File #2460: "2018_Book_DesigningForPrivacyAndItsLegal.pdf"

2018_Book_DesigningForPrivacyAndItsLegal.pdf

Testo

1|Dedication|6
1|Materials|7
1|Acknowledgements|21
1|Introduction|23
1|Abbreviations|30
1|Contents|25
1|List of Figures|34
1|List of Tables|35
1|Chapter 1: Setting the Stage|36
2|1.1 Towards a Digitalized Environment|36
3|1.1.1 Technical Advances|36
3|1.1.2 Changed Business Models|38
3|1.1.3 Digitalized Environment|39
2|1.2 Privacy Concerns Resulting from Data Processing|41
3|1.2.1 Introducing the Life Cycle of Data Framework|41
3|1.2.2 Issues Related to the Collection of Data|42
3|1.2.3 Issues Related to the Analysis of Data|44
3|1.2.4 Issues Related to the Implementation or Use of Data|45
3|1.2.5 Issues Related to the Erasure and Recycling of Data|46
2|1.3 Regulatory Developments Addressing the Privacy Concerns|47
2|References|48
3|Literature|48
3|News(paper) Articles and Blogs|52
1|Chapter 2: Research Approach|53
2|2.1 Privacy Protection in the Midst of Disciplines: A Roadmap|53
2|2.2 Introducing the Normative and Technical Tools to Design for Privacy|54
2|2.3 Information Law and Governance Perspective|57
2|References|59
3|Literature|59
1|Chapter 3: Mapping the Privacy Rationales|61
2|3.1 Introducing Four Perspectives on Privacy|61
2|3.2 Individual and Collective Perspective|62
3|3.2.1 Access and Dissemination Restriction|62
3|3.2.2 Control and Self-Determination|64
3|3.2.3 Appropriate Flow of Information|65
2|3.3 Regulatory Perspective|67
3|3.3.1 Costs of Privacy Violations and Benefits of Protection|67
3|3.3.2 Consumer Protection Interest|68
2|3.4 Market Perspective|70
2|3.5 Technical Perspective|72
2|References|73
3|Literature|73
3|News(paper) Articles and Blogs|77
1|Chapter 4: Privacy Protection in an Internet of Things Environment|78
2|4.1 The Internet of Things|78
3|4.1.1 Connecting Things and Creating an Environment of Anticipation|79
3|4.1.2 Technical Backbone for a Connected Environment|80
3|4.1.3 Three Internet of Things Case Studies|82
2|4.2 Addressing Things with Radio Frequency|83
3|4.2.1 Identifying Things and Monitoring Their Paths|83
3|4.2.2 Privacy Concerns and Regulatory Reactions|84
3|4.2.3 Standards on RFID|85
3|4.2.4 Privacy-Enhancing Technical Tools|86
2|4.3 Smart Energy Architectures|88
3|4.3.1 Smart Meters and Privacy Concerns|88
3|4.3.2 Regulatory Push Towards Transparent and Secure Smart Energy Architectures|89
3|4.3.3 Addressing Data Protection via Non-Binding Regulatory Frameworks|90
3|4.3.4 Security Standard on Intelligent Electronic Devices|92
3|4.3.5 Privacy-Enhancing Technical Tools|93
2|4.4 Quantified-Self Movement: Smart Wearable Devices|94
3|4.4.1 Quantified-Self Technologies|94
3|4.4.2 Enabled Analytics and Privacy Concerns|95
3|4.4.3 Wait-and-See Approach: Applying the Current Data Protection Legislation|97
3|4.4.4 Selected Industry Standards|98
3|4.4.5 Privacy-Enhancing Technical Tools|98
2|4.5 Concluding Remarks|100
2|References|101
3|Literature|101
3|News(paper) Articles and Blogs|105
1|Chapter 5: Privacy and Data Protection Regulation in Europe|106
2|5.1 Fundamental Legal Concepts|106
3|5.1.1 Privacy Protection|107
3|5.1.2 Data Protection|108
2|5.2 Evolution of Data Protection Legislation|111
3|5.2.1 First Attempts to Regulate Data Processing Systems|111
3|5.2.2 Reorientation Towards Individual Liberty|113
3|5.2.3 Reinforcement Through Informational Self-Determination|114
3|5.2.4 Mandatory Protection, Harmonization, and Sectoral Rules|115
3|5.2.5 Data Protection Reform Towards a Single Market|116
3|5.2.6 Encoding Data Protection and Privacy by Design|117
2|5.3 Taxonomy of Legal Principles|120
3|5.3.1 Principles Concerning the Legality of Data Processing|120
3|5.3.2 Principles Concerning the Design of Data Processing Systems|124
3|5.3.3 Principles Concerning the Rights of Individuals|126
3|5.3.4 Principles Concerning Compliance and Enforcement|129
2|5.4 Concluding Remarks|131
2|References|132
3|Literature|132
1|Chapter 6: Technical Tools and Designs for Data Protection|134
2|6.1 Introductory Scenario: Alice Buys a Wearable Device|134
2|6.2 Taxonomy of Technical Tools|137
3|6.2.1 Security|138
3|6.2.2 Anonymity|139
3|6.2.3 Autonomy|141
3|6.2.4 Transparency|141
