Data protection in a profiled world:
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Dordrecht; Heidelberg; London; New York
Springer
[2010]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxiii, 334 Seiten Illustrationen |
ISBN: | 9789048188642 9789400792395 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036729975 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | t | ||
008 | 101020s2010 a||| |||| 10||| eng d | ||
015 | |a GBB047269 |2 dnb | ||
020 | |a 9789048188642 |c hbk. |9 978-90-481-8864-2 | ||
020 | |a 9789400792395 |c pbk. |9 978-94-007-9239-5 | ||
035 | |a (OCoLC)699493587 | ||
035 | |a (DE-599)BVBBV036729975 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-188 |a DE-739 |a DE-M382 |a DE-B170 | ||
084 | |a PZ 4100 |0 (DE-625)141176: |2 rvk | ||
084 | |a 340 |2 sdnb | ||
245 | 1 | 0 | |a Data protection in a profiled world |c Serge Gutwirth; Yves Poullet; Paul De Hart (Editors) |
264 | 1 | |a Dordrecht; Heidelberg; London; New York |b Springer |c [2010] | |
264 | 4 | |c © 2010 | |
300 | |a xxiii, 334 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Data protection / Law and legislation / Congresses | |
650 | 4 | |a Privacy, Right of / Congresses | |
650 | 4 | |a Recht | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenaustausch |0 (DE-588)4227289-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Personenbezogene Daten |0 (DE-588)4173908-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datennetz |0 (DE-588)4011130-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Brüssel |2 gnd-content | |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | 1 | |a Personenbezogene Daten |0 (DE-588)4173908-5 |D s |
689 | 1 | 2 | |a Datennetz |0 (DE-588)4011130-1 |D s |
689 | 1 | 3 | |a Datenaustausch |0 (DE-588)4227289-0 |D s |
689 | 1 | |5 DE-188 | |
700 | 1 | |a Gutwirth, Serge |d 1960- |0 (DE-588)173585973 |4 edt | |
700 | 1 | |a Poullet, Yves |4 edt | |
700 | 1 | |a Hert, Paul de |d 1965- |0 (DE-588)1012001601 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-90-481-8865-9 |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020647677&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020647677 |
Datensatz im Suchindex
_version_ | 1804143382689218560 |
---|---|
adam_text | IMAGE 1
ABOUT THE E-PRIVACY DIRECTIVE: TOWARDS A THIRD GENERATION
OF DATA PROTECTION LEGISLATION? YVES POULLET 1.1 IS PERSONAL DATA THE
ADEQUATE CONCEPT? 1.1.1 NEW KINDS OF SENSITIVE DATA IN OUR MODEM
NETWORKS: IDENTIFIERS AND CONTACT DATA II
1.1.2 IP ADDRESS, COOKIES, DATA GENERATED BY RFID, ALWAYS PERSONAL
DATA ? WHY REGULATE THEM ANYWAY? 1.1.3 NEW DATA TO BE PROTECTED: THE
PROFILES 1.2 NEW OBJECTS AND NEW ACTORS TO BE REGULATED?
1.2.1 EU COMMISSION S SUPPORT TO PETS 1.2.2 TOWARDS A LIABILITY OF
TERMINAL EQUIPMENTS PRODUCERS AND INFORMATION SYSTEM DESIGNERS: THE RFID
CASE 1.2.3 TERMINAL EQUIPMENT AS A VIRTUAL HOME? 1.2.4 CONCLUSIONS OF
SECT. 1.2 1.3 FINAL CONCLUSIONS
CONTENTS
PART I GENERIC ISSUES .
2 SOME CAVEATS ON PROFILING SERGE GUTWIRTH AND MIREILLE HILDEBRANDT 2.1
INTRODUCTION 31
2.2 WHAT IS IT WITH PROFILING? 2.3 FROM MEASUREMENT TO DETECTION 32
2.4 A RISKY DEPENDENCE 33
2.5 PRIVACY, FAIRNESS (NON-DISCRIMINATION) AND DUE PROCESS 2.6 CAUSALITY
AND (CRIMINAL) LIABILITY 35
2.7 WHO OWNS MY DATA; WHO AUTHORS THE PROFILES I MATCH WITH? 2.8
TRANSPARENCY AND ANTICIPATION 36
2.9 PRIVACY AND DATA PROTECTION 2.10 FROM DATA MINIMISATION TO MINIMAL
KNOWLEDGE ASYMMETRIES?
