Skip to main content

A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by Design

  • Conference paper
Privacy Technologies and Policy (APF 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8319))

Included in the following conference series:

Abstract

This paper briefly explains the concept of Privacy by Design (PBD); provides an overview of the benefits and value of PBD for regulating and minimizing the threats to privacy posed by the increasing development, deployment and use of Privacy-Invading Technologies (PITs); outlines some of the limitations, constraints and potential criticism of PBD and the practical challenges of achieving, implementing and enforcing PBD legislation; and provides some potential counter-arguments to the criticism and some ways to help overcome the main challenges and constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Agre, P.E., Rotenberg, M. (eds.): Technology and Privacy: The New Landscape. MIT Press (1997)

    Google Scholar 

  • Albrechtslund, A.: Ethics and technology design. Ethics and Information Technology, 63–72 (2007)

    Google Scholar 

  • Borking, J.: Assessing investments mitigating privacy risks. In: Mommers, L., Franken, H., van den Herik, J., van der Klaauw, F., Zwenne, G.-J. (eds.) Het Binnenste Buiten; Liber Amicorum Ter Gelegenheid van Het Emeritaat aan Prof. dr. Aernout, H.J.Schmidt, Hoogleraar Recht en Informatica te Leiden, eLaw@Leiden, pp. 255–273 (2010)

    Google Scholar 

  • Cannataci, J.A.: Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America? International Journal of RF Technologies 2, 173–187 (2011)

    Google Scholar 

  • Cave, J., van Oranje, C., Schindler, R., Ahehabi, A., Brutscher, P.H.-B., Robinson, N.: Trends in connectivity technologies and their socio-economic impacts, Policy Options for the Ubiquitous Internet Society. Final Report. RAND Europe (July 2009)

    Google Scholar 

  • Cavoukian, A.: Privacy by Design (2009)

    Google Scholar 

  • Cavoukian, A.: 7 Foundational Principles of Privacy by Design (January 2011), http://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf

  • Dommering, E.: Regulating technology: Code is not law. In: Dommering, E.J., Asscher, L.F. (eds.) Coding Regulation: Essays on the Normative Role of Information Technology, pp. 1–17. T.M.C. Asser Press (2006)

    Google Scholar 

  • Grimmelmann, J.: Regulation by Software. Yale Law Journal 114, 1719–1758 (2005)

    Google Scholar 

  • Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Information and Software Technology 51(2), 337–350 (2009)

    Article  Google Scholar 

  • Gutwirth, S., De Hert, P., De Sutter, L.: The trouble with technology regulation from a legal perspective. Why Lessig’s ‘optimal mix’ will not work. In: Brownsword, R., Yeung, K. (eds.) Regulating Technologies, pp. 193–218. Hart Publishers (2008)

    Google Scholar 

  • Fischer-Hübner, S.: IT-Security and Privacy. LNCS, vol. 1958, pp. 107–165. Springer, Heidelberg (2001)

    Book  MATH  Google Scholar 

  • Hildebrandt, M., Koops, B.-J.: The Challenges of Ambient Law and Legal Protection in the Profiling Era. Modern Law Review 73(3), 428–460 (2010)

    Article  Google Scholar 

  • Hirsch, D.: Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law. Georgia Law Review 41(1), 1–64 (2006)

    Google Scholar 

  • Lessig, L.: Code and Other Laws of Cyberspace. Basic Books (1999)

    Google Scholar 

  • Kim, Y., Lee, S.W., Lee, D.H., Kim, J., Lee, M.W.: Sound Detection as an Aid to Increase Detectability of CCTV in Surveillance System. In: Aykin, N. (ed.) HCII 2007. LNCS, vol. 4560, pp. 382–389. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  • Koops, B.-J.: Criteria for Normative Technology: An Essay on the Acceptability of ’Code as Law’ in Light of Democratic and Constitutional Values. Tilburg University Legal Studies, Working Paper no. 007/2007 (2007)

    Google Scholar 

  • Pasic, A.: Privacy by Design: An industry perspective on the challenges and opportunities of privacy (2011), http://www.eurescom.eu/?id=531

  • Porter, M., van der Linde, C.: Green and Competitive, Harvard Business Review, 120–134 (September-October 1995)

    Google Scholar 

  • Posner, R.: The economics of privacy. American Economic Review 71(2), 405–409 (1981)

    Google Scholar 

  • Reidenberg, J.R.: Privacy Protection and the Interdependence of Law, Technology and Self-Regulation (2000), http://reidenberg.home.sprynet.com/Interdependence.htm

  • RISEPTIS: Trust in the Information Society: Research and Innovation on Security, Privacy and Trustworthiness in the Information Society. A Report of the Advisory Board RISEPTIS (2009)

    Google Scholar 

  • The Royal Academy of Engineering: Dilemmas of Privacy and Surveillance: Challenges of Technological Change, London (2007), http://www.raeng.org.uk/news/publications/list/reports/dilemmas_of_privacy_and_surveillance_report.pdf

  • Schermer, B.W.: Software agents, surveillance, and the right to privacy: a legislative Framework for agent-enabled surveillance, PhD diss. Leiden University Press (2007)

    Google Scholar 

  • Schneier, B.: Strong Laws, Smart Tech Can Stop Abusive ‘Data Reuse’, June 28. Wired News (2007), http://www.schneier.com/essay-175.html

  • Sollie, P., Düwell, M. (eds.): Evaluating New Technologies: Methodological Problems For The Ethical Assessment of Technology Developments. Springer (2009)

    Google Scholar 

  • Schwartz, P.M.: Beyond Lessig’s code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices. Wisconsin Law Review 2000(4), 743–787 (2000)

    Google Scholar 

  • Williams, M.-A.: Privacy Management: The Law and Global Business Strategies: A Case for Privacy Driven Design. Innovation and Enterprise Research Laboratory, University of Technology, Sydney (2009)

    Google Scholar 

  • van Blarkom, G.W., Borking, J.J., Olk, J.G.E. (eds.): The Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents (2003)

    Google Scholar 

  • Yeung, K., Dixon-Woods, M.: Design-based regulation and patient safety: A regulatory studies perspective. Social Science & Medicine 71(3), 502–509 (2010)

    Article  Google Scholar 

  • Yueh-Hsuan, W., Chien-Hsun, C., Cheun-Tsai, S.: Safety Intelligence and Legal Machine Language-Do we need the Three Laws of Robotics? In: Yoshihiko, T. (ed.) Service Robot Applications. InTech Education & Publishing (2008), http://works.bepress.com/weng_yueh_hsuan/3

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Klitou, D. (2014). A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by Design. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2012. Lecture Notes in Computer Science, vol 8319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54069-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54069-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54068-4

  • Online ISBN: 978-3-642-54069-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics