Information Privacy in Europe from a TA Perspective

Chapter

Abstract

This chapter presents the results from a joint project of European Parliamentary Technology Assessment institutions on information and communication technologies (ICT) and privacy. It reflects the outcome of 28 projects from 7 countries. These TA projects were analysed under a common framework. The analysis rendered a set of challenges for European policy and finally several policy options on how to deal with these challenges.

Keywords

Personal Data Policy Option Pervasive Computing Privacy Label Privacy Infringement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Bennett, C.J. 2003. Information privacy and “Datenschutz”: Global assumptions and international governance. In Privacy: Ein Grundrecht mit Ablaufdatum? Interdisziplinäre Beiträge zur Grundrechtsdebatte, ed. W. Peissl, 61–81. Wien: Verlag der Österreichische Akademie der Wissenschaften.Google Scholar
  2. Bennett, C.J., and C.D. Raab. 2003. The governance of privacy. Aldershot: Ashgate.Google Scholar
  3. von Bredow, W. 2005. The Barcelona report on a Human Security Doctrine for Europe, overview and some critical remarks. Berlin Symposium on Human Security and EU-Canada Relations Canadian Universities’ Centre Berlin. March 3, Berlin.Google Scholar
  4. Cas, J. 2006. Technologies that affect privacy. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Klüver, W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold et al. 19–24. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.Google Scholar
  5. Cavoukian, A. 2009. Privacy by design … take the challenge. Toronto: Information and Privacy Commisioner of Ontario, Canada. http://www.privacybydesign.ca/pbdbook/PrivacybyDesignBook.pdf.Google Scholar
  6. Commission of the European Communities. 2007. COM(2007) 87 final. Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. http://ec.europa.eu/justice_home/fsj/privacy/docs/lawreport/com_2007_87_f_en.pdf. Accessed 7 September 2009.Google Scholar
  7. Commission of the European Communities. 2009. COM(2009) 278 final. Communication from the Commission to the European Parliament and the Council, the European Economic and Social Committee and the Committee of the Regions: Internet of Things: —An action plan for Europe; Last update: Brussels, 18.6.2009. http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf. Accessed 7 September 2009.Google Scholar
  8. Council of Europe (CoE). 1981. Convention for the protection of individuals with regard to automatic processing of personal data (Convention 108), Strasbourg, 28.I.1981. http://conventions.coe.int/Treaty/EN/Treaties/Html/108.htm.Google Scholar
  9. Council of Europe (CoE). 2003. Convention for the protection of human rights and fundamental freedoms as amended by Protocol No. 11 with Protocol Nos. 1, 4, 6, 7, 12 and 13. http://www.echr.coe.int/ECHR/EN/Header/Basic±Texts/Basic±Texts/The±European±Convention±on±Human±Rights±and±its±Protocols/.Google Scholar
  10. Daase, C., S. Feske, and I. Peters, eds. 2002. Internationale Risikopolitik: Der Umgang mit neuen Gefahren in den internationalen Beziehungen. Baden-Baden: Nomos Verlag.Google Scholar
  11. David, Murakami Wood, ed. 2006. A Report on the surveillance society, by Ball, K., D. Lyon, C. Norris, and C. Raab, commissioned by: Information Commissioner. September 2006, London. www.ico.gov.uk/…/surveillance_society_full_report_2006.pdf.Google Scholar
  12. EPTA (European Parliamenty Technology Assessment). 2008. About EPTA. http://www.eptanetwork.org/EPTA/about.php. Accessed 19 May 2009.Google Scholar
  13. Eriksson, J., and G. Giacomello, eds. 2007. International relations and security in the digital age. Routlegde Advances in International Relations and Global Politics. Oxford: Routledge.Google Scholar
  14. European Parliament and Council. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=EN&numdoc=31995L0046&model=guichett.Google Scholar
