Skip to main content

Problem Definition, Structure and Methodology

  • Chapter
  • First Online:
Data Protection Law

Abstract

This Chapter begins by outlining the problem in defining and understanding the interrelationship between privacy and data protection law in Australia, India, Indonesia, Japan, Malaysia, Singapore, Thailand and the European Union. This Chapter will demonstrate and discuss how the concept of privacy is considered an important feature of the modern era. In other words, it is argued that there has been wide acceptance and a convergence of privacy that now transcends, government, countries, cultures religion over the Internet. This convergence of the concept of privacy, has resulted in nation states adopting to varying degrees, data protection and privacy laws. However, it will be highlighted that the current day approach needs further development and greater convergence and harmonization of data protection law and policy at the international level. This will be important as the trade in personal data continues to grow.

It will be argued in this Chapter that the privacy and data protection law of these jurisdictions is far from settled. It is further argued that data protection and privacy law has two dimensions. First, is to protect personal data and information of individuals, as a human right. Second, is balancing the protection of personal data with current and future economic activity (trade) of personal data. Moreover, data protection and privacy cannot be restricted to a single country or region of the world. It is international, and has been underpinned by Internet technology and infrastructure that knows no [national] borders. Thus, these laws, while being developed by nation states for their own particular sovereign needs, the internationalization of the Internet poses significant challenges to the future law and policy in this area. They are likely to continue to be challenged and require reviewing and updating, as technology continues to change. Being a recent addition to the law, data protection is also challenging and is arguably in conflict with other areas of the law, such as intellectual property, competition, transnational commercial contract law, and cybercrime-security law. This Chapter also highlights the structure of the overall book in recognizing and responding to these differences in data protection and privacy law. It argues that data protection is a tool of Internet privacy. At the recent June 2019 meeting of the G20, the leaders’ declaration called for respect of national and international regulation of data and technology. The importance of this declaration highlights the importance for governments to balance innovation with protection of personal data. To achieve this, the book reinforces the G20 leaders position, and goes a step further, by recommending that an international Model Law be developed, similar to international trade law. Also, consideration to an international treaty or convention will support any model law and go some way to closing the gaps and tensions between country data protection law. Thus, this book calls for greater legal convergence and harmonization in this emerging and complex area of law and policy. The book also identifies that personal data being afforded an intellectual property right. It also highlights the tension between data protection and competition law and cybersecurity/crime law. It will also be argued that data protection can fall within the current transnational international contract legal framework. Adopting data protection within these areas of law, provide valuable tools to strengthen the governance, control and regulation of personal data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Cowan Z The Private Man 24 Inst Pub Affairs Rev 26 (1970).

  2. 2.

    Kang J (1998) Information Privacy in Cyberspace Transactions, Stanford Law Review, 1998, pp. 1201–04.

  3. 3.

    Chesterman S (2012) After Privacy: The Rise of Facebook, the Fall of WikiLeaks, and Singapore’s Personal Data Protection Act 2012, Singapore Journal of Legal Studies, p 396.

  4. 4.

    Ibid.

  5. 5.

    Ibid.

  6. 6.

    Clarke R What’s ‘Privacy’?, Workshop at the Australian Law Reform Commission on 28 July (2006) http://www.cse.unsw.edu.au/~cs4920/resources/Roger-Clarke-Privacy.pdf, accessed 19 April 2018.

  7. 7.

    Ibid, in Europe, people are regarded as being very important for their own sake. The concepts of ‘human dignity’ and integrity play a significant role in some countries, as do the notions of individual autonomy and self determination and human rights.

  8. 8.

    Ibid, people need private space. This applies in public as well as behind closed doors and drawn curtains.

  9. 9.

    Ibid, people need to be free to behave, and to associate with others, subject to broad social mores, but without the continual threat of being observed.

  10. 10.

    Ibid, people need to be free to innovate. International competition is fierce, and countries with high labour-costs need to be clever if they want to sustain their standard-of-living.

  11. 11.

    Ibid, referred to as ‘bodily privacy’, is concerned with the integrity of the individual’s body.

  12. 12.

    Ibid, including what is sometimes referred to as interception privacy.

  13. 13.

    Chesterman S (2012) After Privacy: The Rise of Facebook, the Fall of WikiLeaks, and Singapore’s Personal Data Protection Act 2012, Singapore Journal of Legal Studies, 2012, p. 396.

  14. 14.

    Ibid.

  15. 15.

