Report Legal Research Assistance That Can Make a Builds

Total Page:16

File Type:pdf, Size:1020Kb

Report Legal Research Assistance That Can Make a Builds EUROPEAN DIGITAL RIGHTS A LEGAL ANALYSIS OF BIOMETRIC MASS SURVEILLANCE PRACTICES IN GERMANY, THE NETHERLANDS, AND POLAND By Luca Montag, Rory Mcleod, Lara De Mets, Meghan Gauld, Fraser Rodger, and Mateusz Pełka EDRi - EUROPEAN DIGITAL RIGHTS 2 INDEX About the Edinburgh 1.4.5 ‘Biometric-Ready’ International Justice Cameras 38 Initiative (EIJI) 5 1.4.5.1 The right to dignity 38 Introductory Note 6 1.4.5.2 Structural List of Abbreviations 9 Discrimination 39 1.4.5.3 Proportionality 40 Key Terms 10 2. Fingerprints on Personal Foreword from European Identity Cards 42 Digital Rights (EDRi) 12 2.1 Analysis 43 Introduction to Germany 2.1.1 Human rights country study from EDRi 15 concerns 43 Germany 17 2.1.2 Consent 44 1 Facial Recognition 19 2.1.3 Access Extension 44 1.1 Local Government 19 3. Online Age and Identity 1.1.1 Case Study – ‘Verification’ 46 Cologne 20 3.1 Analysis 47 1.2 Federal Government 22 4. COVID-19 Responses 49 1.3 Biometric Technology 4.1 Analysis 50 Providers in Germany 23 4.2 The Convenience 1.3.1 Hardware 23 of Control 51 1.3.2 Software 25 5. Conclusion 53 1.4 Legal Analysis 31 Introduction to the Netherlands 1.4.1 German Law 31 country study from EDRi 55 1.4.1.1 Scope 31 The Netherlands 57 1.4.1.2 Necessity 33 1. Deployments by Public 1.4.2 EU Law 34 Entities 60 1.4.3 European 1.1. Dutch police and law Convention on enforcement authorities 61 Human Rights 37 1.1.1 CATCH Facial 1.4.4 International Recognition Human Rights Law 37 Surveillance Technology 61 1.1.1.1 CATCH - Legal Analysis 64 EDRi - EUROPEAN DIGITAL RIGHTS 3 1.1.2. Foreign National Introduction to Poland country Database 67 study from EDRi 100 1.1.2.1 Foreign National Poland 103 Database - 1. The Domestic Legal Legal Analysis 68 Framework 105 1.1.3 Clearview AI 70 1.1 An Overview 105 1.1.3.1 Clearview AI - 1.2 The Constitution 105 Legal Analysis 71 1.3 The GDPR 106 1.1.4 Camera in Beeld 71 1.3.1 The Act of 10th May 1.1.5. Smart doorbells 71 2018 106 1.1.5.1 Camera in Beeld 1.3.2 The Act of 21st and Smart Doorbells February 2019 107 - Legal Analysis 75 1.4 The Office of Personal 1.2. Municipalities 77 Data Protection (“UODO”) 107 1.2.1 Municipalities - 1.5 Other Acts Governing Legal Analysis 78 Surveillance 109 1.3 Conclusion 80 2. “Kwarantanna Domowa” – 2. Deployments by Private Poland’s Home Quarantine Entities 81 App 110 2.1 Retail 81 2.1 An overview 110 2.2 Casinos 82 2.2 Analysis 112 2.3. Football clubs and 2.2.1 Legal Basis 112 stadiums 83 2.2.2 Necessity and 2.4 Schiphol airport 85 Proportionality 113 2.5 Public transport 85 2.2.3 Government 2.6 International Legal Motivations for Biometric Framework 86 Surveillance 115 3. ‘Living Labs’ 88 2.2.4 Mass Surveillance 3.1 Roermond 88 Concerns 116 3.2 Eindhoven ‘Living Lab’ 89 3. The Use of Fingerprints in 3.2.1 The CityPulse Biometric IDs 118 Project 90 3.1 The Current Law 118 3.2.2 The De-Escalate 3.2 The Proposed Project 92 Amendments 119 3.2.3 The European 3.2.1 Inability to Consent 120 Project 93 3.2.2 Necessity and 3.3 Utrecht 93 Proportionality 121 3.4 Enschede 94 3.2.3 Mass Surveillance 3.5 Legal Analysis 95 Concerns 122 4. Conclusion 97 EDRi - EUROPEAN DIGITAL RIGHTS 4 4. Pegasus Spyware 124 4.1 An overview 124 4.2 Legal Analysis 126 4.2.1 Surveillance Oversight 126 4.2.2 The Inadequacy of Domestic Law 127 4.2.3 Mass Surveillance Concerns 129 4.2.4 Human Rights Concerns 130 5. Conclusion 132 General Summary 134 Bibliography 136 Appendices 157 EDRi - EUROPEAN DIGITAL RIGHTS 5 About the Edinburgh International Justice The EDRi Brussels office lead for this Initiative (EIJI) piece of work was Ella Jakubowska, Policy The Edinburgh International Justice Advisor, with support from Diego Naranjo, Initiative (EIJI) is a student run initiative Head of Policy. that seeks to help institutions working to ensure justice for victims of international The EDRi Brussels office would like to crimes and strengthen the international express our sincere gratitute to the whole justice system by providing pro-bono EDRi network, upon whose work this report legal research assistance that can make a builds. In particular, we would like to thank practical difference. the following organisations for making a particular contribution to this report: About European Digital Rights (EDRi) EDRi is the biggest European network Bits of Freedom (the Netherlands); defending rights and freedoms online. Chaos Computer Club (CCC) (Germany); The EDRi network is a dynamic and resilient Fundacja Panoptykon (Poland); collective of 45 NGOs, as well as experts, Electronic Privacy Information Center advocates, and academics working to (EPIC) (International). defend and advance digital rights across