Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet190/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   186   187   188   189   190   191   192   193   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

185
 
The role of the E.U. reform on data protection 
Although the Proposal for a new regulation does not regard the data processed 
by public authorities for the purposes of prevention, investigation, detection, pros-
ecution of criminal offences or the execution of criminal penalties,
21
its impact on 
social control is significant, since in many cases the databases of private companies 
are targeted by public authority investigations. For this reason, reducing the amount 
of data collected by private entities and increasing data subjects' self-determination 
with regard to their personal information limit the possibility of subsequent social 
control initiatives by government agencies.
However, the complexity of data processes and the power of modern analytics 
along with the presence of technological and market lock-in effects drastically reduce 
the awareness of data subjects, their capability to evaluate the various consequences 
of their choices and the expression of a real free and informed consent (
Brandimarte
et al., 2010
). This lack of awareness facilitates the creation of wider databases, which are 
accessible by the authorities in cases provided by the law, and is not avoided by giving 
adequate information to the data subjects or by privacy policies, due to the fact that these 
notices are read only by a very limited number of users who, in many cases, are not able 
to understand part of the legal terms usually used in these notices (
Turow et al., 2007
).
These aspects are even more relevant in a Big Data context rendering the tradi-
tional model of data protection to be in crisis (
Cate, 2006
; See also 
Cate and Mayer-
Schönberger, 2012; Rubinstein, 2013
). The traditional model is based on general 
prohibition plus “notice and consent”
22
and the coherence of the data collection with 
the purposes defined at the moment in which the information is collected. However, 
nowadays much of the value of personal information is not apparent when notice and 
consent are normally given (
Cate, 2006
; See also 
Cate and Mayer-Schönberger, 2012; 
Rubinstein, 2013
) and the “transformative” (
Tene and Polonetsky, 2012
) use of Big Data 
makes it often impossible to explain the description of all its possible uses at the time of 
initial collection.
The E.U. Proposal, in order to reinforce the protection of individual informa-
tion, interacts with these constraints and shifts the focus of data protection from an 
individual choice toward a privacy-oriented architecture (
Mantelero, 2013a
).
23
 This 
approach, which limits the amount of data collected through “structural” barriers 
and introduces a preventive data protection assessment (
Article 23, 2013
), also 
produces a direct effect on social control by reducing the amount of information 
available.
21 
This area will fall under the new Proposal for a Directive on the protection of individuals with regard 
to the processing of personal data by competent authorities for the purposes of prevention, investiga-
tion, detection or prosecution of criminal offences or the execution of criminal penalties, and the free 
movement of such data, COM(2012) 10 final, Brussels, 25 January 2012 (hereinafter abbreviated as 
PDPI). Available at 
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0010:FIN:E
N:PDF
[Dec. 10, 2013]; see the Explanatory Memorandum of the Proposal.
22 
With regard to personal information collected by public entities the Directive 95/45/EC permits the 
data collection without the consent of data subject in various cases; however, the notice to data subjects 
is necessary also in these cases. See Articles 7, 8 and 10, Directive 95/46/EC.
23 
See Article 23, PGDPR-LIBE_1-29 and also Article 23, PGDPR.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   186   187   188   189   190   191   192   193   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish