Complete Dissertation

Complete Dissertation

VU Research Portal Privacy Limitation Clauses: Trojan Horses under the Disguise of Democracy van den Hoven van Genderen, R. 2016 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) van den Hoven van Genderen, R. (2016). Privacy Limitation Clauses: Trojan Horses under the Disguise of Democracy: On the Reduction of Privacy by National Authorities in Cases of National Security and Justice Matters. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 27. Sep. 2021 Privacy Limitation Clauses: Trojan Horses under the Disguise of Democracy On the Reduction of Privacy by National Authorities in Cases of National Security and Justice Matters Vrije Universiteit Privacy Limitation Clauses: Trojan Horses under the Disguise of Democracy On the Reduction of Privacy by National Authorities in Cases of National Security and Justice Matters ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. V. Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Rechtsgeleerdheid op vrijdag 10 juni 2016 om 9.45 uur in de aula van de universiteit, De Boelelaan 1105 1081 HV Amsterdam door Robert van den Hoven van Genderen geboren te ‘s-Gravenhage 2 promotoren: prof.mr.dr. A.R. Lodder prof.mr.dr. A. Oskamp 3 Leescommissie Prof. dr. W.G. Werner (Wouter), chair Prof. dr. P. De Hert (Paul), Vrije Universiteit Brussel & UvT Prof. dr. I. Lloyd (Ian), University of Southhampton, UK Prof. dr. G.P. Mifsud Bonnici, Rijksuniversiteit Groningen Prof. dr. T.C. Wingfield (Thomas), National defense university, Washington DC, USA 4 Acknowledgements This book is the result of an extracurricular PhD research I started 7 years ago. It could not have been possible to finish this book without the help of my colleagues at Transnational Legal Studies Department, specifically my colleague and promotor Arno Lodder with his always critical remarks and advice to skip large parts of the text that was considered by him as superfluous. Further special thanks go out to Jilian Dobson of TLS who was a great help in finding the right English grammatical construction of this book and killing incomprehensible long sentences. Further, of course, I extend my thanks to my former colleague and promotor Anja Oskamp who could find the time to comment on my text in the time spaces during her busy task as former dean of this faculty and in her present function of rector of the Open University. Due to the dynamics of the subject I had to adapt the text several times when new regulations were enacted and international courts as the European Court on Human Rights and the European Court of Justice issued their rulings on the relevant aspects of my thesis. Also the publication of the ‘Snowden papers’ and the reactions of governments on terrorist attacks by sharpening their rules on security required changes of the text more than once. Still I had to finish my research on a certain point in time although it always was tempting to elaborate on those recent developments. I found a great stimulus in the research for the European project on Terrorism Financing (HEMOLIA) during fouryears I functioned as Legal Executive Officer for this project. This accounted certainly for the explaining I had to do to certain partners of the project that there are privacy rules to follow, even if there should exist a terroristic threat. Not everything is allowed to reach a certain goal. Thanks to the discussions with the international partners of the project I had even more insight in the ways of thinking by security organisations who are working in the field of anti- terrorism. Special thanks and love go out to my partner and critical reader of my texts, Merel, who has read texts over and over during our long rides to Italy and of course for her belief in me to finish this dissertation. Also, the many distractions of the activities of my children, Daan, Geert and Charlotte did not hinder, but stimulated the perseverance to finish this book and I really appreciate the fact that Charlotte is performing her task as paranymph next to my friend Harry. Also special thanks to my son Geert who designed the cover of this book. 5 ’During times of universal deceit, telling the truth becomes a revolutionary act.’ George Orwell 6 TABLE OF CONTENTS PRIVACY LIMITATION CLAUSES: TROJAN HORSES UNDER THE DISGUISE OF DEMOCRACY .................................................................................................................. 1 ON THE REDUCTION OF PRIVACY BY NATIONAL AUTHORITIES IN CASES OF NATIONAL SECURITY AND JUSTICE MATTERS .......................................................................................... 1 VRIJE UNIVERSITEIT ......................................................................................................... 2 PRIVACY LIMITATION CLAUSES: TROJAN HORSES UNDER THE DISGUISE OF DEMOCRACY .................................................................................................................. 2 ON THE REDUCTION OF PRIVACY BY NATIONAL AUTHORITIES IN CASES OF NATIONAL SECURITY AND JUSTICE MATTERS ............................................................................................................. 2 1 INTRODUCTION .......................................................................................................... 11 1.1 TYPES OF PRIVACY AND DIFFERENT ROLES ............................................................... 12 1.1.1 Limitation of Privacy as a Sovereign Right of Society ...................................... 14 1.1.2 Privacy as a Fundamental Right in the Information Society and the Use of Personal Information by Governmental Authorities ........................................................ 18 1.1.3 Balancing Conflicting Interests and the Abundance of Information ................. 21 1.2 INFORMATIONAL SOVEREIGNTY IN A CHANGING WORLD .......................................... 21 1.2.1 Crime and Terrorism as a Reason for Interference ........................................... 22 1.2.2 Governmental Authorities are Monitoring Public and Private Information ..... 24 1.3 METHOD AND STRUCTURE ......................................................................................... 25 1.3.1 Research Questions ............................................................................................ 25 1.3.2 Structure and Research Method ......................................................................... 27 1.3.3 Structure and Contents of the Chapters ............................................................. 27 2 THE FUNDAMENTAL RIGHT OF PRIVACY, HISTORICAL PERSPECTIVE 29 2.1 BIRTH RIGHT TO PRIVACY .......................................................................................... 29 2.2 THE BACKGROUND OF PRIVACY ................................................................................ 30 2.3 PHILOSOPHICAL BACKGROUND .................................................................................. 32 2.4 MODERN PRIVACY ..................................................................................................... 34 2.5 LEGAL QUALIFICATION OF PRIVACY .......................................................................... 36 2.5.1 Limits to Privacy in Public Space ...................................................................... 40 2.6 THE LIMITATION OF PRIVACY IN MODERN SOCIETY, INCLUDING ELECTRONIC MEANS, HISTORICAL LEADING CASES IN US AND GERMANY ............................................................. 42 2.7 RIGHT OF INTRUSION AS A NEGATIVE ASPECT OF PRIVACY ....................................... 44 2.8 PRIVACY AND DATA PROTECTION IN THE EUROPEAN UNION ..................................... 46 2.8.1 Privacy in the TEU and the TFEU ..................................................................... 46 2.8.2 Charter of Fundamental Rights of the European Union (2000/C 364/01) ........ 47 2.8.3 Data Protection in the European Union: Constraints and Opportunities ......... 49 2.8.4 Proposal for a New Legal Framework for the Protection of Privacy and the Free Movement of Personal Data (General Data Protection Regulation, GDPR) .......... 51 2.8.5 Directive on the Protection of Personal Data by the Processing of Such Data by Criminal Justice Authorities (Justice Data Directive, JDD) ............................................ 54 2.8.6 Differentiation of Data Subjects in the Proposed Directive .............................. 55 2.9 CONCLUDING REMARKS ON THE DEVELOPMENT OF PRIVACY .................................... 56 3 LIMITING HUMAN RIGHTS: FROM EXCEPTIONAL CIRCUMSTANCES TO GENERAL CONDITIONS ..................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    276 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us