Datenschutz Und Technikgestaltung

Total Page:16

File Type:pdf, Size:1020Kb

Datenschutz Und Technikgestaltung Datenschutz und Technikgestaltung Geschichte und Theorie des Datenschutzes aus informatischer Sicht und Folgerungen für die Technikgestaltung DISSERTATION zur Erlangung des akademischen Grades Dr. rer. nat. im Fach Informatik eingereicht an der Mathematisch-Naturwissenschaftlichen Fakultät der Humboldt-Universität zu Berlin von Diplom-Informatiker Jörg Pohle Präsidentin der Humboldt-Universität zu Berlin Prof. Dr.-Ing. Dr. Sabine Kunst Dekan der Mathematisch-Naturwissenschaftlichen Fakultät Prof. Dr. Elmar Kulke Gutachter: 1. Prof. Dr. rer. nat. Wolfgang Coy, HU Berlin 2. Prof. Dr. rer. nat. Ernst-Günter Giessmann, HU Berlin 3. Prof. Dr. jur. Kai von Lewinski, Universität Passau eingereicht am: 10. August 2016 Tag der mündlichen Prüfung: 08. November 2017 Abstract The aim of this thesis is to uncover the historical construction of the data protection prob- lem, of data protection as its (abstract) solution, as well as the architecture of its legal implementation, in order to critically assess this construction and to draw conclusions for the design of ICT systems. The thesis reveals which concepts of humankind and society, organizations, information technology and information processing, which informatics, infor- mation science, sociological and jurisprudential concepts, schools of thought and theories, and which scientific and pre-scientific assumptions and premises underlie the analysis ofthe data protection problem, and how they have influenced the specific solution of this problem. Based on a critical assessment of this construction the thesis concludes that data protection must be re-derived as a solution for the information power problem, which is generated by the industrialization of social information processing, and presents an abstract, state-of-the- art data protection attacker model, an analytical framework for a data protection impact assessment as well as a procedural operationalization approach illustrating the sequence as well as the substantive issues to be examined and addressed in this process. The thesis then draws conclusions for the design of data protection friendly—and not necessarily just legally compliant—ICT systems. Using the approach of a historical systems analysis, the thesis presents a comprehensive examination of the debates concerning the description, classification, and explanation of the problems relating to privacy, data protection, and surveillance, the solutions proposed, their implementation in law and in practice, as well as the debates around the appropriate design of ICT systems. Even though the participants of this debate are using the same set of terms, the thesis shows that the phenomena, practices, and problems addressed by different theories and schools of thought are fundamentally different and, at times, incompatible. These differences relate to the properties and interests ascribed to the actors involved, the purposes and goals they are deemed to pursue, their relationship with each other, but also by which normative standards the information practices of individuals, groups and organizations are to be measured. Consequently, these theories and schools of thought come to wildly different conclusions about what needs to be understood as a problem, how itistobe described and explained, and how it needs to be solved. The thesis also makes clear that there is a lack of consented or even consistently disclosed attacker and threat models in the data protection related systems engineering debate. Besides, many concepts referred to in the debate are either plain wrong, outdated or inadmissibly simplified. This includes the fixation on personally identifiable information, both in terms of the limitation ofthescope of application as well as as a reference point for lawmaking