Europe and beyond. Brussels, 7 July 2021. Together, the EDRi network builds a movement of organisations and individuals pushing for robust and enforced laws, informing and mobilising people, and promoting a healthy and accountable technology market. EDRi - EUROPEAN DIGITAL RIGHTS 6 INTRODUCTORY NOTE Acknowledgements The way this report is used by the EIJI’s The team would like to thank Benedict partners is at their sole discretion and does Coyne, who provided invaluable support not reflect the views of the EIJI. Where EDRi and detailed feedback as the external has chosen to frame the research within supervisor on this project. The team would the context of EDRi’s advocacy work, this is also like to thank Ella Jakubowska, our clearly marked within this report as EDRi’s point of contact in EDRi, for clarifying contribution. any and all questions, providing us with invaluable guidance throughout, and Research Team linking us with important contacts. Finally, Luca Montag (Research Team Coordinator) the team thanks everyone at EIJI for their is a fourth year LLB student at the hard work and diligence in facilitating this University of Edinburgh with a particular project. Thank you all. interest in the field of digital rights, employment, and public law. He has been Disclaimer involved with the EIJI since June 2020 as a The EIJI is a student-led body. As we are legal researcher and later as a Research not lawyers, we are not giving legal advice. Coordinator. Our role is to provide research assistance to EDRi, and thus we do not assume any liability for how this report is used in the future. Furthermore, the EIJI is an apolitical body. The contents of this report are not to be viewed as a political statement nor as a form of advocacy work. EDRi - EUROPEAN DIGITAL RIGHTS 7 Rory Macleod is in his second year of Mateusz Pełka is a third year LLB student the accelerated LLB at the University of at the University of Edinburgh, with a Edinburgh, having previously completed keen interest in European Union law and a degree in Practical Filmmaking at the intellectual property. He joined the EIJI in University of West London. He has a September 2020 and hopes to pursue a particular interest in constitutional and career working for the European Court of public law and hopes to pursue a legal Justice in the future. career that furthers the public interest in Scotland. He joined the EIJI in October 2020. Context Background Lara De Mets is an LLM student at the Although surveillance measures have University of Edinburgh, pursuing a Masters been a part of human history for decades, in International Law. She previously the digital age has ushered in a myriad of obtained an LLB (Hons) degree in Law and tools and possibilities for the collection, Politics from the University of Glasgow. retention, and processing of information She joined the EIJI in September 2020 and which can identify individuals. has keen interests in issues surrounding gender (in)justice in peace processes and The use of biometrics, such as facial the Israel-Palestine conflict. features, fingerprints, gait, and vein patterns, has become increasingly more Meghan Gauld is a third year International common in recent years. Their use cuts Law and International Relations student across a wide range of practices and at the University of Edinburgh. She surveillance measures are no exception. It is interested in constitutional law, is their use as a mass surveillance tool that international criminal law, and the law of is the subject of this report. international trade. She joined the EIJI in September 2020. Fraser Rodger is a third year Law and French LLB student at the University of Edinburgh, with keen interests in international human rights, criminal law, and constitutional law. He joined the EIJI in September 2020 and hopes to qualify as an advocate or barrister. EDRi - EUROPEAN DIGITAL RIGHTS 8 Research task The research was conducted in two phases. Our task was to produce country reports on The first was the identification of biometric EU member states in respect of biometric processing activities that fell within the mass surveillance practices. The chosen scope of biometric mass surveillance. In research question to be applied to these identifying the major deployments in each reports was a general analysis of the legal jurisdiction, the team relied on a breadth basis of various biometric processing of sources, including: EU legislation, press activities in the respective country, taking statements, government publications, into account multiple deployments in Venice Commission reports, relevant varying levels of detail, in addition to domestic legal acts and judicial decisions, the implications of such activities in ombudsman reports, academic articles, International, European, and national law.
