Verzameldrift ‘big data’ grijpt om zich heen external link

Abstract

Het bewaren van communicatiegegevens van alle Nederlandse telefoon- en internetgebruikers is terecht door het Europese Hof van Justitie verboden.

Grondrechten, Privacy

Bibtex

Other{nokey, title = {Verzameldrift ‘big data’ grijpt om zich heen}, author = {Dommering, E. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/1550.pdf}, year = {0505}, date = {2015-05-05}, abstract = {Het bewaren van communicatiegegevens van alle Nederlandse telefoon- en internetgebruikers is terecht door het Europese Hof van Justitie verboden.}, keywords = {Grondrechten, Privacy}, }

Do privacy and data protection rules apply to legal persons and should they? A proposal for a two-tiered system external link

Computer Law & Security Review, num: 1, pp: 26-45, 2015

Abstract

Privacy and data protection rules are usually said to protect the individual against intrusive governments and nosy companies. These rights guarantee the individual's freedom, personal autonomy and human dignity, among others. More and more, however, legal persons are also allowed to invoke the rights to privacy and data protection. Prima facie, it seems difficult to reconcile this trend with the standard interpretation of those rights, as legal persons do not enjoy freedom, personal autonomy or human dignity and it seems uncertain why business interests should be protected under privacy and data protection rules. On second thoughts, however, it appears rather unproblematic to grant legal persons partial protection under these regimes, especially when it recognizes general duties of care for data processors and governmental agencies.

Data protection, individual interests, legal persons, Privacy, societal interests

Bibtex

Article{nokey, title = {Do privacy and data protection rules apply to legal persons and should they? A proposal for a two-tiered system}, author = {van der Sloot, B.}, url = {http://www.sciencedirect.com/science/article/pii/S0267364914001812}, year = {0424}, date = {2015-04-24}, journal = {Computer Law & Security Review}, number = {1}, abstract = {Privacy and data protection rules are usually said to protect the individual against intrusive governments and nosy companies. These rights guarantee the individual\'s freedom, personal autonomy and human dignity, among others. More and more, however, legal persons are also allowed to invoke the rights to privacy and data protection. Prima facie, it seems difficult to reconcile this trend with the standard interpretation of those rights, as legal persons do not enjoy freedom, personal autonomy or human dignity and it seems uncertain why business interests should be protected under privacy and data protection rules. On second thoughts, however, it appears rather unproblematic to grant legal persons partial protection under these regimes, especially when it recognizes general duties of care for data processors and governmental agencies.}, keywords = {Data protection, individual interests, legal persons, Privacy, societal interests}, }

Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism external link

Internet Policy Review, vol. 3, num: 4, 2015

Abstract

This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

anonymous, Grondrechten, Hacktivism, Privacy, Privacy enhancing technologies, Wikileaks

Bibtex

Article{nokey, title = {Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism}, author = {Bodó, B.}, url = {http://policyreview.info/articles/analysis/hacktivism-1-2-3-how-privacy-enhancing-technologies-change-face-anonymous}, year = {0424}, date = {2015-04-24}, journal = {Internet Policy Review}, volume = {3}, number = {4}, pages = {}, abstract = {This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.}, keywords = {anonymous, Grondrechten, Hacktivism, Privacy, Privacy enhancing technologies, Wikileaks}, }

How to assess privacy violations in the age of Big Data? Analysing the three different tests developed by the ECtHR and adding for a fourth one external link

Information & Communication Technology Law, vol. 24, num: 1, pp: 74-103., 2015

Abstract

It is commonly believed that privacy cases are resolved by balancing the private interest (e.g. personal autonomy) and the common interest (e.g. national security) involved with a particular privacy violation. Clearly, this approach no longer holds in the age of Big Data, in which massive amounts of personal data are gathered without a pre-established goal. Not only is the balancing test inapplicable because it is often unclear how certain data gathering and processing initiatives improve the societal interest, but it is also hard to demonstrate whether and if so how an individual has suffered from such massive data processing systems. Besides the balancing test, however, the European Court of Human Rights (ECtHR) applies two other tests when dealing with privacy issues. Both have an added value when applied to privacy violations following from Big Data processes. Still, if Article 8 of the European Convention on Human Rights (ECHR) is to retain its significance in the new technological environment, it might be necessary to develop a new test, the rudiments of which might already be found in the Court's case law.

botsing fundamentele rechten, Grondrechten, Privacy, Recht op gegevensbescherming, recht op privacy, verwerking persoonsgegevens voor persoonlijke doeleinden

Bibtex

Article{nokey, title = {How to assess privacy violations in the age of Big Data? Analysing the three different tests developed by the ECtHR and adding for a fourth one}, author = {van der Sloot, B.}, url = {http://www.tandfonline.com/doi/full/10.1080/13600834.2015.1009714#}, year = {0424}, date = {2015-04-24}, journal = {Information & Communication Technology Law}, volume = {24}, number = {1}, pages = {74-103.}, abstract = {It is commonly believed that privacy cases are resolved by balancing the private interest (e.g. personal autonomy) and the common interest (e.g. national security) involved with a particular privacy violation. Clearly, this approach no longer holds in the age of Big Data, in which massive amounts of personal data are gathered without a pre-established goal. Not only is the balancing test inapplicable because it is often unclear how certain data gathering and processing initiatives improve the societal interest, but it is also hard to demonstrate whether and if so how an individual has suffered from such massive data processing systems. Besides the balancing test, however, the European Court of Human Rights (ECtHR) applies two other tests when dealing with privacy issues. Both have an added value when applied to privacy violations following from Big Data processes. Still, if Article 8 of the European Convention on Human Rights (ECHR) is to retain its significance in the new technological environment, it might be necessary to develop a new test, the rudiments of which might already be found in the Court\'s case law.}, keywords = {botsing fundamentele rechten, Grondrechten, Privacy, Recht op gegevensbescherming, recht op privacy, verwerking persoonsgegevens voor persoonlijke doeleinden}, }