    Hildebrandt M (2006) Privacy and Identity. In: Claes E, Duff A and Gutwirth S (eds) Privacy and the Criminal Law, Oxford, United Kingdom Hart, 2006, pp. 43–60.

  16. 16.

    Samuel D, Brandeis L (1890) The Right to Privacy, Harvard Law Review, Vol. 4, No. 5, pp. 193–220.

  17. 17.

    Ess C (2005b) Lost in translation. Ethics Inf Technol 7, 1 2005b, pp. 1–6.

  18. 18.

    Kharak Singh v. State of UP, (1964) 1 SCR 332, 359 (India).

  19. 19.

    Basu S (2010) Policy-Making, Technology, and Privacy in India, INDIAN J.L. & TECH. vol 6. p. 66.

  20. 20.

    Ibid.

  21. 21.

    White Paper of the Committee of Experts on a Data Protection Framework for India, December 2017.

  22. 22.

    Westin A (1967) Privacy and Freedom. New York: Atheneum, p. 351.

  23. 23.

    Neethling J, Potgieter M, Visser J (1996) Neethling’s law of personality, Butterworths. pp. 35–36.

  24. 24.

    Kamali, H. (2007) The Right to Life, Security, Privacy and Ownership in Islam (Cambridge, Islamic Texts Society); Mahmood, T. (ed.) (1993) Human Rights in Islamic Law (New Delhi, Institute of Objective Studies).

  25. 25.

    Madieha Azmi I, Personal Data Protection Law: The Malaysian Experience, 16 Info. & Comm. Tech. L. 125 (2007) pp. 130.

  26. 26.

    Ibid.

  27. 27.

    Ibid.

  28. 28.

    Ibid.

  29. 29.

    Ibid.

  30. 30.

    Ibid.

  31. 31.

    Berween M “The Fundamental Human Rights: An Islamic Perspective” The International Journal of Human Rights 61 (2002) pp. 70–74.

  32. 32.

    Ess C (2005b) Lost in translation. Ethics Inf Technol 7, 12005b, pp. 1–6.

  33. 33.

    International Association of Privacy Professionals, https://iapp.org, accessed 20 December 2017. Article 7 and 8 Charter of Fundamental Rights of the European Union C 326/12.

  34. 34.

    Case −28/08 P Commission/Bavarian Lager [2010] ECR I–6055, para. 60.

  35. 35.

    Altman I (1977) Privacy Regulation: Culturally Universal or Culturally Specific?, Journal of Social Issues, vol. 33, pp. 66–84.

  36. 36.

    Barrington M (1987) Privacy: Studies in Social and Cultural History, American Journal of Sociology, vol 92, 1987.

  37. 37.

    Ibid, p. 276.

  38. 38.

    Ambrose M, Ausloos J The Right to Be Forgotten Across the Pond, Journal of Information Policy, Vol. 3 (2013), pp. 1–23.

  39. 39.

    Ibid.

  40. 40.

    Samuel D, Brandeis L (1890) The Right to Privacy, Harvard Law Review, Vol. 4, No. 5, pp. 193–220.

  41. 41.

    Hobbes T (1981) Leviathan, C. B. Macpherson (Editor), Penguin. Locke J (1986) Second Treatise of Government, Prometheus.

  42. 42.

    De Boni M, Prigmore M (2001) A Hegelian basis for information privacy as an economic right, in Roberts M, Moulton M, Hand S, Adams C. (eds) Information systems in the digital world, Proceedings of the 6th UKAIS conference, Manchester, UK, Zeus Pres.

  43. 43.

    Micheal Yilma K, The United Nations data privacy system and its limits, International Review of Law, Computers & Technology (2018).

  44. 44.

    Clayton R., Tomlinson H The Law of Human Rights (2 Ed, Oxford University Press, 2009) [The Law of Human Rights] at 1005.

  45. 45.

    Solove, D A Taxonomy Of Privacy, University of Pennsylvania Law Review, (2006), pp. 477–564.

  46. 46.

    Whitman, J The Two Western Cultures of Privacy: Dignity versus Liberty. Yale Law School (2004) p. 1160.

  47. 47.

    Ibid. The word ‘liberalism’ has been used, since the eighteenth century, to describe various distinct clusters of political positions, but with no important similarity of principle among the different clusters called liberal at different times. The roots of liberalism rest in the classical interpretation, that there ought to exist a certain minimum area of personal freedom, which must never be violated. Liberty in this sense is the condition in which an individual has immunity from the arbitrary exercise of authority. It presupposes some frontiers of freedom that nobody should be permitted to cross, and requires the minimum, and demanded a maximum degree of noninterference compatible with the maximum demands of social life.