IMAGE 2
VIII CONTENTS
2.11 AMLAW: FROM PRIVACY ENHANCING TECHNOLOGIES TO
TRANSPARENCY ENHANCING TOOLS? 2.12 CALL FOR ATTENTION REFERENCES
3 LEVELLING UP: DATA PRIVACY AND THE EUROPEAN COURT OF HUMAN RIGHTS 43
GORDON NORDELL QC
3.1 THE BACKGROUND 3.2 LEGALITY, NECESSITY, SECRECY 3.3 LEGALITY: THE
LIBERTY CASE 3.4 NECESSITY AND PROPORTIONALITY: THE S. AND MARPER CASE
3.5 WHERE DOES IT LEAVE US?
4 RESPONDING TO THE INEVITABLE OUTCOMES OF PROFILING: RECENT LESSONS
FROM CONSUMER FINANCIAL MARKETS, AND BEYOND TAL ZARSKY
4.1 PREFACE 4.2 RETHINKING THE REGULATION OF PROFILING: IN A NUTSHELL
4.2.1 A BRIEF INTRODUCTION TO THE FLOW OF PERSONAL INFORMATION 4.2.2 THE
LIMITS AND TROUBLES OF REGULATING DATA COLLECTION
4.2.3 THE LIMITS AND TROUBLES OF REGULATING DATA ANALYSIS 4.2.4
REGULATING PROFILING BY ADDRESSING USES:
POSSIBILITIES, FACTORS AND LIMITS 4.3 A TALE OF FOUR DATA MINERS 4.4
SOME CONCLUSIONS AND SUMMING UP REFERENCES 73
PART II SPECIFIC ISSUES: SECURITY BREACHES, UNSOLICITED ADJUSTMENTS,
FACEBOOK, SURVEILLANCE AND ELECTRONIC VOTING
5 THE EMERGING EUROPEAN UNION SECURITY BREACH LEGAL FRAMEWORK: THE
2002/58 EPRIVACY DIRECTIVE AND BEYOND ROSA BARCELO AND PETER TRAUNG 5.1
INTRODUCTION
5.1.1 THE EU SECURITY BREACH LEGAL FRAMEWORK:
THE BACKGROUND 78
5.1.2 THE REVIEW OF THE EPRIVACY DIRECTIVE 5.1.3 AN OVERVIEW OF THE
SECURITY BREACH FRAMEWORK UNDER THE REVISED EPRIVACY DIRECTIVE 5.2
PURPOSES AND EXISTING DATA PROTECTION PRINCIPLES UNDERPINNING THE NEW EU
SECURITY BREACH FRAMEWORK 5.2.1 PREVENTING AND MINIMISING ADVERSE
EFFECTS FOR INDIVIDUALS 5.2.2 THE SECURITY PRINCIPLE 5.2.3 THE DATA
MINIMISATION PRINCIPLE 5.2.4 THE INFORMATION PRINCIPLE
IMAGE 3
CONTENTS
5.2.5 THE ACCOUNTABILITY PRINCIPLE
5.3 ELEMENTS OF THE EU SECURITY BREACH NOTIFICATION FRAMEWORK 5.4 SCOPE
OF THE EU SECURITY BREACH NOTIFICATION FRAMEWORK 5.4.1 ENTITIES OBLIGED
TO NOTIFY: COVERED ENTITIES 5.4.2 THE APPLICATION TO INFORMATION SOCIETY
SERVICES AND BEYOND 87
5.4.3 DEFINITION OF PERSONAL DATA BREACH 5.5 THE THRESHOLD TRIGGERING
THE OBLIGATION TO NOTIFY 5.5.1 DESCRIPTION OF THE THRESHOLD 5.5.2
LIKELY TO ADVERSELY AFFECT THE PERSONAL DATA AND PRIVACY
5.5.3 EXCEPTIONS RELATING TO TECHNOLOGICAL PROTECTION MEASURES AND LAW
ENFORCEMENT 93