  15. Hayes, B. 2006. Arming big brother: The EU’s security research programme. No. TNI Briefing series 2006/1. Amsterdam: Transnational Institute.Google Scholar
  16. ITU. 2005. IITU internet reports 2005: The internet of things: Executive summary. www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf. Accessed 07 September 2009.Google Scholar
  17. Joss, S., and S. Bellucci, eds. 2002. Participatory technology assessment. European perspectives, edited by CSD. London: Centre for the Study of Democracy (Centre for the Study of Democracy and Swiss Centre for Technology Assessment).Google Scholar
  18. Klüver, L., W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold, et al. 2006. ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, 16 October 2006. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.Google Scholar
  19. Lyon, D., ed. 2003. Surveillance as social sorting. Privacy, risk and digital discrimination. London: Routledge.Google Scholar
  20. ÖAW. 2005. Sicherheitsforschung, Begriffsfassung und Vorgangsweise für Österreich. Vienna: ÖAW.Google Scholar
  21. OECD. 1980. Guidelines on the protection of privacy and transborder flows of personal data. OECD, 23 September 1980. http://www.oecd.org/document/20 / 0,2340,en_2649_33703_15589524_1_1_1_37409,00.html.Google Scholar
  22. Pauer-Studer, H. 2003. Privatheit: ein ambivalenter aber unverzichtbarer Wert. In Privacy: ein Grundrecht mit Ablaufdatum? Interdisziplinäre Beiträge zur Grundrechtsdebatte, ed. W. Peissl, 9–22. Wien: Verlag der Österreichische Akademie der Wissenschaften.Google Scholar
  23. Peissl, W. 1999. Parlamentarische Technikfolgen-Abschätzung in Europa. In Handbuch der Technikfolgen-Abschätzung, eds. S. Bröchler et al., 469–478, 2nd ed. Berlin: Edition Sigma.Google Scholar
  24. Peissl, W. 2003. Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11 (1 March 2003): 19–24.CrossRefGoogle Scholar
  25. Peissl, W. 2005. ICT and privacy: Das erste gemeinsame EPTA-Projekt, Technikfolgen-Abschätzung: Theorie und Praxis 14 (2): 88–91.Google Scholar
  26. Peissl, W. 2006. Legislation: Current situation and recent developments. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Klüver, W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold et al., 26–31. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.Google Scholar
  27. Raguse, M., M. Meints, O. Langfeldt, and P. Walter. 2008. PRISE D6.2: Criteria for privacy enhancing security technologies. Commissioned by: European Commission PASR. Vienna: Institute of Technology Assessment Austrian Academy of Sciences. http://prise.oeaw.ac.at/docs/PRISE_D_6.2_Criteria_for_privacy_enhancing_security_technologies.pdf.Google Scholar
  28. Rössler, B. 2001. Der Wert des Privaten. Frankfurt am Main: Suhrkamp (Philosophie an der Universität von Amsterdam).Google Scholar
  29. Stef, Steyaert, and Hervé, Lisoir, eds. 2005. Participatory Methods Toolkit: A practitioner’s manual. Brussels: King Baudouin Foundation and the Flemish Institute for Science and Technology Assessment (viWTA). http://www.viwta.be/files/30890_ToolkitENGdef.pdf.Google Scholar
  30. Study Group on Europe’s Security Capabilities. 2004. A human security doctrine for Europe the barcelona report of the study group on Europe’s security capabilities presented to EU High representative for common foreign and security policy Javier Solana, 15 September 2004. Barcelona: Study group on Europe’s security capabilities. http://www.lse.ac.uk/Depts/global/Publications/HumanSecurityDoctrine.pdf.Google Scholar
  31. ULD. 2006. Systemdatenschutz. ULD.https://www.datenschutzzentrum.de/systemdatenschutz/index.htm. Accessed 7 September 2009.Google Scholar
  32. Vig, N.J., and H. Paschen, eds. 2000. Parliaments and technology. Albany, USA: State Univ. New York Press.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Institute of Technology AssessmentAustrian Academy of SciencesViennaAustria

Personalised recommendations