ОТ ЗАЩИТЫ ДАННЫХ ДО «ЗАЩИТЫ НЕПРИКОСНОВЕННОСТИ ЧАСТНОЙ ЖИЗНИ ПУТЕМ ИССЛЕДОВАНИЯ». РАЗМЫШЛЕНИЯ В СВЕТЕ НОВОГО ЕВРОПЕЙСКОГО ОБЩЕГО РЕГЛАМЕНТА ПО ЗАЩИТЕ ИНФОРМАЦИИ

Полный текст:


Аннотация

В статье описывается процесс, который привел к принятию нового европейского регламента по защите данных в контек- сте быстрого развития информационно-коммуникационных технологий и резкого увеличение потоков данных (Большие дан- ные). Защита данных и защита права на не- прикосновенность частной жизни могутрассматриваться в качестве ограничения для развития технологий. С другой стороны, бы- строе развитие интеллектуальных городов и ИКТ приносит новые риски для защиты основных прав. Новый европейский регла- мент №. 2016/679 может быть недостаточным для защиты права на неприкосновенность частной жизни в эпоху больших объемов данных. Возможно, необходим какой-то но- вый инструмент для защиты персональных данных и, следовательно, неприкосновен- ности частной жизни. В статье предлагается понятие «неприкосновенность частной жиз-ни путем исследования» как новый метод проектирования для устройств, баз данных и приложений обеспечивающий неприкосно- венность частной жизни.Хотя авторство идеи совместное, разделы 1, 2, 3 написаны С. Калцолайо, а разделы 4 и 5 написаны В. Паньянелли.

Об авторах

С. Калцолайо
УНИВЕРСИТЕТ Г. МАЧЕРАТА
Италия


В. Паньянелли
THE UNIVERSITY OF MACERATA, ITALY
Италия
Г. МАЧЕРАТА


Список литературы

1. Bosco F., Creemers N., Ferraris V., Guagnin D., Koops B-J, (2015) Profiling Technologies and Fundamental Rights and Values: Regulatory Challenges and Perspectives from European Data Protection Authorities, in S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law, Law, Governance and Technology Series, vol. 20, Springer.

2. Mantelero A., (2014), Il futuro regolamento EU sui dati personali e la valenza “politica” del caso Google: ricordare e dimenticare nella digital economy [The future EU regulation on personal data and the “political” significance of the Google case: remembering and forgetting in the digital economy] // Diritto dell’informazione e dell’informatica [Information and Information Science Law].

3. Maras M-H, (2015) Internet of things: security and privacy implications // International Data Privacy Law, Vol. 5. No. 2.

4. Poullet Y. (2009), Data protection legislation: What is at stake for our society and democracy? // Computer Law and Security Review: The International Journal of Technology and Practice. Vol. 25. Issue 3.

5. Rodotà S., (1995), Tecnologie e diritti [Technologies and Rights]. Bologna, Il Mulino

6. Skouma G., Léonard L., (2015) On-line Behavioral Tracking: What May Change After the Legal Reform on Personal Data Protection // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law, Law, Governance and Technology Series, vol. 20, Springer.

7. Von Dietze A., Allgrove A.M., (2014) Australian privacy reforms - an overhauled data protection regime for Australia // International Data Privacy Law. 2014. Vol. 4. No. 4.

8. Warren S., Brandeis L., (1890) The right to privacy // Harward Law Review. Vol. IV. December 15, 1890. No. 5.

9. Aparicio Salom J., (2014) «A third party to whom data are disclosed»: A third group among those processing data // International Data Privacy Law. Vol. 4. No. 3.

10. Austin L.M, (2015) Enough about me: why privacy is about power, not consent (or harm) // A. Sarat (edited by). A world without privacy. What law can and should do? Cambridge University Press.

11. Buttarelli G. (1997) Banche dati e tutela della riservatezza: la privacy nella società dell’informazione [Data bases and protection of privacy: privacy in the information society]. Milano, Giuffrè.

12. Cavoukian A., (2015) Evolving FIPPs: Proactive Approaches to Privacy, Not Privacy Paternalism // S. Gutwirth, R. Leenes, P. de Hert (edited by). Reforming European Data Protection Law // Law, Governance and Technology Series. vol. 20. Springer.

13. Clarke R., (2015) Data retention as mass surveillance: the need for an evaluative framework // International Data Privacy Law. Vol. 5. No. 2.

14. Colonna L., (2014) Article 4 of the EU Data Protection Directive and the irrelevance of the EU - US Safe Harbour Program? // International Data Privacy Law. Vol. 4. No. 3.

15. Cortese B., (2013) La protezione dei dati di carattere personale nel diritto dell’Unione europea dopo il Trattato di Lisbona [The protection of personal data in EU law after the Lisbon Treaty] // Diritto dell’Unione Europea [European Union Law]. 2/2013.

16. De Hert P, (2014) The EU data protection reform and the (forgotten) use of criminal sanctions // International Data Privacy Law. Vol. 4. No. 4.

17. Forgò N., (2015) My health data - your research: some preliminary thoughts on different values in the General Data Protection Regulation // International Data Privacy Law. Vol. 5. No. 1.