Recommended publications
  • Clearview AI Has Billions of Our Photos. Its Entire Client List Was Just Stolen by Jordan Valinsky, CNN Business Updated 1:24 PM ET, Wed February 26, 2020
    Clearview AI has billions of our photos. Its entire client list was just stolen By Jordan Valinsky, CNN Business Updated 1:24 PM ET, Wed February 26, 2020 New York (CNN Business)Clearview AI, a startup that compiles billions of photos for facial recognition technology, said it lost its entire client list to hackers. The company said it has patched the unspecified flaw that allowed the breach to happen. In a statement, Clearview AI's attorney Tor Ekeland said that while security is the company's top priority, "unfortunately, data breaches are a part of life. Our servers were never accessed." He added that the company continues to strengthen its security procedures and that the flaw has been patched. Clearview AI continues "to work to strengthen our security," Ekeland said. In a notification sent to customers obtained by Daily Beast, Clearview AI said that an intruder "gained unauthorized access" to its customer list, which includes police forces, law enforcement agencies and banks. The company said that the person didn't obtain any search histories conducted by customers, which include some police forces. The company claims to have scraped more than 3 billion photos from the internet, including photos from popular social media platforms like Facebook, Instagram, Twitter and YouTube. The firm garnered controversy in January after a New York Times investigation revealed that Clearview AI's technology allowed law enforcement agencies to use its technology to match photos of unknown faces to people's online images. The company also retains those photos in its database even after internet users delete them from the platforms or make their accounts private.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Mass Surveillance
    Thematic factsheet1 Update: July 2018 MASS SURVEILLANCE The highly complex forms of terrorism require States to take effective measures to defend themselves, including mass monitoring of communications. Unlike “targeted” surveillance (covert collection of conversations, telecommunications and metadata by technical means – “bugging”), “strategic” surveillance (or mass surveillance) does not necessarily start with a suspicion against a particular person or persons. It has a proactive element, aimed at identifying a danger rather than investigating a known threat. Herein lay both the value it can have for security operations, and the risks it can pose for individual rights. Nevertheless, Member States do not have unlimited powers in this area. Mass surveillance of citizens is tolerable under the Convention only if it is strictly necessary for safeguarding democratic institutions. Taking into account considerable potential to infringe fundamental rights to privacy and to freedom of expression enshrined by the Convention, Member States must ensure that the development of surveillance methods resulting in mass data collection is accompanied by the simultaneous development of legal safeguards securing respect for citizens’ human rights. According to the case-law of the European Court of Human Rights, it would be counter to governments’ efforts to keep terrorism at bay if the terrorist threat were substituted with a perceived threat of unfettered executive power intruding into citizens’ private lives. It is of the utmost importance that the domestic legislation authorizing far-reaching surveillance techniques and prerogatives provides for adequate and sufficient safeguards in order to minimize the risks for the freedom of expression and the right to privacy which the “indiscriminate capturing of vast amounts of communications” enables.
