22nd MARCH 2006SWAMI CONFERENCE SWAMI- presentation on legal aspects Serge Gutwirth Paul De Hert Wim Schreurs Anna Moscibroda.

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

CHILD-FRIENDLY JUSTICE GUIDELINES. Getting there (1) Gaps between law and practice CRC and ECHR Resolution No. 2 on Child-Friendly Justice (25-26 Oct.
ITU WORKSHOP ON STANDARDS AND INTELLECTUAL PROPERTY RIGHTS (IPR) ISSUES Session 5: Software copyright issues Dirk Weiler, Chairman of ETSI General Assembly.
1 PSI developments in the European Commission - where next for Europe? Richard Swetenham Head of Unit, Access to Information, European Commission Advisory.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Council of the European Union Working Party on Data Protection
EU Cross-Border Care Directive from the Primary Care perspective Results of a simulation Rita Baeten Gothenburg, 3 September 2012.
RFID The consumers’ scenarios Emilie Barrau ANEC General Assembly Brussels 1 June 2007.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Privacy Chris Kelly iLaw July 5, 2002.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Social and Economic Impacts of IT Professor Matt Thatcher.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
National Smartcard Project Work Package 8 – Security Issues Report.
Respecting the Best Interests of Children in Transnational Child Protection Cases Jyothi Kanics, Advocacy & Policy Specialist Child Rights Advocacy & Education.
1 ISO WD3 ISO/TMB WG SR – ISO ISO WD3 Contributing to the development of ISO Dubai Practitioners Workshop (10 July 2007)
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
VICTIMS’ RIGHTS New EU Directive establishing minimum standards on the rights, support and protection of victims of crime 20 September 2012 CABVIS Conference.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Professor Anthea Hucklesby Centre for Criminal Justice Studies, University of Leeds, UK Co-funded by the Criminal Justice Programme.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
Privacy Impact Assessments Iain Bourne, Group Manager, Policy Delivery Information Commissioner’s Office, UK Workshop on data protection and the internet:
European Data Protection Supervisor Pharmaceutical Regulatory & Compliance Congress, Brussels, 7 June 2007 European Privacy and Data Protection Policy.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
A project implemented by the HTSPE consortium This project is funded by the European Union SECURITY AND CITIZENSHIP RIGHT AND CITIZENSHIP
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig.
Proposal COM (2010) 395 final: Concrete recommendations from the health and safety perspective Stefano Boy, Engineer Paolo Derosas, Lawyer European Trade.
Slide 1 Federation des Experts Comptables Méditerranéens 4 th FCM Conference Capri, 3-4 May 2004 The Globalisation of Small and Medium-sized Enterprises.
Legal Language A CONCEPT OF NORM LEGAL PRINCIPLE.
Legal Language LEGAL PRINCIPLES. Preliminary remarks Various terms: Rule, norm, provision, regulation Polish Criminal Code Art § 1. Whoever kills.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
1 Revising the Data Protection Directive Reinventing Data Protection? Lilian Mitrou, Ass. Professor University of the Aegean 4 th International Seminar.
Copyright © Houghton Mifflin Company. All rights reserved.8-1 Chapter 8 Developing an Effective Ethics Program.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Data Protection and Enabling Psi Re-use EVPSI & LAPSI Final Meeting
Digital Single Market Valentinas KVIETKUS Baltic Assembly, Ryga
Privacy in the Digital Age: the UN General Assembly Resolution
Data Protection Officer’s Overview of the GDPR
The Protection of Confidential Commercial or Industrial Information in Environmental Law: Analysis and Call for a Graded Concept of Protection Prof. Dr.
EU Sanctions on Individuals
CAPACITY BUILDING PROGRAMME ON BOARD INDUCTION AND EVALUATION
▸ Agustín Reyna Conference dedicated to European Consumer Day Vilnius
General Data Protection Regulation
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
The Legal Framework of the Digital Surveillance Economy Roger Clarke & Angela Daly APSN – Uni Hong Kong – 27 September 2017 Xamax Consultancy,
Introduction to GDPR 09/11/2018.
Bart van der Sloot Data Protection 2.0 The proposal for a General Data Protection Regulation Bart van.
Ethical questions on the use of big data in official statistics
Presentation for information days Units involved:
Information technologies/NBIC and Big data
Bart van der Sloot Data Protection 2.0 The proposal for a General Data Protection Regulation Bart van.
The activity of Art. 29. Working Party György Halmos
2nd Biennial conference on the STOP program
Outline Background: development of the Commission’s position
Jean Bergevin European Commission GROW.F5 –
Charles D. Raab University of Edinburgh
Presentation transcript:

22nd MARCH 2006SWAMI CONFERENCE SWAMI- presentation on legal aspects Serge Gutwirth Paul De Hert Wim Schreurs Anna Moscibroda

22nd MARCH 2006SWAMI CONFERENCE Work package 1: A state-of-the-art Deliverable D1: The brave new world of ambient intelligence: A state-of-the-art review (July 2005) Existing legal framework for AmI described Subject matters: Privacy and Data Protection Intellectual Property Rights E-commerce and Consumer Protection Torts and Liability I.C.T. Law Criminal Law Antidiscrimination law Jurisdiction and Applicable Law

22nd MARCH 2006SWAMI CONFERENCE Work package 2: developing dark scenarios -Aim: Creating and analysing more realistic scenarios that highlight the key socio-economic, legal, technological and ethical risks of AmI -Scenarios on: -A typical family in different environments -Senior on journey -Corporate boardroom and court case -Risk Society

22nd MARCH 2006SWAMI CONFERENCE Legal analysis of scenarios Approach: –Highlighting situations in the scenario that raise legal questions –Indication and assessment of the existing legal rules on EU level –Results: identification of existing lacunae

22nd MARCH 2006SWAMI CONFERENCE Work package 3 (ongoing): Developing safeguards Aim: to identify the research and policy options built into the Information Society Services, the safeguards addressing key risks and vulnerabilities.

