EU Directive 2002/58/EC Directive on privacy and electronic communication Applies to the processing of personal data in connection with the provision of.

Slides:



Advertisements
Similar presentations
The Basic Structure of the Georgia state constitution
Advertisements

Classroom Bill of Rights
Session 1: WTO Work on Transparency in Government Procurement January, Dar es Salaam Vesile Kulaçoglu,WTO Secretariat.
Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Hamlet /Media Outline. I. Thesis Statement: (Director)s To be or not to be and (director)s Alas poor Yorick best exemplify William Shakespeares original.
Kåre Lilleholt Comparative Private Law A Common European Sales Law? Proposal for regulation: COM(2011) 635 final An optional 2 nd regime for cross-border.
Reagan/Clinton Compare/Contrast Essay. I. Reagan and Clinton both argue... but... A.Reagan argues B.Clinton argues.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 21 Networking and Internetworking Devices.
Universal Data Collection (UDC) Mapping Project
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=

Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
The Stations Of The Cross
Monitoring of the internet: between the need of security, the interests of the economy and protection of the private life Hugo Lança Beja - Portugal.
Data protection supervision authority’s practice concerning exception provided in par. 2 of article 5 of Directive 2002/58/EC DIJANA ŠINKŪNIENĖ State Data.
Ioannis Iglezakis Directive on privacy and electronic communications.
The Bill of Rights. I Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
ICT AND BUSINESS AND SOCIETY
Threat An action or event that can lead the some loss is known as threat.
Chapter 11 Networking and Internetworking Devices BY Dr.Sukchatri Prasomsuk.
Membership (I) Membership (currently 160 Members): who can be a Member? -States; -separate customs territory (Macao, Hong Kong, Chinese Taipei) -European.
- Existing Multilateral Disciplines on Trade in Services First agreement of multilateral and legally-enforceable rules aimed at the liberalisation of trade.
Roman Numeral Multiplication Quiz
TITLES OF THE HOLY SPIRIT TEXT: Ephesians 1:13,14.
Benny Hoff TÜV NORD Sweden AB
Privacy and Data Protection in e-Communications Sector Legislation, Codes of Practice and Standards Privacy and Data Protection in e-Communications Sector.
Chapter 40 The Resurgence of Conservatism, 1980–1992.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Council Directive 2003/9/EC laying down standards for the reception of asylum seekers European Commission Directorate-General External Relations.
OUTLINE OF KEY PROVISIONS IN THE EU REGULATION (1223/2009) ON COSMETIC PRODUCTS INT MARKT Turkey, Ankara 2013 István Murányi KOZMOS, secretary-general.
Unit 7 International Law of Treaties
ПОРТФОЛИО профессиональной деятельности Белово 2015 Таюшовой Натальи Борисовны Преподавателя дисциплин «Химия», «Биология»
Independent Centre for Privacy Protection Schleswig-Holstein
EU RULE FOR FREE MOVEMENT OF CAPITAL
Suggestion for Summarizing Process of the Principles
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Contractual obligations
NATIONAL PRIVACY COMMISSION’s IMPLEMENTING RULES AND REGULATIONS
Kappa Psi Pharmaceutical Fraternity, Inc.
The Modus Operandi of the Commission on the Limits of the Continental Shelf Harald Brekke CLCS Member.
Proposal for a Regulation on medical devices and Proposal for a Regulation on in vitro diagnostic medical devices Key Provisions and GIRP Assessment.
Flow diagrams (i) (ii) (iii) x – Example
DATA e-Privacy Regulation Proposal
3. Old Brain I III II V IV VII VI VIII IX X XII XI
ОПШТИНА КУРШУМЛИЈА.
Terry’s Code of Ethics for Bus Service Contractors
Tweet summary of article I
צו תעריף המכס והפטורים ומס- קניה התשע"ב – 2012
International legal framework: Obligations and responsibilities under the IPPC The IPPC Secretariat With the financial support of the STDF project 401.
Unit 9; Civil Rights and Civil Liberties
Index Notation Sunday, 24 February 2019.
Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
УВС АЙМГИЙН НИЙГЭМ ЭДИЙН
Mattias Skafar Head of Quality Division
BUSINESS CONTINUITY PLAN
GLANDS OF THE ENDOCRINE SYSTEM
EU Food Safety Requirements: - Hygiene of Foodstuffs -
EU-Project: Trade and Private Sector Development (TPSD)
EU-Project: Trade and Private Sector Development (TPSD)
BUSINESS CONTINUITY PROGRAM
EU Data Protection Legislation
SUPER SUNDAY XIII February 25
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 21 Networking and Internetworking Devices.
8 Core Steps of success: I.Step:1 : DREAM SETTING: II. Step: 2 : LIST MAKING : IV. Step: 4 : SHOW THE PLAN: III. Step: 3 : INVITATION: V. Step: 5 : FOLLOW.
BUSINESS CONTINUITY PLAN
Presentation transcript:

EU Directive 2002/58/EC Directive on privacy and electronic communication Applies to the processing of personal data in connection with the provision of publicly available electronic communications services in public communication networks in the EU

Articles of the Directive Article I: Scope and Aim Article II: Definitions Article III: Services concerned Article IV: Security –assure a level of security appropriate to the risk presented Article V: Confidentiality of communications—member states to put in place national legislation—they shall prohibit listening, tapping, storage, or other kinds of interception or surveillance of communications nor the related traffic data by persons other than users without the consent of the users concerned

Article VI: Traffic data—processed as necessary to provide service and then erased; user given right to withdraw consent at any time Article VII: Itemized billing—right to receive non-itemized bills Article VIII: Caller ID—blocking to be available free of charge

Article IX: Location data other than traffic data—user consent required unless they are made anonymous Article X: Exceptions—dealing with Caller-ID for tracing nuisance calls and for emergency calls Article XI Automatic call forwarding—ability to stop it from a third party

Article XII: Directories – not being included, verifying, correcting or withdrawing personal data shall be free of charge Article XIII: Unsolicited communications – need prior consent