and ICT design, the patently false but widespread assertion that sensitivity is a property of information, the naïve public– private dichotomy, the concept of informed consent, especially in its current implementation on the books and on the ground, and the so-called »privacy paradox«. Zusammenfassung Ziel der vorliegenden Arbeit ist es, die historische Konstruktion des Datenschutzproblems, des Datenschutzes als seiner (abstrakten) Lösung sowie die Architektur seiner rechtlichen Implementation aufzudecken und einer kritischen Revision aus informatischer Sicht zu un- terziehen, um daraus Folgerungen für die Technikgestaltung zu ziehen. Die Arbeit legt offen, welches Verständnis vom Menschen und von der Gesellschaft, von Organisationen, von der Informationstechnik und von der Informationsverarbeitung, welche informatischen, informa- tionswissenschaftlichen, soziologischen und rechtswissenschaftlichen Konzepte, Denkschulen und Theoriegebäude und welche wissenschaftlichen und vorwissenschaftlichen Annahmen und Prämissen der Analyse des Datenschutzproblems zugrunde liegen und wie sie darüber hinaus die spezifische Lösung des Datenschutzproblems – den Datenschutz – gespeist haben. Auf der Basis einer informatisch fundierten Kritik zieht die Arbeit den Schluss, dass der Datenschutz als Lösung des durch die Industrialisierung der gesellschaftlichen Informations- verarbeitung erzeugten Datenmachtproblems neu abgeleitet werden muss, und legt dafür ein dem Stand der wissenschaftlichen Debatte entsprechendes, abstraktes – und damit jeweils noch anwendungsbereichsspezifisch zu konkretisierendes – Datenschutz-Angreifermodell, ein analytisches Raster für eine darauf aufbauende Bedrohungsanalyse sowie einen prozeduralen Operationalisierungsansatz, der die Vorgehensweise und die jeweils zu analysierenden oder zu prüfenden inhaltlichen Fragen deutlich werden lässt, vor. Abschließend zieht die Arbeit Folgerungen für die Gestaltung datenschutzfreundlicher – und dabei nicht notwendig nur datenschutzrechtskonformer – informationstechnischer Systeme. Die Arbeit legt dazu eine umfassende Untersuchung der politischen und wissenschaftlichen Auseinandersetzungen zur Beschreibung, Einordnung und Begründung der Probleme, die mit den Begriffen privacy, Datenschutz und surveillance markiert werden, der jeweils vorgeschla- genen Lösungen oder Lösungsansätze, der Umsetzungen dieser Lösungen im Recht und ihrer Anwendung in der Praxis sowie der parallel geführten Debatten um eine zur Lösung dieser Probleme geeignete und angemessene Technikgestaltung in Form einer historischen System- analyse vor. Sie legt dabei offen, dass die Unterschiede so groß und teilweise so grundlegend sind, dass die adressierten Phänomene, Praxen und Probleme als voneinander grundsätzlich verschieden verstanden werden müssen, auch wenn sie mit den gleichen Begriffen bezeichnet werden. Diese Unterschiede beziehen sich sowohl auf den betrachteten Gegenstandsbereich, die zugrunde gelegten Akteurskonstellationen, die Eigenschaften und Interessen der Akteu- rinnen und die von ihnen verfolgten Zwecke, aber auch auf die Zielvorstellungen, an denen sich das Informationsgebaren von Individuen, Gruppen und Organisationen messen lassen muss. Die einzelnen Theorien oder Theorieschulen kommen deshalb zu ganz unterschiedlichen Schlussfolgerungen darüber, was als Problem verstanden werden muss, wie es zu beschrei- ben und zu erklären ist und wie es gelöst werden muss. Die Arbeit macht zugleich deutlich, dass es im Bereich der Diskussion um die Technikgestaltung an konsentierten oder auch nur durchgängig offengelegten Angreifer- und Bedrohungsmodellen mangelt. Dabei sind vie- le Konzepte, mit denen in der Debatte operiert wird, aus informatischer Sicht schlicht falsch, überholt oder unzulässig verkürzt. Dazu gehören etwa die Fixierung auf personenbezoge- ne Informationen sowohl hinsichtlich der Beschränkung des Gegenstandsbereichs als auch als Anknüpfungspunkt für Rechtsetzung und Technikgestaltung, die offenkundig falsche und doch weitverbreitete Behauptung, Sensitivität sei eine Eigenschaft von Informationen, die naive Trennung von „öffentlich“ und „privat“, das Konstrukt der informierten Einwilligung, vor allem in seiner derzeitigen Umsetzung, oder das sogenannte „Privacy Paradox“. „Es geht nicht um Privatsphäre, sondern es geht darum, eine Technik sozial beherrschbar zu machen. Und das ist alles!“ in memoriam Wilhelm Steinmüller (1934–2013) Datenschutz ist die Lösung für das „technik-vermittelte gesellschaftliche“ Problem der „Feststellung und Durchsetzung der Bedingungen, unter denen das Informationsgebaren einer Gesellschaft für die Glieder der Gesellschaft akzeptabel sein kann.“ in memoriam Adalbert Podlech (1929–2017) Inhaltsverzeichnis 0 Vorwort und Danksagung1 1 Einleitung 3 2 Die Geschichte des Datenschutzes9 2.1 Vorgeschichte des Datenschutzes . 10 2.1.1 Geheimnisschutz . 10 2.1.2 Beschränkung von Datenmacht . 11 2.2 Frühgeschichte des Datenschutzes . 11 2.2.1 Persönlichkeitsrecht und right to privacy ................... 12 2.2.2 Durchbrüche . 14 2.2.3 Popularisierung . 16 2.3 Computer, Privacy, Datenschutz . 18 2.3.1 Die Anfänge der Debatte in den USA . 18 2.3.2 Die Anfänge der Debatte in der BRD . 31 2.3.3 Die Gutachten zum Datenschutz . 42 2.3.4 Die kurze Phase der Interdisziplinarität . 49 2.4 Zwischen Kontinuitäten und Umbrüchen . 123 2.4.1 Schwächephase nach den ersten Datenschutzgesetzen . 123 2.4.2 Das Volkszählungsurteil und seine Folgen . 144 2.4.3 Die englischsprachige Debatte zwischen Philosophie, Recht und Governance152 2.4.4 Recht als Technikgestalter und die relative Betriebsblindheit der Informatik161 2.5 Ubiquitär, mobil, multi-medial – das Internet und der „neue“ Datenschutz . 175 2.5.1 Die „neuen“ Gefahren . 176 2.5.2 Zum Verhältnis von Technik und Recht,
Recommended publications
  • The European Social Dialogue the History of a Social Innovation (1985-2003) — Jean Lapeyre Foreword by Jacques Delors Afterword by Luca Visentini
    European Trade Union Institute Bd du Roi Albert II, 5 1210 Brussels Belgium +32 (0)2 224 04 70 [email protected] www.etui.org “Compared to other works on the European Social Dialogue, this book stands out because it is an insider’s story, told by someone who was for many years the linchpin, on the trade unions’ side, of this major accomplishment of social Europe.” The European social dialogue — Emilio Gabaglio, ETUC General Secretary (1991-2003) “The author, an ardent supporter of the European Social Dialogue, has put his heart and soul into this The history of a social meticulous work, which is enriched by his commitment as a trade unionist, his capacity for indignation, and his very French spirit. His book will become an essential reference work.” — Wilfried Beirnaert, innovation (1985-2003) Managing Director and Director General at the Federation of Belgian Enterprises (FEB) (1981-1998) — “This exhaustive appraisal, written by a central actor in the process, reminds us that constructing social Europe means constructing Europe itself and aiming for the creation of a European society; Jean Lapeyre something to reflect upon today in the face of extreme tendencies which are threatening the edifice.” — Claude Didry, Sociologist and Director of Research at the National Centre of Scientific Research (CNRS) Foreword by Jacques Delors (Maurice Halbwachs Centre, École Normale Supérieure) Afterword by Luca Visentini This book provides a history of the construction of the European Social Dialogue between 1985 and 2003, based on documents and interviews with trade union figures, employers and dialogue social European The The history of a social innovation (1985-2003) Jean Lapeyre European officials, as well as on the author’s own personal account as a central actor in this story.
    [Show full text]
  • Download This Publication in PDF Format (3.66
    QK-AA-07-001-EN-C ISSN 1680-3809 THE EUROPEAN OMBUDSMAN THE EUROPEAN OMBUDSMAN THE EUROPEAN OMBUDSMAN INVESTIGATES COMPLAINTS AGAINST THE INSTITUTIONS AND BODIES OF THE EUROPEAN UNION THE EUROPEAN OMBUDSMAN THE EUROPEAN OMBUDSMAN AND HIS PERSONNEL annual report 2006 www.ombudsman.europa.eu ISBN 978-92-9212-090-0 ,!7IJ2J2-bcajaa! EN annual report 2006 THE EUROPEAN OMBUDSMAN EUROPEAN THE annual report 2006 © The European Ombudsman 2007 All rights reserved. Reproduction for educational and non-commercial purposes is permi ed provided that the source is acknowledged. All photographs, unless otherwise indicated, are copyright of the European Ombudsman. Front cover: © iStockphoto.com/urbancow The full text of the report is published on the internet at: h p://www.ombudsman.europa.eu Printed in Belgium PRINTED ON WHITE CHLORINE-FREE PAPER T HE EUROPEAN OMBUDSMAN P. N IKIFOROS DIAMANDOUROS Prof. Dr. Hans-Gert PÖTTERING MEP Strasbourg, 12 March 2007 President European Parliament Rue Wiertz 1047 Brussels BELGIQUE Mr President, In accordance with Article 195(1) of the Treaty establishing the European Community and Article 3(8) of the Decision of the European Parliament on the Regulations and General Conditions Governing the Performance of the Ombudsman’s Duties, I hereby present my Report for the year 2006. Yours sincerely, s P. Nikiforos Diamandouros The European Ombudsman 1, avenue du Président Robert Schuman – B.P. 403 – F-67001 STRASBOURG Cedex ☎ : +33 (0)3.88.17.23.13 – Fax : +33 (0)3.88.17.90.62 http://www.ombudsman.europa.eu – [email protected] ANNUAL REPORT 2006 CONTENTS INTRODUCTION 15 1 EXECUTIVE SUMMARY 21 2 COMPLAINTS AND INQUIRIES 35 2.1 THE LEGAL BASIS OF THE OMBUDSMAN’S WORK 35 2.2 THE MANDATE OF THE EUROPEAN OMBUDSMAN 35 2.2.1 Complaints and own-initiative inquiries ........................................................................................................
    [Show full text]
  • The Basic Law at 60 - Equality and Difference: a Proposal for the Guest List to the Birthday Party
    University of Michigan Law School University of Michigan Law School Scholarship Repository Articles Faculty Scholarship 2010 The aB sic Law at 60 - Equality and Difference: A Proposal for the Guest List to the Birthday Party Susanne Baer University of Michigan Law School, [email protected] Available at: https://repository.law.umich.edu/articles/33 Follow this and additional works at: https://repository.law.umich.edu/articles Part of the Civil Rights and Discrimination Commons, Comparative and Foreign Law Commons, Constitutional Law Commons, and the Law and Gender Commons Recommended Citation Baer, Susanne. "The asicB Law at 60 - Equality and Diffeernce: A Proposal for the Guest List to the Birthday Party." German L. J. 11 (2010): 67-87. This Article is brought to you for free and open access by the Faculty Scholarship at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. The Basic Law at 60 - Equality and Difference: A Proposal for the Guest List to the Birthday Party By Susanne Baer A. Introduction This birthday gives rise to many considerations. Some reflect upon achievements - the German constitution, named "Basic Law", has proven to work although many did not believe in it when it was framed. Others emphasize desiderata. Sabine Berghahn commented at the 50th birthday that it has developed "far too slowly and [some] has even gone completely wrong." ' Jutta Limbach, former President of the Federal Constitutional Court, observed that constitutional history was "anything but regal, but very difficult and full of obstacles.
    [Show full text]
  • Labor Markets Occasional Paper.Pmd
    Labor Law, Policy and Mobility: Europe at the Crossroads Jonas Malmberg Jan Ottosson and Lars Magnusson Sandrine Henneron Foreword by Johan Lembke Occasional Paper July 2006 Labor Law, Policy and Mobility: Europe at the Crossroads Jonas Malmberg Jan Ottosson and Lars Magnusson Sandrine Henneron Foreword by Johan Lembke Published by: © European Union Center of Excellence, 2006 Annenberg Presidential Conference Center Texas A&M University College Station, TX 77843-1245 Tel: +1.979.862. 6701 Fax: +1.979.862 .6705 Email: [email protected] Production: Lucero Carranza © All rights reserved. We would like to acknowledge the generous support of the European Commission to this publication. Table of Contents Foreword by Johan Lembke ....................................................................... i Labor Law in The Economic and Social Union of Europe ............................................................................................ 1 Bridging The Gap Between Policy And Markets? Two Methods of Policy Coordination ......................................... 17 Economic Growth in Europe Through Free Movement of Labor? ....................................................................... 34 About the Authors ....................................................................................... 48 i Foreword Johan Lembke An increasingly integrated, competitive and dynamic world economy and external pressures from the current wave of economic globalization – connected to advances in information and communication technology, globally
    [Show full text]
  • Athlete Consent As a Legal Base for Data Transfers to Third Countries for Anti-Doping Purposes, Under EU and German Law
    Int Sports Law J (2017) 17:68–85 https://doi.org/10.1007/s40318-017-0112-9 ARTICLE Athlete consent as a legal base for data transfers to third countries for anti-doping purposes, under EU and German law Jacob Kornbeck1 Published online: 11 August 2017 Ó T.M.C. Asser Instituut 2017 Abstract This article aims to discuss athlete consent as a inter alia, of a valid legal base, including but not limited to legal base for data transfers to third countries for anti- the consent of the data subject (in this case: the athlete doping purposes, under EU and German law, including by concerned) or a specific legal (statutory) provision. As this summarising the legal relevance of international anti-dop- paper will show, the choice of legal base is of particular ing requirements and expectations. It presents the most importance in relation to transfers to third countries for salient features of enforceable EU and national German anti-doping purposes. The challenges involved will be data protection law, so as to arrive at an assessment of the discussed with reference to EU and German law. The relevant merits of the use of athlete consent. comparative analysis aims to identify the relative merits of athlete consent (the traditionally preferred legal base in the Keywords Anti-doping Á Data protection Á International anti-doping community) as opposed to statutory provision. data transfers Á Lawfulness Á European Union Á Germany While this article will maintain a focus on athlete consent, the intention is, in a future article, to perform a similar analysis regarding statutory provision.
    [Show full text]
  • Transatlantic Tensions on Data Privacy
    THE TRANSATLANTIC RELATIONSHIP AND THE FUTURE GLOBAL GOVERNANCE ISSN 2281-5252 WORKING PAPER 19 | APRIL 2013 The paper analyses simila- It also argues that while Eu- rities and differences ropean policy preferen- between US and ces in the field have European regu- been more glo- latory policy bally influential in the field of than US pre- data priva- Transatlantic ferences, the cy. It shows latter have that US re- also shaped gulation in Tensions the outco- the field mes of the is not uni- former, re- formly we- on Data Privacy sulting in a aker than transatlantic European co-produc- regulation. tion of norms. Lee A. Bygrave Transworld is supported by the SEVENTH FRAMEWORK PROGRAMME Transatlantic Tensions on Data Privacy Lee A. Bygrave* United States European Union Data privacy Regulatory policy Introduction This paper focuses on US and European regulatory policies in the field of data privacy. These policies concern, at bottom, information processing and the infrastructure for such processing. Protection of human rights plays a key role in the field. Rules on data privacy specifically govern the processing of data relating to persons (i.e., personal data) in order to protect, at least partly, the privacy and related interests of those persons. In Europe, such norms tend to be described as “data protection”. Outside Europe, including the USA, they are often described in terms of protecting “privacy” or “information privacy” (Bygrave 2010:166). As elaborated further below, significant elements of these norms are formally grounded in human rights, particularly the right to privacy. Thus, human rights and accompanying doctrine provide a central normative basis for data privacy law, while much of the latter can be seen as both an expression and specialised branch of the former.
    [Show full text]
  • Complying with the Europeaqn Union Directive on Personal Privacy Through the Power of Control Michael W
    Brooklyn Journal of International Law Volume 25 | Issue 2 Article 27 3-1-1999 A Brave New World: Complying with the Europeaqn Union Directive on Personal Privacy Through the Power of Control Michael W. Heydrich Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjil Recommended Citation Michael W. Heydrich, A Brave New World: Complying with the Europeaqn Union Directive on Personal Privacy Through the Power of Control, 25 Brook. J. Int'l L. (1999). Available at: https://brooklynworks.brooklaw.edu/bjil/vol25/iss2/27 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of International Law by an authorized editor of BrooklynWorks. NOTES A BRAVE NEW WORLD: COMPLYING WITH THE EUROPEAN UNION DIRECTIVE ON PERSONAL PRIVACY THROUGH THE POWER OF CONTRACT I. INTRODUCTION The old adage "knowledge is power"' has been professed throughout the ages. However, never before in history has the ability to accumulate, manipulate and disseminate information existed on the scale it does today.2 In recent years, informa- tion of the most personal nature3 can be accessed through scientific breakthroughs such as DNA testing4 and distributed globally via the Internet. The tremendous impact on society of 1. Attributed to Frances Bacon, Med. Sacrae: de Haeresibus. See M. FRANCES MCNAMARA, 2000 CLASSIC LEGAL QUOTATIONS 330 (1992). 2. Based on a 1994 estimate, computers in the United States alone hold five billion records, trading information on every individual at an average of five times per day. The credit industry accounts for 400 million files which are updated by more than two billion entries every month in order to make possible 1.5 million credit decisions daily.
    [Show full text]
  • Deconstitutionalising Collective Labour Rights
    De-constitutionalising collective labour rights: the case of Greece Article (Accepted Version) Katsaroumpas, Ioannis (2018) De-constitutionalising collective labour rights: the case of Greece. Industrial Law Journal, 47 (4). pp. 465-503. ISSN 0305-9332 This version is available from Sussex Research Online: http://sro.sussex.ac.uk/id/eprint/69787/ This document is made available in accordance with publisher policies and may differ from the published version or from the version of record. If you wish to cite this item you are advised to consult the publisher’s version. Please see the URL above for details on accessing the published version. Copyright and reuse: Sussex Research Online is a digital repository of the research output of the University. Copyright and all moral rights to the version of the paper presented here belong to the individual author(s) and/or other copyright owners. To the extent reasonable and practicable, the material made available in SRO has been checked for eligibility before being made available. Copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational, or not-for-profit purposes without prior permission or charge, provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. http://sro.sussex.ac.uk De-Constitutionalising Collective Labour Rights: The Case of Greece Since 2010, multiple waves of EU/IMF-imposed legislative reforms have led to extensive deregulation or ‘de-construction’ of Greek collective labour law.
    [Show full text]
  • Setting Standards for Fair Information Practice in the U.S. Private Sector Joel R
    Fordham Law School FLASH: The Fordham Law Archive of Scholarship and History Faculty Scholarship 1994 Setting Standards for Fair Information Practice in the U.S. Private Sector Joel R. Reidenberg Fordham University School of Law, [email protected] Follow this and additional works at: http://ir.lawnet.fordham.edu/faculty_scholarship Part of the Internet Law Commons Recommended Citation Joel R. Reidenberg, Setting Standards for Fair Information Practice in the U.S. Private Sector, 80 Iowa L. Rev. 497 (1994-1995) Available at: http://ir.lawnet.fordham.edu/faculty_scholarship/39 This Article is brought to you for free and open access by FLASH: The orF dham Law Archive of Scholarship and History. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of FLASH: The orF dham Law Archive of Scholarship and History. For more information, please contact [email protected]. Setting Standards for Fair Information Practice in the U.S. Private Sector Joel R. Reidenberg* INTRODUCTION The Information Superhighway in the United States and the emerging Global Information Infrastructure place standards for the treatment of personal information at the forefront of policy discussions among businesses, governments, and citizens.1 Because the control of information means power, standards for the treatment of personal information have significant societal implications. Legal rules, industry norms, and business practices collectively form these standards. Financially, the standards for the control of flows of personal information have a large economic impact Businesses rely on personal information for activities ranging from back- office personnel management to product sales. Standards allocate both economic benefits and burdens.
    [Show full text]
  • The Amended EU Law on Eprivacy and Electronic Communications After Its 2011 Implentation; New Rules on Data Protection, Spam, Da
    The John Marshall Journal of Information Technology & Privacy Law Volume 29 Issue 1 Journal of Computer & Information Law Article 2 - Fall 2011 Fall 2011 The Amended EU Law on ePrivacy and Electronic Communications after its 2011 Implentation; New Rules on Data Protection, Spam, Data Breaches and Protection of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011) Vagelis Papakonstantinou Paul de Hert Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Computer Law Commons, Intellectual Property Law Commons, Internet Law Commons, Marketing Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Vagelis Papakonstantinou & Paul de Hert, The Amended EU Law on ePrivacy and Electronic Communications after its 2011 Implentation; New Rules on Data Protection, Spam, Data Breaches and Protection of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011) https://repository.law.uic.edu/jitpl/vol29/iss1/2 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. \\jciprod01\productn\S\SFT\29-1\SFT102.txt unknown Seq: 1 3-JUL-12 9:11 THE AMENDED EU LAW ON ePRIVACY AND ELECTRONIC COMMUNICATIONS AFTER ITS 2011 IMPLEMENTATION; NEW RULES ON DATA PROTECTION, SPAM, DATA BREACHES AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS. VAGELIS PAPAKONSTANTINOU* PAUL DE HERT** Telecommunications are privileged in being the only sector in Euro- pean Union (“EU”) law benefiting from sector-specific data protection legislation.
    [Show full text]
  • Global List of National Bioethics Committees with Contact Details
    Global list of National Bioethics Committees with contact details This list will shortly be available in a searchable format on the Ethics website at http://www.who.int/ethics/en/ For further information or if you wish to add/modify information in this document, please contact Dr Marie Charlotte Bouësseau at [email protected] Department of Ethics, Trade, Human Rights and Health Law (ETH) World Health Organization Geneva National bioethics Committees Draft August 2004 2 National bioethics Committees Draft August 2004 Country Name of Institution Contacts Conseil National de l'Éthique Prof. Said Slimane - Taleb (Président ) des Sciences de la Santé Ministère de la santé, de la population et de la réforme hospitalière, 125 Boulevard Abderrahmane LAALA, EL-MADANIA, Alger, ALGERIE Algeria Tel: +(213) (2) 127 9831 (secrétariat du Ministre),+ (213) (2) 127 9964 (secrétariat du Conseil)/Fax: +(213) (2) 127 9641 http://www.sante.dz National Health and Medical Dr Kerry Breen (Chairperson) Research Council, Australian Ms Cathy Clutton (General Secretary) Health Ethics Committee, Health Ethics Section, G.P.O. Box 9848, Canberra, ACT 2601, AUSTRALIA Australia NHMRC - AHEC Tel: +(61)(2) 6289 9807/Fax: +(61)(2) 6289 9898 [email protected] http://www.health.gov.au/nhmrc The Bioethics Commission Prof. Johannes Huber (Chairman) Dr. Robert Gmeiner (Head of the Secretariat ) Bioethikkommission beim Bundeskanzleramt - Geschäftsstelle 1010 Wien, Hohenstaufengasse 3, Austria AUSTRIA Tel: +(43)1 53115-4319 /Fax: +(43)1 53115-4307 [email protected] http://www.bka.gv.at/bioethik/ Comité consultatif de Prof. Léon Cassiers (President) Bioéthique de Belgique 4, Rue de l'Autonomie- 1er étage.
    [Show full text]
  • Curriculum Vitae THOMAS CARL KOHLER Boston College Law
    Curriculum Vitae THOMAS CARL KOHLER Boston College Law School [email protected] 885 Centre Street (+01) 617-552-4321 Newton Centre, MA 02459 (U.S.A.) Current Appointment and Bar Memberships: • Concurrent Professor of Law and Philosophy, Boston College Law School • Member of the Michigan, District of Columbia and Federal Bars Teaching and Research Areas: • Domestic and comparative labor, employment and employment discrimination law (with an emphasis on European Union and German law) • Foundations of Western legal thought • Comparative political, legal, and social theory; intellectual history; solidarity and civil society; Catholic social thought; personhood; German social market institutions; law, religion and social institutions • Legal method; torts Professorships, Fellowships, and Research Appointments: • 2016 AUDI Gast-Professur, Katholische Universität Eichstätt-Ingolstadt (Eichstätt, Germany); Standing Gast-Professur, 2017—2019 (terminated by pandemic). • Visiting Professor of Law, University of Texas School of Law (Spring 2005). • J. William Fulbright Visiting Professor and Lecturer in Comparative Labor Law, Faculty of Law, Johann Wolfgang Goethe Universität (Frankfurt am Main, Germany) (1995- 1996). • Consultant, Industrial Relations Module, Department of Sociology, University of Warsaw (Central European Curriculum Development Project, American Council of Learned Societies, 1996). • German Marshall Fund of the United States, Research Fellow (1995-1996). • Lynde and Harry Bradley Foundation, Research Fellow (1990-1991). • Visiting Associate Professor, Graduate School of Business, Columbia University (1988- 1989). • Faculty, Harvard University Trade Union Program (Harvard Law and Work Life Program, Harvard Law School, 1992— ). • Co-operating International Faculty, Interdisciplinary Graduate School, “Ethics, Economics and Philosophy,” joint International degree-granting program sponsored by the University of Freiburg (Germany) and the Catholic University of Eichstätt (2018— proposed Graduate College, in funding application process).
    [Show full text]