語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Enforcing Privacy = Regulatory, Lega...
~
SpringerLink (Online service)
Enforcing Privacy = Regulatory, Legal and Technological Approaches /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Enforcing Privacy/ edited by David Wright, Paul De Hert.
其他題名:
Regulatory, Legal and Technological Approaches /
其他作者:
Wright, David.
面頁冊數:
X, 506 p.online resource. :
Contained By:
Springer Nature eBook
標題:
Mass media. -
電子資源:
https://doi.org/10.1007/978-3-319-25047-2
ISBN:
9783319250472
Enforcing Privacy = Regulatory, Legal and Technological Approaches /
Enforcing Privacy
Regulatory, Legal and Technological Approaches /[electronic resource] :edited by David Wright, Paul De Hert. - 1st ed. 2016. - X, 506 p.online resource. - Issues in Privacy and Data Protection,252352-1929 ;. - Issues in Privacy and Data Protection,20.
About the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications – contributions to transnational privacy enforcement;Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index.
This book demonstrates different approaches – regulatory, legal and technological – to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear – it is a theme that runs throughout this book – “carrots” and “soft law” need to be backed up by “sticks” and “hard law”. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book – including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher – share their views in the one and only book on Enforcing Privacy.
ISBN: 9783319250472
Standard No.: 10.1007/978-3-319-25047-2doiSubjects--Topical Terms:
556421
Mass media.
LC Class. No.: K4240-4343
Dewey Class. No.: 343.099
Enforcing Privacy = Regulatory, Legal and Technological Approaches /
LDR
:04886nam a22004095i 4500
001
981258
003
DE-He213
005
20200702104410.0
007
cr nn 008mamaa
008
201211s2016 gw | s |||| 0|eng d
020
$a
9783319250472
$9
978-3-319-25047-2
024
7
$a
10.1007/978-3-319-25047-2
$2
doi
035
$a
978-3-319-25047-2
050
4
$a
K4240-4343
072
7
$a
LNJ
$2
bicssc
072
7
$a
LAW000000
$2
bisacsh
072
7
$a
LNJ
$2
thema
082
0 4
$a
343.099
$2
23
245
1 0
$a
Enforcing Privacy
$h
[electronic resource] :
$b
Regulatory, Legal and Technological Approaches /
$c
edited by David Wright, Paul De Hert.
250
$a
1st ed. 2016.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
X, 506 p.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Issues in Privacy and Data Protection,
$x
2352-1929 ;
$v
25
505
0
$a
About the authors -- 1 Introduction to Enforcing Privacy; David Wright and Paul De Hert.- 2 Enforcing privacy; David Wright -- Countries -- 3 Failures of privacy self-regulation in the United States; Robert Gellman and Pam Dixon -- 4 From a model pupil to a problematic grown-up: Enforcing privacy and data protection in Hungary; Iván Székely.- 5 A tale of two privacies: Enforcing privacy with hard power and soft power in Japan; Hiroshi Miyashita.- 6 The Spanish experience of enforcing privacy norms: two decades of evolution from sticks to carrots; Artemio Rallo Lombarte.- 7 Data protection and enforcement in Latin America and in Uruguay; Ana Brian Nougrères.- International mechanisms.-8 The International Working Group on Data Protection in Telecommunications – contributions to transnational privacy enforcement;Alexander Dix.- 9 Enforcing privacy across different jurisdictions; Dan Svantesson.- 10 Cross-border breach notification; Blair Stewart.- 11 Responsive regulation of data privacy: theory and Asian examples; Graham Greenleaf.- 12 Enforcement and reform of the EU-US Safe Harbor Agreement Instruments; Chris Connolly and Peter van Dijk.- 13 How effective are fines in enforcing privacy?; Hazel Grant and Hannah Crowther.- 14 Enforcing privacy rights: Class action litigation and the challenge of cy pres; Marc Rotenberg and David Jacobs.- 15 Data protection certification: Decorative or effective instrument? Audit and seals as a way to enforce privacy; Kirsten Bock.- 16 The co-existence of administrative and criminal law approaches to data protection wrongs; Paul De Hert and Gertjan Boulet.- 17 Whom to trust? Using technology to enforce privacy Challenges for the future; Daniel Le Métayer.-18 The Irish DPA and its approach to data protection; Billy Hawkes.- 19 Getting our act together: European Data Protection Authorities face up to Silicon Valley; Jacob Kohnstamm.- 20 Regaining control and sovereignty in the digital age; Jan Philipp Albrecht.- 21 Privacy enforcement in search of its base; James B. Rule -- Index.
520
$a
This book demonstrates different approaches – regulatory, legal and technological – to enforcing privacy and data protection. If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the mere existence of such laws or regulations, combined with a credible threat to invoke them, is sufficient for regulatory purposes. But the threat has to be credible. As some of the authors in this book make clear – it is a theme that runs throughout this book – “carrots” and “soft law” need to be backed up by “sticks” and “hard law”. The authors of this book view privacy enforcement as an activity that goes beyond regulatory enforcement, however. In some sense, enforcing privacy is a task that befalls to all of us. Privacy advocates and members of the public can play an important role in combatting the continuing intrusions upon privacy by governments, intelligence agencies and big companies. Contributors to this book – including regulators, privacy advocates, academics, SMEs, a Member of the European Parliament, lawyers and a technology researcher – share their views in the one and only book on Enforcing Privacy.
650
0
$a
Mass media.
$3
556421
650
0
$a
Law.
$3
671705
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
650
0
$a
Law and legislation.
$3
1069250
650
1 4
$a
IT Law, Media Law, Intellectual Property.
$3
1209939
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Legal Aspects of Computing.
$3
669901
700
1
$a
Wright, David.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
678812
700
1
$a
De Hert, Paul.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1021344
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319250458
776
0 8
$i
Printed edition:
$z
9783319250465
776
0 8
$i
Printed edition:
$z
9783319797250
830
0
$a
Issues in Privacy and Data Protection,
$x
2352-1929 ;
$v
20
$3
1264939
856
4 0
$u
https://doi.org/10.1007/978-3-319-25047-2
912
$a
ZDB-2-LCR
912
$a
ZDB-2-SXLC
950
$a
Law and Criminology (SpringerNature-41177)
950
$a
Law and Criminology (R0) (SpringerNature-43727)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入