceedings Int. Workshop Computer Network Security
, pp. 432-436
-
-
Mitrou, E.1
Moulinos, K.2
-
42
-
-
10844255649
-
Reasonable expectations in electronic communications: A critical perspective on the Electronic Communications Privacy Act
-
Mulligan, D.K. 2004. "Reasonable expectations in electronic communications: A critical perspective on the Electronic Communications Privacy Act." George Washington Law Review 72:1557-98.
-
(2004)
George Washington Law Review
, vol.72
, pp. 1557-1598
-
-
Mulligan, D.K.1
-
45
-
-
77953665877
-
Data retention and the war against terrorism - A considered and proportionate response?
-
Rowland, Diana. 2004. "Data retention and the war against terrorism - A considered and proportionate response?" The Journal of Information, Law and Technology 3. Available at http://www2.warwick.ac.uk.
-
(2004)
The Journal of Information, Law and Technology 3
-
-
Rowland, D.1
-
46
-
-
36148969260
-
Five challenges for regulating the global information society
-
edited by C. Marsden, London: Routledge
-
Samuelson, Pamela. 2000. "Five challenges for regulating the global information society." In Regulating the Global Information Society, edited by C. Marsden, 316-32. London: Routledge.
-
(2000)
Regulating the Global Information Society
, pp. 316-332
-
-
Samuelson, P.1
-
47
-
-
33646826566
-
Privacy and democracy in cyberspace
-
Schwartz, P.M. 1999. "Privacy and democracy in cyberspace." Vanderbilt Law Review 5:1610-1701.
-
(1999)
Vanderbilt Law Review
, vol.5
, pp. 1610-1701
-
-
Schwartz, P.M.1
-
48
-
-
29244443632
-
VoIP: A debate over information service or telephone application in US: A new perspective in convergence era
-
Shin, Dong Hee. 2006. "VoIP: A debate over information service or telephone application in US: A new perspective in convergence era." Telematics and Informatics 23:57-73.
-
(2006)
Telematics and Informatics
, vol.23
, pp. 57-73
-
-
Shin, D.H.1
-
49
-
-
57949096060
-
Reviewing privacy in an information society
-
Simitis, Spiros. 1987. "Reviewing privacy in an information society." University of Pennsylvania Law Review 135:707-32.
-
(1987)
University of Pennsylvania Law Review
, vol.135
, pp. 707-732
-
-
Simitis, S.1
-
50
-
-
84917357207
-
Einleitung: Geschichte - Ziele-Prinzipien
-
edited by S. Simitis, Baden-Baden: Nomos
-
Simitis, Spiros. 2006. "Einleitung: Geschichte - Ziele-Prinzipien." In Bundesdatenschutzgesetz -Kommentar, edited by S. Simitis, 61-153. Baden-Baden: Nomos.
-
(2006)
Bundesdatenschutzgesetz -Kommentar
, pp. 61-153
-
-
Simitis, S.1
-
51
-
-
0036655889
-
Digital dossiers and the dissipation of Fourth Amendment privacy
-
Solove, D.J. 2002. "Digital dossiers and the dissipation of Fourth Amendment privacy." Southern California Law Review 75:1084-1167.
-
(2002)
Southern California Law Review
, vol.75
, pp. 1084-1167
-
-
Solove, D.J.1
-
52
-
-
10844224409
-
Reconstructing electronic surveillance law
-
Solove, D.J. 2004. "Reconstructing electronic surveillance law." The George Washington Law Review 72:1701-47.
-
(2004)
The George Washington Law Review
, vol.72
, pp. 1701-1747
-
-
Solove, D.J.1
-
53
-
-
47349126644
-
How the American government is conscripting businesses and individuals in the construction of a surveillance society
-
Steinhardt, Barry. 2005. "How the American government is conscripting businesses and individuals in the construction of a surveillance society." 27th International Conference on Privacy and Personal Data Protection. Available at http://www.privacyconference2005.org.
-
(2005)
27th International Conference on Privacy and Personal Data Protection
-
-
Steinhardt, B.1
-
55
-
-
8744307176
-
Katz is dead. Long live Katz
-
Swire, P.P. 2004. "Katz is dead. Long live Katz." Michigan Law Review 102:904-32.
-
(2004)
Michigan Law Review
, vol.102
, pp. 904-932
-
-
Swire, P.P.1
-
56
-
-
27344448355
-
Technology, security and privacy: The fear of Frankenstein, the mythology of privacy and the lessons of King Ludd
-
Taipale K. A. 2004/05. "Technology, security and privacy: The fear of Frankenstein, the mythology of privacy and the lessons of King Ludd." Yale Journal of Law and Technology 7:123-220.
-
(2004)
Yale Journal of Law and Technology
, vol.7
, pp. 123-220
-
-
Taipale, K.A.1
-
58
-
-
10844295309
-
-
(Report)
-
U.S. Department of Defence - Technology and Privacy Advisory Committee. 2004. Safeguarding Privacy in the Fight Against Terrorism, (Report). Available at http://www.sainc.com.
-
(2004)
Safeguarding Privacy in the Fight Against Terrorism
-
-
-
59
-
-
10144229833
-
-
World Summit on the Information Society. 2003. Declaration of Principles. Available at http://www.itu.int/wsis.
-
(2003)
Declaration of Principles
-
-
-
60
-
-
78650941877
-
Thinking outside the box: Considering transparency, anonymity and pseudonimity as overall solutions to the problems of information privacy in the Internet Society
-
Zarsky, T.Z. 2004. "Thinking outside the box: Considering transparency, anonymity and pseudonimity as overall solutions to the problems of information privacy in the Internet Society." University of Miami Law Review 58:991-1041.
-
(2004)
University of Miami Law Review
, vol.58
, pp. 991-1041
-
-
Zarsky, T.Z.1
|