18. Fritsch C.,(2015) Data Processing in Employment Relations; Impacts of the European General Data Protection Regulation Focusing on the Data Protection Officer at the Worksite // S. Gutwirth, R. Leenes, P. de - Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

19. Gonzalez Fuster G.,(2014) The emergence of personal data protection as a fundamental right of the EU // Law, Governance and Technology Series. Vol. 16. Springer.

20. Geminn C.L., Roßnagel A., (2015) A Systematic Approach to the Legal Evaluation of Security Measures in Public Transportation // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer 2015.

21. Grau R.R., (2015) Models and Tools for the Computational Support of Technology Impact Assessments, Applied in the Context of Mass Transportation // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

22. Gutwirth S.,Leenes R., de Hert P. (edited by),(2015) Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

23. Hempel L.,Lammerant H., (2015) Impact Assessments as Negotiated Knowledge // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

24. Jòri A., (2015) Shaping vs applying data protection law: two core functions of data protection authorities // International Data Privacy Law. 2015. Vol. 5. No. 2.

25. Kiss A., Szòke G.L., (2015) Evolution or Revolution? Steps Forward to a New Generation of Data Protection Regulation // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

26. Klitou D., (2014) Privacy-Invading Tecnologies and Privacy by design. Safeguarding Privacy, Liberty and Security in the 21st Century // Information Technology and Law Series. Vol. 25. Asser press - Springer.

27. Korenhof P., Ausloos J., Szekely I., Ambrose M., Sartor G., Leenes R, (2015) Timing the Right to Be Forgotten: A Study into “Time” as a Factor in Deciding About Retention or Erasure of Data // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series, vol. 20, Springer.

28. Kulesza J., (2014) Transboundary data protection and international business compliance // International Data Privacy Law. Vol. 4. No. 4.

29. Kuner C., Cate F.H., Millard C.,Svantesson D.J.B., Lynskey O.,(2014) When two world collide: the interface between competition law and data protection // International Data Privacy Law. Vol. 4. No. 3.

30. Leese M., (2015) Privacy and Security - On the Evolution of a European Conflict // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

31. Richards N.M., (2015) Four Privacy Myths, in A. Sarat (edited by), A world without privacy. What law can and should do? Cambridge University Press.

32. Sarat A.(edited by),(2015) A world without privacy. What law can and should do? Cambridge University Press.

33. Sparrow E., Halpin H., (2015) LEAP: The LEAP Encryption Access Project, in S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

34. Stevovic J., Bassi E., Giori A., Casati F., Armellin G., (2015) Enabling Privacy by Design in Medical Records Sharing // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

35. Trepte S., Teutsch D., Masur P.K., Eicher C., Fischer M., Hennhöfer A., Lind F., (2015) Do People Know About Privacy and Data Protection Strategies? Towards the “Online Privacy Literacy Scale” (OPLIS) // S. Gutwirth, R. Leenes, P. de Hert (edited by) Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

36. Valkenburg G., (2015) Privacy Versus Security: Problems and Possibilities for the Trade-Off Model // S. Gutwirth, R. Leenes, P. de Hert (edited by), Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer.

37. Van der Sloot B.,(2014) Do data protection rules protect the individual and should they? An assessment of the proposed General Data Protection Regulation // International Data Privacy Law. Vol. 4. No. 4.

38. Weber R.H.,(2014) Privacy management practices in the proposed EU regulation // International Data Privacy Law. Vol. 4. No. 4.

39. Zanfir G.,(2015) Tracing the Right to Be Forgotten in the Short History of Data Protection Law: The “New Clothes” of an Old Right // S. Gutwirth, R. Leenes, P. de Hert (edited by) Reforming European Data Protection Law // Law, Governance and Technology Series. Vol. 20. Springer. REPORTS AND STUDIES Federal Trade Commission, Internet of things. Privacy & Security in a Connected World, Staff Report, January 2015 // https://www.ftc.gov. EU Agency for Fundamental Rights, ECHR, Council for Europe, Handbook on European data protection law. 2014.

40. Federal Trade Commission, Internet of things. Privacy & Security in a Connected World, Staff Report, January 2015 // https://www.ftc.gov.

41. EU Agency for Fundamental Rights, ECHR, Council for Europe, Handbook on European data protection law. 2014.


Дополнительные файлы

Для цитирования: Калцолайо С., Паньянелли В. ОТ ЗАЩИТЫ ДАННЫХ ДО «ЗАЩИТЫ НЕПРИКОСНОВЕННОСТИ ЧАСТНОЙ ЖИЗНИ ПУТЕМ ИССЛЕДОВАНИЯ». РАЗМЫШЛЕНИЯ В СВЕТЕ НОВОГО ЕВРОПЕЙСКОГО ОБЩЕГО РЕГЛАМЕНТА ПО ЗАЩИТЕ ИНФОРМАЦИИ. Право и управление. XXI век. 2016;(4):80-91.

For citation: Calzolaio S., Pagnanelli V. FROM DATA PROTECTION TO «PRIVACY BY RESEARCH» FOOD FOR THOUGHT IN THE LIGHT OF THE NEW EUROPEAN GENERAL DATA PROTECTION REGULATION. Journal of Law and Administration. 2016;(4):80-91. (In Russ.)

Просмотров: 59

Обратные ссылки

  • Обратные ссылки не определены.


Creative Commons License
Контент доступен под лицензией Creative Commons Attribution 4.0 License.


ISSN 2073-8420 (Print)
ISSN 2587-5736 (Online)