22nd MARCH 2006SWAMI CONFERENCE Particularities of regulating the AmI (cyberspace) CONTEXT 1 [The Law of the Horse: What Cyberlaw might teach L. Lessig, Harvard Law Review, Vol. 133:501 ] Law as one of the set of tools regulating behaviour- also prise, social norms and code –certain legal norm might be difficult to enforce because of the architecture of the new environment (data protection obligation, protection of copyrights) –new problems may arise form the way the new environment is designed (dataveillance, spam) –should than law change, should the architecture change?

22nd MARCH 2006SWAMI CONFERENCE Law regulates via the sanction Code regulates by enabling or disabling certain behaviour. Law can regulate via influencing architecture Effective tackling the identified problems often needs both approaches in the same time =RECOMMENDATION 1

22nd MARCH 2006SWAMI CONFERENCE Examples of the law rules regulating itself: –liability rules –data laundering –private international law –antidiscrimination Examples of law regulating via architecture: –PETs –Making passports machine-readable –Data retention and wiretapping –Restricted interoperability

22nd MARCH 2006SWAMI CONFERENCE Particularities of regulating the AmI (cyberspace) CONTEXT 2 Precautionary principle is a legal principle for ecological problems (irreversible) –But is it a principle to be applied to ICT problems and AmI in particular? –NO (or not always)

22nd MARCH 2006SWAMI CONFERENCE Solution for European Information Society OPACITY (Saying under no circumstances) TRANSPARENCY (saying yes but) -Europe uses both tools. We can understand the difference between the right to privacy (opacity tool) and the right to have data protected (transparency tool) along these lines

22nd MARCH 2006SWAMI CONFERENCE Some challenges to the privacy due to the features of the new environment- dataveillance could be addressed by opacity tools: Use of anonymous, pseudonymous, credentials and trusted third parties legal framework for the digital territories Spaces not monitored- Regulating by influencing architecture Restrictions on the unjustified and disproportional usage of implants Restriction of usage of evidence obtained in the privacy violation Regulating by law itself SWAMI Safeguards in a World of Ambient Intelligence

22nd MARCH 2006SWAMI CONFERENCE Most challenges due to the features of the new environment- dataveillance should be addressed by transparency tools such as data protection and security measures = RECOMMENDATION 2

22nd MARCH 2006SWAMI CONFERENCE Particularities of regulating the AmI (cyberspace) CONTEXT 3 A central law maker does not exist –European federalism (EU cannot regulate every aspect of AmI; – f.e. national id cards) –Executive powers in Member States are omni powerful but have delegated part of the decision making power to independent advisory organs (f.e. children rights commissioners & data protection authorities) –Producers are also lawmakers (f.e. acrobat reader)

22nd MARCH 2006SWAMI CONFERENCE Keep eye on this legal pluralism Keep eye on how courts work (see later) let all actors play their respective roles e.g. labour law in workplace surveillance e.g. consumer law organisations e.g. children rights authorities e.g. participatory technology assessment (patients in Warwicks example) = RECOMMENDATION 3

22nd MARCH 2006SWAMI CONFERENCE Particularities of regulating the AmI (cyberspace) CONTEXT 4 Legal profession avoids high level (of abstraction) arguments but prefers to stick to medium level or if possible low level arguments –A holistic legal initiative is not to be expected =RECOMMENDATION 4: focus on concrete technologies (RFID, biometrics and relevant concepts such as interoperability), apply opacity and transparency accordingly

22nd MARCH 2006SWAMI CONFERENCE Example of a legal recommendation: Liability What we see: little legal attention for software error or deficient software quality What we propose: to consider stricter liability for software or reversing the burden of proof How? Extending reach of Directive 85/374 concerning liability for defective products

22nd MARCH 2006SWAMI CONFERENCE Example of a legal recommendation: Data protection What we see: problems with consent, with purpose specification principle, etc. What we also see: legal framework is questioned by introducing novel concepts such as principle of availability and interoperability We propose not to come up with something new but give legal machine time to work (consider the work of data protection watchdogs and wait for court decisions) First results: Goggle handling over only items; European consensus about higher degree of suspicion when accessing non- police databases; introduction of privacy impact studies at EU level

22nd MARCH 2006SWAMI CONFERENCE Example of a legal recommendation: social responsibility What we see: our society is equality driven What we propose: certain services should provided for all at affordable price or for free (emergency services, basic software), after consultation of stakeholders (aging people, etc.) How: new Directive on Universal Services

22nd MARCH 2006SWAMI CONFERENCE Future ? Understanding role of law next to other instruments Understanding role of soft law Exploring potential of participatory technology assessment Identifying who is responsible for what when (Ch. Raab)

22nd MARCH 2006SWAMI CONFERENCE Thank You