Annotatie bij Hof van Justitie van de EU 11 december 2014 (Ryneš / Úřad pro ochranu osobních údajů) external link

European Human Rights Cases, num: 3, 2015

botsing fundamentele rechten, Grondrechten, Privacy, Recht op gegevensbescherming, recht op privacy, verwerking persoonsgegevens voor persoonlijke doeleinden

Bibtex

Case note{nokey, title = {Annotatie bij Hof van Justitie van de EU 11 december 2014 (Ryneš / Úřad pro ochranu osobních údajů)}, author = {van der Sloot, B.}, url = {http://www.ivir.nl/publicaties/download/1542.pdf}, year = {0424}, date = {2015-04-24}, journal = {European Human Rights Cases}, number = {3}, keywords = {botsing fundamentele rechten, Grondrechten, Privacy, Recht op gegevensbescherming, recht op privacy, verwerking persoonsgegevens voor persoonlijke doeleinden}, }

Privacybescherming online kan beter: De mythe van geïnformeerde toestemming external link

Nederlands Juristenblad, num: 14, pp: 878-883., 2015

Abstract

De huidige privacyregels leggen veel nadruk op de geïnformeerde toestemming van internetgebruikers. Met zulke toestemmingsregels probeert de wet mensen in staat te stellen om keuzes te maken in hun eigen belang. Maar inzichten uit gedragsstudies trekken de effectiviteit van deze wetgevingstactiek in twijfel. Zo klikken internetgebruikers in de praktijk 'OK' op vrijwel elk toestemmingsverzoek dat op hun scherm verschijnt. De wet zou meer aandacht moeten geven aan de daadwerkelijke bescherming van de privacy van mensen die het internet opgaan.

Grondrechten, Privacy

Bibtex

Article{nokey, title = {Privacybescherming online kan beter: De mythe van geïnformeerde toestemming}, author = {Zuiderveen Borgesius, F.}, url = {http://www.ivir.nl/publicaties/download/1536.pdf}, year = {0417}, date = {2015-04-17}, journal = {Nederlands Juristenblad}, number = {14}, abstract = {De huidige privacyregels leggen veel nadruk op de geïnformeerde toestemming van internetgebruikers. Met zulke toestemmingsregels probeert de wet mensen in staat te stellen om keuzes te maken in hun eigen belang. Maar inzichten uit gedragsstudies trekken de effectiviteit van deze wetgevingstactiek in twijfel. Zo klikken internetgebruikers in de praktijk 'OK' op vrijwel elk toestemmingsverzoek dat op hun scherm verschijnt. De wet zou meer aandacht moeten geven aan de daadwerkelijke bescherming van de privacy van mensen die het internet opgaan.}, keywords = {Grondrechten, Privacy}, }

Burgers tegen Plasterk: het Nederlandse staartje van de Snowden-saga external link

Ars Aequi, num: 4, pp: 287-293., 2015

Abstract

De Snowden-onthullingen haalden niet alleen wereldwijd de media en het parlementair debat. Ze leidden zelfs tot een Nederlandse rechtszaak over communicatieprivacy. Een principiële rechtszaak over burgerrechtenactivisme, surveillance en politieke intrige, met een verrassende, maar ook teleurstellende uitkomst. Dit moet je weten.

Grondrechten, Privacy

Bibtex

Article{nokey, title = {Burgers tegen Plasterk: het Nederlandse staartje van de Snowden-saga}, author = {van Daalen, O.}, url = {http://www.ivir.nl/publicaties/download/1535.pdf}, year = {0417}, date = {2015-04-17}, journal = {Ars Aequi}, number = {4}, abstract = {De Snowden-onthullingen haalden niet alleen wereldwijd de media en het parlementair debat. Ze leidden zelfs tot een Nederlandse rechtszaak over communicatieprivacy. Een principiële rechtszaak over burgerrechtenactivisme, surveillance en politieke intrige, met een verrassende, maar ook teleurstellende uitkomst. Dit moet je weten.}, keywords = {Grondrechten, Privacy}, }

Tien privacytrends van 2014 external link

Mediaforum, num: 2, pp: 50-54., 2015

Abstract

Het privacyrecht is inmiddels een serieus specialisme met jaarlijks tientallen beschikkingen, vonnissen en richtsnoeren. Een overzicht daarvan is nuttig, maar kan je daarin ook bredere ontwikkelingen ontdekken? Het afgelopen jaar in tien privacytrends.

Grondrechten, Privacy

Bibtex

Article{nokey, title = {Tien privacytrends van 2014}, author = {van Daalen, O.}, url = {http://www.ivir.nl/publicaties/download/1533.pdf}, year = {0401}, date = {2015-04-01}, journal = {Mediaforum}, number = {2}, abstract = {Het privacyrecht is inmiddels een serieus specialisme met jaarlijks tientallen beschikkingen, vonnissen en richtsnoeren. Een overzicht daarvan is nuttig, maar kan je daarin ook bredere ontwikkelingen ontdekken? Het afgelopen jaar in tien privacytrends.}, keywords = {Grondrechten, Privacy}, }