  48. 48.

    Ibid.

  49. 49.

    Ibid. Human dignity plays a role both at the international and state levels. On the international level, the Universal Declaration of Human Rights opens with the statement that “recognition of the inherent dignity and of the equal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world.” Other prominent international documents and covenants rely upon human dignity as a leading value. The concept of human dignity also plays a significant role in the debate over the ‘universalism’ or ‘relativism’ of human rights. In the contemporary human rights discourse within the international arena, human dignity is highly visible. At the national level, human dignity became a central concept in many modern constitutions. The concept of human dignity now plays a central role in the law of human rights, there is surprisingly little agreement on what the concept actually means.

  50. 50.

    Ibid.

  51. 51.

    Data privacy protection across Asia –A regional perspective, Freshfields Bruckhaus Derringer LLP, October 2008, http://www.freshfields.com/publications/pdfs/2008/oct08/24238.pdf, accessed 2 October 2018.

  52. 52.

    Neethling J, Potgieter M, Visser J, (1996) Neethling’s law of personality. Durban: Butterworths. p. 36.

  53. 53.

    McGarry K (1993) The Changing Context of Information. An Introductory Analysis. 2nd ed. London: Library Association Publishing, p. 178.

  54. 54.

    Tamás M (2002) From Subjectivity to Privacy and Back Again, Social Research, p. 220.

  55. 55.

    Chesterman S (2012) After Privacy: The Rise of Facebook, the Fall of WikiLeaks, and Singapore’s Personal Data Protection Act 2012, Singapore Journal of Legal Studies, p. 392.

  56. 56.

    Ibid.

  57. 57.

    Ibid.

  58. 58.

    De Hert p, Gutwirth S, (2006) Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power, in Claes E, Duff A, Gutwirth S, Privacy and the Criminal Law, Antwerp-Oxford, Intersentia, pp. 61–104.

  59. 59.

    International Organisation for Standardisation/IEC 2382-1-1993 and its successors.

  60. 60.

    Kokott J, Sobotta C, (2013) The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR, International Data Privacy Law, Oxford University Press, vol 3, Issue 4, pp. 222–228.

  61. 61.

    De Hert P, Gutwirth S, (2009) Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power. in E. Claes, A. Duff & S. Gutwirth (Eds.), Privacy and the Criminal Law, pp. 61–104.

  62. 62.

    Ibid.

  63. 63.

    International Organisation for Standardisation/IEC 2382-1-1993 and its successors.

  64. 64.

    Kokott J., Sobotta C, (2013) The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR, International Data Privacy Law, Volume 3, Issue 4, Oxford University Press, pp. 222–228.

  65. 65.

    McDermott Y (2017) Conceptualizing the right to data protection in an era of Big Data, Sage Journals.

  66. 66.

    Brownsword R, (2009) Consent in Data Protection Law: Privacy, Fair Processing and Confidentiality, In: Gutwirth S., Poullet Y, De Hert P, de Terwangne C, Nouwt S. Reinventing Data Protection?. Springer, Dordrecht, pp. 83–88.

  67. 67.

    Greenleaf G Global Analysis of Data Privacy Laws and Bills Privacy Law and Business International Report 145: (2017) pp. 14–24.

  68. 68.

    Chesterman, S (2018) Data Protection Law in Singapore, Privacy and Sovereignty in an Interconnected World, Academic Publishing, p. 4.

  69. 69.

    The Wearable Future, Consumer Intelligence, PriceWaterHouseCoopers, http://quantifiedself.com/docs/PWC-CIS-Wearable-future.pdf, accessed 26 October 2018.

  70. 70.

    Bennett C (2008) The Privacy Advocates: Resisting the Spread of Surveillance, M.I.T. Press, Cambridge, Massachusetts, p. 221.

