Integrating Law, Technology and Design: Teaching Data Protection & Privacy Law in a Digital Age

2021 ◽  
Author(s):  
Marcelo Corrales Compagnucci ◽  
Mark Fenwick ◽  
Helena Haapio ◽  
Erik P.M. Vermeulen
2019 ◽  
Vol 20 (1) ◽  
pp. 157-188 ◽  
Author(s):  
Tal Z. Zarsky

Abstract The digital age brings with it novel forms of data flow. As a result, individuals are constantly being monitored while consuming products, services and content. These abilities have given rise to a variety of concerns, which are most often framed using “privacy” and “data protection”-related paradigms. An important, oft-noted yet undertheorized concern is that these dynamics might facilitate the manipulation of subjects; a process in which firms strive to motivate and influence individuals to take specific steps and make particular decisions in a manner considered to be socially unacceptable. That it is important and imperative to battle manipulation carries with it a strong intuitive appeal. Intuition, however, does not always indicate the existence of a sound justification or policy option. For that, a deeper analytic and academic discussion is called for. This Article begins by emphasizing the importance of addressing the manipulation-based argument, which derives from several crucial problems and flaws in the legal and policy setting currently striving to meet the challenges of the digital age. Next, the Article examines whether the manipulation-based concerns are sustainable, or are merely a visceral response to changing technologies which cannot be provided with substantial analytical backing. Here the Article details the reasons for striving to block manipulative conduct and, on the other hand, reasons why legal intervention should be, in the best case, limited. The Article concludes with some general implications of this discussion for the broader themes and future directions of privacy law, while trying to ascertain whether the rise of the manipulation-based discourse will lead to information privacy’s expansion or perhaps its demise.


2017 ◽  
Vol 1 (100) ◽  
pp. 639 ◽  
Author(s):  
Artemi Rallo Lombarte

Resumen:La referencia a la informática en la Constitución de 1978 reconoció trascendencia constitucional a la necesidad de protección del individuo frente a los riegos derivados de los avances tecnológicos. Cuatro décadas después, la sociedad contemporánea afronta el reto de constitucionalizar nuevos derechos digitales. En España, sendas leyes (LORTAD y LOPD) desarrollaron el precepto constitucional que consagra la garantía de los derechos frente al uso de la informática. Para preservar a los individuos frente a los riesgos y amenazas de latecnología, el Tribunal Constitución dedujo del artículo 18.4 CE un derecho fundamental autónomo a la protección de datos personales. Las leyes españolas de protección de datos son el resultado de la obligación de cumplir compromisos internacionales (Convenio 108 del Consejo de Europa de 1981) y europeos (Directiva 95/46, artículo 8 de la CDFUE 41 y Reglamento UE 2016/679). Sin embargo, el reconocimiento constitucional o europeo, legal o constitucional, del derecho fundamental a la protección de datos no agota la necesidad de establecer un nuevo marco de protección de los ciudadanos en la era digitalen el que se reconozcan nuevos derechos digitales.SummaryI. Introduction. II. The misleading constitutionalization of «computing ». III. Convention 108 of the council of europe (1981). IV. Data protection right as an autonomous fundamental right. V. LORTAD (1992), LOPD (1999) and its reform. VI. The europeanization of data protection right: Directive 95/46, art. 8 CDFUE and regulation EU 2016/679. VII. Towards the constitutionalization of new digital rights.Abstract:The reference to computing in the Spanish Constitution (1978) recognized constitutional significance to the need for protection against the technological risks. Four decades later, the contemporary society faces the challenge of constitutionalising new digital rights. In Spain, two laws (LOPD and LORTAD) developed the constitutional article that enshrined the guarantee of rights against the use of computers. The Constitutional Court inferred from article 18.4 CE an autonomous fundamental right to the protection of personal data. Spanish data protection laws are the result of the obligation to comply withinternational (Convention 108 of the Council of Europe from 1981) and European (Directive 95/46, article 8 of the CDFUE and Regulation EU 2016/679) commitments. However, the European, legal or constitutional, recognition of the fundamental right to data protection does not exclude the need to establish a new framework for the protection of citizens in the digital age in which new digital rights should be recognized.


Author(s):  
Tibor Tajti

Chapter VI is a new chapter in the EIR. Its presence signals the importance that data protection law has gained in Europe since the adoption of the Data Protection Directive 95/46/EC (DPD) and Regulation 45/2001. Although the DPD is not—though it comes close to—a maximum harmonisation directive, its implementation by Member States by the end of 1998 increased data protection standards on national levels as well. Yet the concrete reason that led to the addition of this Chapter is the expanded scope of the EIR as far as the exchange and publication of personal data is concerned. The expansion and thus the enhanced need for data protection is due in particular to the provision made in the recast EIR for newly established interconnected national insolvency registers, accessible via the European e-Justice Portal. This provision has been made at a time when data protection law is increasingly recognised as a ‘stand-alone’ subject, emancipated from privacy law, as expressed indirectly also by the popularisation of the ‘data protection’ nomenclature originating in the German term ‘Datenschutz’. This has clear implications for private and commercial law, including insolvency law.


Author(s):  
Walter De Kock ◽  
Max Heidegger ◽  
Bianca Herlory ◽  
Zahar Hryniv ◽  
Anders Viemose

2020 ◽  
Vol 21 (S1) ◽  
pp. 55-65
Author(s):  
Federico Fabbrini ◽  
Edoardo Celeste

AbstractThis article explores the challenges of the extraterritorial application of the right to be forgotten and, more broadly, of EU data protection law in light of the recent case law of the ECJ. The paper explains that there are good arguments for the EU to apply its high data protection standards outside its borders, but that such an extraterritorial application faces challenges, as it may clash with duties of international comity, legal diversity, or contrasting rulings delivered by courts in other jurisdictions. As the article points out from a comparative perspective, the protection of privacy in the digital age increasingly exposes a tension between efforts by legal systems to impose their high standards of data protection outside their borders – a dynamic which could be regarded as ‘imperialist’ – and claims by other legal systems to assert their own power over data – a dynamic which one could name ‘sovereigntist’. As the article suggests, navigating between the Scylla of imperialism and the Charybdis of sovereigntism will not be an easy task. In this context, greater convergence in the data protection framework of liberal democratic systems worldwide appears as the preferable path to secure privacy in the digital age.


Cryptoassets ◽  
2019 ◽  
pp. 117-156 ◽  
Author(s):  
Aurelio Gurrea-Martínez ◽  
and Nydia Remolina

This chapter analyzes the legal and financial aspects of Initial Coin Offerings (ICOs). Section I examines the concept, features, and structure of an ICO. Section II analyzes the different regulatory approaches to deal with ICOs. Section III provides an overview of some of the accounting and financial challenges ICOs generate. Section VI focuses on the corporate governance aspects of ICOs. Section V analyzes how ICOs may raise issues related to money laundering, and how regulators and policymakers can deal with these problems. Section VI provides an overview of the challenges of ICOs from the perspective of privacy law and data protection. Section VII examines how insolvency may affect the issuer and buyer of tokens, and how insolvency jurisdictions should deal with those issues arising in insolvency proceedings involving cryptoassets. Finally, Section VIII discusses the jurisdictional issues arising in ICOs.


2014 ◽  
Vol 4 (2) ◽  
pp. 306-317 ◽  
Author(s):  
Seyed Ebrahim Dorraji ◽  
Mantas Barcys
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document