Since the entry into force of the Lisbon Treaty, data protection has been elevated to the status of a fundamental right in the European Union and is now enshrined in the EU Charter of Fundamental Rights alongside the right to privacy. This timely book investigates the normative significance of data protection as a fundamental right in the EU. The first part of the book examines the scope, the content and the capabilities of data protection as a fundamental right to resolve problems and to provide for an effective protection. It discusses the current approaches to this right in the legal scholarship and the case-law and identifies the limitations that prevent it from having an added value of its own. It suggests a theory of data protection that reconstructs the understanding of this right and could guide courts and legislators on data protection issues. The second part of the book goes on to empirically test the reconstructed right to data protection in four case-studies of counter-terrorism surveillance: communications metadata, travel data, financial data and Internet data surveillance. The book will be of interest to academics, students, policy-makers and practitioners in EU law, privacy, data protection, counter-terrorism and human rights law.
This study analyses the modern EU counter-terrorism trends, focusing on two parallel axes: (a) the repressive one, where new criminal offences related to terrorist activity (receiving training for terrorism, terrorist financing, travelling and facilitating travelling for the purpose of terrorism) have been instituted, and (b) the preventive one, where establishing a framework of provisions aiming to deter terrorist financing prevails. After critically evaluating EU's interventions in both axes, the study concludes by noting a ‘paradigm shift’ between repression and prevention in the field of countering terrorism, while suggesting proposals on a transposition of Directive (EU) 2017/541 into national legislations that adheres to the fundamental EU law principles, and a preventive control over terrorist financing that abides by the rule of law.
This book explores how the European Convention on Human Rights operates and influences on the global stage. The ECHR and its interpretation by the European Court of Human Rights (ECtHR) considerably echo in and outside Europe. To what degree has that influence translated into its norms, doctrines and methods of interpretation being exported into equivalent systems which also enact the protection of fundamental rights? This book answers that question by exploring the judicial dialogue of the ECHR system with comparable legal orders. Through a horizontal and multifaceted study of regional and global systems, the book identifies the impact of the ECHR within the confines of their jurisprudence to provide scholars in the field of international human rights law with an essential text. Discussing the extent to which the ECHR penetrates into the judicial production of the most affected legal systems, the book mostly focuses on the case law of the Court of Justice of the European Union, the Inter-American Court of Human Rights and the UN Human Rights Committee. It also investigates whether there is room for cross-fertilisation between them and finally, moves on to explore the legal consequences of the interplay of these mechanisms with the ECtHR and what it means for the overall functioning of international human rights law.
Is it possible to achieve cybersecurity while safeguarding the fundamental rights to privacy and data protection? Addressing this question is crucial for contemporary societies, where network and information technologies have taken centre stage in all areas of communal life. This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law. The book explores the values, interconnections and tensions inherent to cybersecurity, privacy and data protection within the EU constitutional architecture and its digital agendas. The work's novel analysis looks at the interplay between digital policies, instruments including the GDPR, NIS Directive, cybercrime legislation, e-evidence and cyber-diplomacy measures, and technology as a regulatory object and implementing tool. This original approach, which factors in the connections between engineering principles and the layered configuration of fundamental rights, outlines all possible combinations of the relationship between cybersecurity, privacy and data protection in EU law, from clash to complete reconciliation. An essential read for scholars, legal practitioners and policymakers alike, the book demonstrates that reconciliation between cybersecurity, privacy and data protection relies on explicit and brave political choices that require an active engagement with technology, so as to preserve human flourishing, autonomy and democracy.
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to privacy and data protection law in United Kingdom covers every aspect of the subject, including the protection of private life as a fundamental – constitutional – right, the application of international and/or regional conventions protecting the right to privacy, privacy rights in the context of electronic communications or at the workplace, and the protection of individuals regarding the processing of personal data relating to them. Following a general introduction about the country, the monograph assembles its information and guidance in two parts: (1) protection of privacy, including national case law regarding the protection of this fundamental right, specific legislation on the confidentiality of interpersonal communications, and sector-specific rules regarding privacy protection, such as privacy rights of employees, patients, consumers or celebrities; (2) personal data protection, including not only general rules on data quality, legitimate processing, data retention, data subject rights, security and accountability, but also specific provisions regarding the processing of health data or other sensitive personal information, further processing for research purposes, exemptions for law enforcement or national security purposes, and rules regarding liabilities, sanctions and redress.
Combating Crime in the Digital Age: A Critical Review of EU Information Systems in the Area of Freedom, Security and Justice in the Post-Interoperability Era. Challenges for Criminal Law and Personal Data Protection provides a systematic and comprehensive account of EU information systems functioning in the area of freedom, security and justice, with the aim to establish the contemporary links between information sharing and criminal law and evaluate the consequences. Part 1 offers a systemisation and critical assessment of pertinent systems (ECRIS, ECRIS-TCN, Prüm, PNR, Europol, SIS, Eurodac, VIS, EES, ETIAS) and the new interoperability regime from the perspective of their objective to prevent and combat serious crime. Part 2 explores personal data protection law, police law and criminal procedure law, in order to propose safeguards and limitations for regulating this rapidly evolving framework and addressing the challenges for fundamental principles and rights. The authors’ central suggestion is that the issue falls within the context of an emerging precognitive paradigm of criminal law.
Since the entry into force of the Lisbon Treaty, data protection has been elevated to the status of a fundamental right in the European Union and is now enshrined in the EU Charter of Fundamental Rights alongside the right to privacy. This timely book investigates the normative significance of data protection as a fundamental right in the EU. The first part of the book examines the scope, the content and the capabilities of data protection as a fundamental right to resolve problems and to provide for an effective protection. It discusses the current approaches to this right in the legal scholarship and the case-law and identifies the limitations that prevent it from having an added value of its own. It suggests a theory of data protection that reconstructs the understanding of this right and could guide courts and legislators on data protection issues. The second part of the book goes on to empirically test the reconstructed right to data protection in four case-studies of counter-terrorism surveillance: communications metadata, travel data, financial data and Internet data surveillance. The book will be of interest to academics, students, policy-makers and practitioners in EU law, privacy, data protection, counter-terrorism and human rights law.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.