References

  • Altman I (1977) Privacy Regulation: Culturally Universal or Culturally Specific?, Journal of Social Issues, vol. 33, p. 66–84

    Article  Google Scholar 

  • Ambrose M, Ausloos J (2013) The Right to Be Forgotten Across the Pond, Journal of Information Policy, Vol. 3, pp. 1–23

    Article  Google Scholar 

  • Basu S (2010) Policy-Making, Technology, and Privacy in India, INDIAN J.L. & TECH. vol 6. p. 66

    Google Scholar 

  • Barrington M (1987) Privacy: Studies in Social and Cultural History, American Journal of Sociology, vol 92

  • Bennett C (2008) The Privacy Advocates: Resisting the Spread of Surveillance, M.I.T. Press, Cambridge, Massachusetts, p. 221

    Google Scholar 

  • Berween M (2002)“The Fundamental Human Rights: An Islamic Perspective” The International Journal of Human Rights 61 pp. 70–74

    Google Scholar 

  • Cowan Z (1970) The Private Man 24 Inst Pub Affairs Rev 26

    Google Scholar 

  • Chesterman S (2012) After Privacy: The Rise of Facebook, the Fall of WikiLeaks, and Singapore’s Personal Data Protection Act 2012, Singapore Journal of Legal Studies, p 396

    Google Scholar 

  • Chesterman, S (2018) Data Protection Law in Singapore, Privacy and Sovereignty in an Interconnected World, Academic Publishing, p. 4

    Google Scholar 

  • Clarke R (2006) What’s ‘Privacy’?, Workshop at the Australian Law Reform Commission on 28 July http://www.cse.unsw.edu.au/~cs4920/resources/Roger-Clarke-Privacy.pdf, accessed 19 April 2018.

  • De Boni M, Prigmore M (2001) A Hegelian basis for information privacy as an economic right, in Roberts M, Moulton M, Hand S, Adams C. (eds) Information systems in the digital world, Proceedings of the 6th UKAIS conference, Manchester, UK, Zeus Pres.

    Google Scholar 

  • De Hert p, Gutwirth S, (2006) Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power, in Claes E, Duff A, Gutwirth S, Privacy and the Criminal Law, Antwerp-Oxford, Intersentia, pp. 61–104

    Google Scholar 

  • De Hert P, Gutwirth S, (2009) Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power. in E. Claes, A. Duff & S. Gutwirth (Eds.), Privacy and the Criminal Law, pp. 61–104

    Google Scholar 

  • Ess C (2005) Lost in translation. Ethics Inf Technol 7, 1 2005b, pp. 1–6

    Google Scholar 

  • Greenleaf G (2017) Global Analysis of Data Privacy Laws and Bills Privacy Law and Business International Report 145, pp. 14–24

    Google Scholar 

  • Hildebrandt M (2006) Privacy and Identity. In: Claes E, Duff A and Gutwirth S (eds) Privacy and the Criminal Law, Oxford, United Kingdom Hart, 2006, pp. 43–60

    Google Scholar 

  • Hobbes T (1981) Leviathan, C. B. Macpherson (Editor), Penguin. Locke J (1986) Second Treatise of Government, Prometheus.

    Google Scholar 

  • Kamali, H. (2007) The Right to Life, Security, Privacy and Ownership in Islam (Cambridge, Islamic Texts Society); Mahmood, T. (ed.) (1993) Human Rights in Islamic Law (New Delhi, Institute of Objective Studies).

    Google Scholar 

  • Kang J (1998) Information Privacy in Cyberspace Transactions, Stanford Law Review, 1998, pp. 1201–04

    Google Scholar 

  • Kokott J, Sobotta C, (2013) The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR, International Data Privacy Law, Oxford University Press, vol 3, Issue 4, pp. 222–228

    Google Scholar 

  • Madieha Azmi I, (2007) Personal Data Protection Law: The Malaysian Experience, 16 Info. & Comm. Tech. L. 125 pp. 130

    Google Scholar 

  • McGarry K (1993) The Changing Context of Information. An Introductory Analysis. 2nd ed. London: Library Association Publishing, p. 178

    Google Scholar 

  • Neethling J, Potgieter M, Visser J (1996) Neethling’s law of personality, Butterworths. pp. 35–36

    Google Scholar 

  • Samuel D, Brandeis L (1890) The Right to Privacy, Harvard Law Review, Vol. 4, No. 5, pp. 193–220

    Article  Google Scholar 

  • Tamás M (2002) From Subjectivity to Privacy and Back Again, Social Research, p. 220 Neethling J, Potgieter M, Visser J, (1996) Neethling’s law of personality. Durban: Butterworths. p. 36

    Google Scholar 

  • Westin A (1967) Privacy and Freedom. New York: Atheneum, p. 351

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Walters, R., Trakman, L., Zeller, B. (2019). Problem Definition, Structure and Methodology. In: Data Protection Law. Springer, Singapore. https://doi.org/10.1007/978-981-13-8110-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8110-2_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8109-6

  • Online ISBN: 978-981-13-8110-2

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics