Affiliation:
1. University of Turin, Italy
Abstract
The chapter examines how the information revolution impacts the field of data protection in a twofold way. On the one hand, the scale and amount of cross-border interaction taking place in cyberspace illustrate how the information revolution affects basic tenets of current legal frameworks, such as the idea of the law as a set of rules enforced through the menace of physical sanctions and matters of jurisdiction on the Internet. On the other hand, many impasses of today's legal systems on data protection, liability, and jurisdiction can properly be tackled by embedding normative constraints into information and communication technologies, as shown by the principle of privacy by design in such cases as information systems in hospitals, video surveillance networks in public transports, or smart cards for biometric identifiers. Normative safeguards and constitutional constraints can indeed be embedded in places and spaces, products and processes, so as to strengthen the rights of the individuals and widen the range of their choices. Although it is unlikely that “privacy by design” can offer the one-size-fits-all solution to the problems emerging in the field, it is plausible that the principle will be the key to understanding how today's data protection issues are being handled.
Reference59 articles.
1. An Ontology-Based Approach for Managing and Maintaining Privacy in Information Systems
2. Ackerman, M. S., & Cranor, L. (1999). Privacy critics: UI components to safeguard users’ privacy. In Extended Abstracts of CHI (pp. 258-259). New York: ACM Press.
3. Introduction;P. E.Agre;Technology and privacy: The new landscape,1997
4. Free speech savior or shield for scoundrels: An empirical study of intermediary immunity under section 230 of the communications decency act.;D. S.Ardia;Loyola of Los Angeles Law Review,2010
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献