    [Show full text]
  • EPIC FOIA Request 1 Facial Recognition PIA June 10, 2020 ICE C
    VIA EMAIL June 10, 2020 Fernando Pineiro FOIA Officer U.S. Immigration and Customs Enforcement Freedom of Information Act Office 500 12th Street, S.W., Stop 5009 Washington, D.C. 20536-5009 Email: [email protected] Dear Mr. Pineiro: This letter constitutes a request under the Freedom of Information Act (“FOIA”), 5 U.S.C. § 552(a)(3), and is submitted on behalf of the Electronic Privacy Information Center (“EPIC”) to U.S. Immigration and Customs Enforcement (“ICE”). EPIC seeks records related to the agency’s use of facial recognition software (“FRS”). Documents Requested 1. All contracts between ICE and commercial FRS vendors; 2. All documents related to ICE’s approval process for new commercial FRS vendors, including but not limited to: a. Document detailing the approval process and requirements for commercial FRS vendors b. Documents related to the approval of all commercial FRS vendors currently in use by ICE c. Documents related to reviewing commercial FRS vendors that have been used under “exigent circumstances” without prior approval; 3. All training materials and standard operating procedures for Homeland Security Investigations (“HSI”) agents regarding use of FRS, including but not limited to the following: a. Existing training materials and standard operating procedures around HSI agent use of FRS b. Existing training materials and standard operating procedures regarding restrictions on the collection of probe photos EPIC FOIA Request 1 Facial Recognition PIA June 10, 2020 ICE c. Training materials and standard operating procedures being developed for HSI agent use of FRS d. Training materials and standard operating procedures being developed regarding the use of probe photos; 4.
    [Show full text]
  • 1:21-Cv-00135 Document #: 31 Filed: 04/09/21 Page 1 of 18 Pageid #:232
    Case: 1:21-cv-00135 Document #: 31 Filed: 04/09/21 Page 1 of 18 PageID #:232 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION Civil Action File No.: 1:21-cv-00135 In re: Clearview AI, Inc. Consumer Privacy Litigation Judge Sharon Johnson Coleman Magistrate Judge Maria Valdez PLAINTIFFS’ MEMORANDUM OF LAW IN SUPPORT OF MOTION FOR PRELIMINARY INJUNCTION Case: 1:21-cv-00135 Document #: 31 Filed: 04/09/21 Page 2 of 18 PageID #:233 INTRODUCTION Without providing notice or receiving consent, Defendants Clearview AI, Inc. (“Clearview”); Hoan Ton-That; and Richard Schwartz (collectively, “Defendants”): (a) scraped billions of photos of people’s faces from the internet; (b) harvested the subjects’ biometric identifiers and information (collectively, “Biometric Data”); and (c) created a searchable database of that data (the “Biometric Database”) which they made available to private entities, friends and law enforcement in order to earn profits. Defendants’ conduct violated, and continues to violate, Illinois’ Biometric Information Privacy Act (“BIPA”), 740 ILCS 14/1, et seq., and tramples on Illinois residents’ privacy rights. Unchecked, Defendants’ conduct will cause Plaintiffs David Mutnick, Mario Calderon, Jennifer Rocio, Anthony Hall and Isela Carmean and Illinois class members to suffer irreparable harm for which there is no adequate remedy at law. Defendants have tacitly conceded the need for injunctive relief. In response to Plaintiff Mutnick’s preliminary injunction motion in his underlying action, Defendants desperately sought to avoid judicial oversight by claiming to have self-reformed. But Defendants have demonstrated that they cannot be trusted. While Defendants have represented that they were cancelling all non- law enforcement customer accounts, a recent patent application reveals Defendants’ commercial aspirations.
    [Show full text]
  • EPIC FOIA Request 1 Clearview AI March 6, 2020 FBI VIA FACSIMILE
    VIA FACSIMILE March 6, 2020 David M. Hardy, Section Chief Record/Information Dissemination Section Federal Bureau of Investigation 170 Marcel Drive Winchester, VA 22602-4843 Fax: (540) 868-4997 Attn: FOIA Request Dear Mr. Hardy: This letter constitutes a request under the Freedom of Information Act (“FOIA”), 5 U.S.C. § 552(a)(3), and is submitted on behalf of the Electronic Privacy Information Center (“EPIC”) to the Federal Bureau of Investigation (“FBI”). EPIC seeks records related to the agency’s use of Clearview AI technology.1 Documents Requested 1. Emails and communications about Clearview AI, Inc., including but not limited to the following individuals and search terms: a. Clearview b. Clearview AI c. Hoan Ton-That d. Tor Ekeland e. Third parties with an email address ending in “@clearview.ai” 2. All contracts or agreements between the FBI and Clearview AI, Inc.; 3. All presentations mentioning Clearview; 4. All Clearview sales materials; 5. All privacy assessments, including but not limited to Privacy Threshold Analysis and/or Privacy Impact Assessments, that discuss the use of Clearview AI technology. Background A recent New York Times investigation revealed that a secretive New York-based company, Clearview AI, Inc., has developed an application that allows law enforcement agencies to identify people in public spaces without actually requesting identity documents or without a legal basis to 1 Clearview AI, Inc., https://clearview.ai/. EPIC FOIA Request 1 Clearview AI March 6, 2020 FBI determine the person’s identity.2 Clearview
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Vehicle and Object Tracking Based on GPS and GSM
    ISSN 2394-7314 International Journal of Novel Research in Computer Science and Software Engineering Vol. 3, Issue 1, pp: (255-259), Month: January-April 2016, Available at: www.noveltyjournals.com Vehicle and Object Tracking Based on GPS and GSM 1Sonali Kumari, 2Simran Ghai, 3Bharti Kushwaha 1,2,3Department of Computer Science, Dronacharya Group of Institutions, Greater Noida (U.P), India Abstract: Global positioning system is globally used for the navigation purpose. GPS is mainly used in military purpose, farming technologies, civil, transportation for example in vehicles and commercial users around the world. This paper describes a practical model for routing and tracking of vehicles in a large area outdoor environment, based on GSM i.e. Global System for Mobile Communication and GPS i.e. Global Positioning System. The supporting device GPS continuously move with the vehicle and records the position of the vehicle. It can be communicate with the help of GSM modern which is installed in both transmitters and receivers, when it is required by the owner. GSM model is controlled by 32 bit ARM7 LPC2148. The device will records positions to supervised centre by the SMS or GPRS which can be located in the GOOGLE EARTH and therefore the current position of the vehicle can be known. This research paper describes the working of GPS tracking system and its usefulness in actual world environment. Localisation algorithm, Kalman filter algorithm are some algorithms we will discuss in this paper. Keywords: GPS, Vehicle Tracking GSM, Google Earth, GNSS, NMEA & GPGGA General Term: Kalman algorithm, Localisation, Improvement Algorithm. 1. INTRODUCTION GPS: The GPS is formed by 24 Earth orbiting satellite and 3 more solar powered satellite use in case if any satellite doesn’t work.
    [Show full text]
  • RIVM Report 680705009 Non-Linearity in the Nox/NO2 Conversion
    Report 680705009/2008 J. Wesseling | F. Sauter Non-linearity in the NOx/NO2 conversion RIVM Report 680705009/2008 Non-linearity in the NOx/NO2 conversion J. Wesseling, RIVM F. Sauter, RIVM Contact: Joost Wesseling RIVM/LVM [email protected] This investigation has been performed by order and for the account of Ministry of VROM, within the framework of the project Urban Air Quality, project M/680705/07. RIVM, P.O. Box 1, 3720 BA Bilthoven, the Netherlands Tel +31 30 274 91 11 www.rivm.nl RIVM National Institute for Public Health and the Environment P.O. Box 1 3720 BA Bilthoven The Netherlands www.rivm.com © RIVM 2008 Parts of this publication may be reproduced, provided acknowledgement is given to the 'National Institute for Public Health and the Environment', along with the title and year of publication. 2 RIVM Report 680705009 Abstract Non-linearity in the NOx/NO2 conversion The yearly average NO2 concentration along roads is influenced by the way it is calculated. The RIVM has analyzed the mathematical relations involved of some of the models being used in the Netherlands. With this information, the differences between model calculations as well as between models and experimental data can be understood in a better way. On locations with a lot of traffic the yearly average limit value for NO2 is exceeded regularly. In the Netherlands compliance with EU air quality regulations is usually checked using the results of model calculations. The models being used in the Netherlands calculate the NO2 concentrations in several ways. It is long known that different calculation schemes produce different results.