2|6.3 Security Tools|142
3|6.3.1 Confidentiality|142
3|6.3.2 Integrity and Authentication|147
3|6.3.3 Certificate and Key Infrastructures|152
3|6.3.4 Secure Communication Architectures|154
3|6.3.5 Intrusion Controls|156
2|6.4 Anonymity Tools|156
3|6.4.1 Randomization|156
3|6.4.2 Generalization|158
3|6.4.3 Multiple Identities|159
3|6.4.4 Communication Obfuscation|162
2|6.5 Autonomy Tools|164
3|6.5.1 Access and Permission Control|164
3|6.5.2 Disposal Control|167
3|6.5.3 Deletion Control|168
2|6.6 Transparency Tools|170
3|6.6.1 Visualizing Privacy|170
3|6.6.2 Insights on the Logic of Data Processing|171
3|6.6.3 Privacy Impact Assessment and Notice|173
2|6.7 Concluding Remarks|174
2|References|174
3|Literature|174
3|News(paper) Articles and Blogs|181
1|Chapter 7: Mapping the Privacy Protection Tools Throughout the Life Cycle of Data|182
2|7.1 Life Cycle of Data Framework|182
2|7.2 Collection Phase|184
3|7.2.1 Legal Principles|184
3|7.2.2 Technical Tools|187
2|7.3 Analysis Phase|188
3|7.3.1 Legal Principles|188
3|7.3.2 Technical Tools|190
2|7.4 Implementation or Use Phase|191
3|7.4.1 Legal Principles|191
3|7.4.2 Technical Tools|193
2|7.5 Erasure and Recycling Phase|193
3|7.5.1 Legal Principles|193
3|7.5.2 Technical Tools|195
2|7.6 Concluding Remarks|195
2|References|197
3|Literature|197
3|News(paper) Articles and Blogs|199
1|Chapter 8: Interplay of Legal and Technical Privacy Protection Tools|200
2|8.1 Preliminary Remarks|200
2|8.2 Regulation’s Guidance on Technical Tools|202
3|8.2.1 Data Protection Through Security|202
3|8.2.2 Data Protection Through Anonymity|207
3|8.2.3 Data Protection Through Autonomy|210
3|8.2.4 Data Protection Through Transparency|213
3|8.2.5 Guidance on Balancing the Costs of Technical Privacy Protection|217
3|8.2.6 Guidance on Default Options|218
2|8.3 Similarities and Differences Among Legal and Technical Rationales|219
3|8.3.1 Parallel Approaches|219
3|8.3.2 Related Approaches|222
3|8.3.3 Differing Approaches|225
2|8.4 Lessons Learned for Policymakers|226
3|8.4.1 Deliberating on the Ways Regulation Acts|227
3|8.4.2 Choosing the Form of Regulation|229
2|8.5 Concluding Remarks|230
2|References|233
1|Chapter 9: Privacy by Design for the Internet of Things: A Startup Scenario|236
2|9.1 A Startup Launches a Smart Wearable Device|236
2|9.2 Following Data Throughout the Life Cycle|237
3|9.2.1 Overview of Data Flow and Involved Parties or Devices|237
3|9.2.2 Collection and Transmission of Data via Website, Devices, and Third Parties|238
3|9.2.3 Analysis of Data by the Startup|239
3|9.2.4 Use of Data and Communication to Alice|240
3|9.2.5 Deletion of Data and Alice’s Account|241
2|9.3 Applying Privacy by Design and Default Throughout the Life Cycle of Data|242
3|9.3.1 Initial Guidance by Article 25 GDPR|242
3|9.3.2 Privacy by Design When Collecting and Transmitting Data|244
3|9.3.3 Privacy by Design When Analyzing Data|249
3|9.3.4 Privacy by Design When Using Data|254
3|9.3.5 Privacy by Design When Erasing Data|256
2|9.4 Lessons Learned for Startups in the Internet of Things Market|257
2|9.5 Concluding Remarks|258
2|References|259
1|Chapter 10: Strengthening Privacy by Design|260
2|10.1 Challenges of Implementing Technical Tools|260
3|10.1.1 Economic Obstacles and Issues of Interoperability|260
3|10.1.2 Usability and Design Issues|262
3|10.1.3 Challenged Anonymity|263
3|10.1.4 Erasure and Control Issues|264
3|10.1.5 Interim Concluding Remarks|265
2|10.2 Developing Privacy Engineering Guidelines|265
3|10.2.1 Defining the Privacy Engineering Strategies and Goals|266
3|10.2.2 Prioritizing Goals and Defining Responsibilities|268
3|10.2.3 Evaluating and Managing Risks of Privacy Infringements|269
3|10.2.4 Defining Relevant Privacy Protection Technologies|270
2|10.3 Education of Developers and Individuals|271
2|10.4 New Privacy Professionals|272
2|10.5 Concluding Remarks|274
2|References|274
3|Literature|274
3|News(paper) Articles and Blogs|277
1|Chapter 11: Conclusion|278
2|11.1 A Look into the Future|278
3|11.1.1 Technical Shifts|278
3|11.1.2 Regulatory Shifts|279
3|11.1.3 Perspective Shifts|281
2|11.2 Closing Statement|284
2|References|285
3|Literature|285
3|News(paper) Articles and Blogs|287