    [Show full text]
  • COVID Tracker That Allowed, Inter Alia, Medical Officers to Order App
    COVID-19 Technology in the EU: A BITTERSWEET VICTORY FOR HUMAN RIGHTS? May 2021 COVID-19 Technology in the EU: A Bittersweet Victory for Human Rights? Publisher This project has been supported by the Civil Liberties Union for Europe e.V European AI Fund, a collaborative initiative Ringbahnstraße 16-18-20 of the Network of European Foundations 12099 Berlin, Germany (NEF). The sole responsibility for the project www.liberties.eu lies with the organiser(s) and the content may not necessarily reflect the positions of Editor European AI Fund, NEF or European AI Orsolya Reich Fund’s Partner Foundations. Assistant Editor A grant from Digital Freedom Fund allowed Jascha Galaski initial research to be conducted in twelve EU member states for the purposes of deciding Copy Editor over possible future strategic litigation actions. Jonathan Day This work is licensed under the Creative Authors Commons Attribution 4.0 International Nikolett Aszodi (Austria, England & License. To view a copy of this license, visit Wales, France, Greece, Luxembourg, Malta, http://creativecommons.org/licenses/by/4.0/ Portugal) or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. Jascha Galaski (Belgium, Bulgaria, Croatia, Germany, Italy, Ireland, Lithuania, Poland, Slovenia, Spain, Sweden) Oleksandra Konoplia (Czechia, Cyprus, Denmark, Estonia, Finland, Latvia, Netherlands, Slovakia) Orsolya Reich (Introduction, Hungary) 2 COVID-19 Technology in the EU: A Bittersweet Victory for Human Rights? Table of contents Introduction 4 The risks of tracing
    [Show full text]
  • Acculturation of Moroccan-Dutch Azghari, Youssef; Hooghiemstra, E.; Van De Vijver, Fons
    Tilburg University The historical and social-cultural context of acculturation of Moroccan-Dutch Azghari, Youssef; Hooghiemstra, E.; van de Vijver, Fons Published in: Online Readings in Psychology and Culture DOI: 10.9707/2307-0919.1155 Publication date: 2017 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Azghari, Y., Hooghiemstra, E., & van de Vijver, F. (2017). The historical and social-cultural context of acculturation of Moroccan-Dutch. Online Readings in Psychology and Culture, 8(1). https://doi.org/10.9707/2307-0919.1155 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 02. okt. 2021 Unit 8 Migration and Acculturation Article 11 Subunit 1 Acculturation and Adapting to Other Cultures 10-1-2017 The iH storical and Social-Cultural Context of Acculturation of Moroccan-Dutch Youssef Azghari Tilburg University and Avans University, [email protected] Erna Hooghiemstra Tilburg University, [email protected] Fons J.R.
    [Show full text]
  • Herding Katz: GPS Tracking and Society's Expectations of Privacy In
    Herding Katz: GPS Tracking and Society’s Expectations of Privacy in the 21st Century * by ZACHARY GRAY I. Introduction For nearly forty-four years, the United States Supreme Court has adhered to the same, remarkably resilient “test” for its Fourth Amendment jurisprudence.1 In what may be criminal procedure’s most famous concurring opinion, Justice Harlan articulated the Katz two-prong test to determine whether police action constitutes a search. To amount to a search, the Court must find “first, that a person [has] exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as ‘reasonable.’”2 If police actions do amount to a search, “[s]earches conducted outside the judicial process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment—subject only to a few specifically established and well-delineated exceptions.”3 That is to say, if the police conduct a search and do so without a warrant, it will usually be considered a violation of the Fourth Amendment. To remedy a Fourth Amendment violation, the Supreme Court has adopted the “exclusionary rule” that states, “evidence obtained by searches and seizures in violation of the Constitution is . inadmissible in court.”4 With the admission of critical evidence on the line, it should be no surprise that the threshold issue of whether a police action amounts * J.D. Candidate 2013, University of California, Hastings College of the Law; B.A. 2008, University of California, Irvine in Political Science and International Studies. I would like to thank Professor Kate Bloch, Professor Hadar Aviram, and Eugenée Heeter for their invaluable assistance and support for this undertaking.
    [Show full text]