5.6 MEANS OF PROVIDING NOTICE, TIMING AND CONTENT 5.6.1 MEANS OF
PROVIDING NOTICE 5.6.2 TIMING OF THE NOTIFICATION 5.6.3 CONTENT OF THE
NOTIFICATION 5.7 ENFORCEMENT OF THE PROVISIONS
5.7.1 AUDIT AND OTHER TOOLS AVAILABLE TO THE AUTHORITIES 5.7.2 SELECTIVE
TO BE EFFECTIVE 5.7.3 DAMAGES 5.8 THE NEXT STEPS 5.8.1 TECHNICAL
IMPLEMENTING MEASURES THROUGH COMITOLOGY 5.8.2 AREAS/SUBJECTS COVERED BY
COMITOLOGY 5.8.3 TOWARDS THE APPLICATION OF A SECURITY BREACH
NOTIFICATION SCHEME ACROSS SECTORS 5.9 CONCLUSIONS
6 FROM UNSOLICITED COMMUNICATIONS TO UNSOLICITED ADJUSTMENTS GLORIA
GONZALEZ FUSTER, SERGE GUTWIRTH AND PAUL DE HERT 6.1 PROTECTING THE
INDIVIDUAL IN FRONT OF TECHNOLOGY 6.2 THE REGULATION OF UNSOLICITED
COMMUNICATIONS 6.3 THE SHIFT TOWARDS UNSOLICITED ADJUSTMENTS
6.3.1 UPCOMING PRACTICES 6.3.2 PRESENT PROBLEMATIC PRACTICES 6.3.3 THE
(OTHER) LIMITS OF CURRENT LEGISLATION 6.4 CONCLUDING REMARKS REFERENCES
7 FACEBOCK AND RISKS OF DE-CONTEXTUALIZATION OF INFORMATION
FRANCK DUMORTIER 7.1 INTRODUCTION 7.2 THE RISKS OF DE-CONTEXTUAL IZATION
DERIVING FROM INTERACTIONS ON FACEBOOK
7.2.1 THE SIMPLIFICATION OF SOCIAL RELATIONS ON OSNS 7.2.2 THE LARGE
INFORMATION DISSEMINATION IMPLIED BY INTERACTIONS ON FACEBOOK 123
IMAGE 4
X
CONTENTS
7.2.3 THE GLOBALIZATION AND NORMALIZATION EFFECTS OF FACEBOOK ... 126
7.3 CONSEQUENCES OF THE THREAT OF DE-CONTEXTUALIZATION ON THE RIGHTS TO
PRIVACY AND TO DATA PROTECTION 7.3.1 CONSEQUENCES OF THE THREAT OF
DE-CONTEXTUALIZATION ON PRIVACY AS A RIGHT OF THE HUMAN BEING 7.3.2
CONSEQUENCES OF THE THREAT OF DE-CONTEXTUALIZATION
ON DATA PROTECTION AS A RIGHT OF DATA SUBJECTS 7.4 CONCLUSION 135
8 SURVEILLANCE IN GERMANY: STRATEGIES AND COUNTERSTRATEGIES GERRIT
HORNUNG, RALF BENDRATH AND ANDREAS PFITZMANN 8.1 INTRODUCTION 8.2 THE
ONLINE SEARCHING JUDGEMENT OF FEBRUARY 27TH, 2008
8.2.1 BACKGROUND OF THE CASE 8.2.2 OTHER FUNDAMENTAL RIGHTS 8.2.3
CONTENT OF THE NEW FUNDAMENTAL RIGHT 8.2.4 INTERFERENCES 8.2.5 FURTHER
DEVELOPMENTS 143
8.3 THE GERMAN FEDERAL CONSTITUTIONAL COURT: CLOSER TO ICT AND
TECHNOLOGY ASSESSMENT THAN GERMAN POLITICIANS 8.3.1 ACTORS AND THEIR
KNOWLEDGE 8.3.2 STRATEGIES WORKING AGAINST PRIVACY AND APPROPRIATE
COUNTERSTRATEGIES WORKING TOWARDS PRIVACY 8.3.3 SUMMING UP: GOVERNMENT
VS. COURT 8.4 THE RISE OF THE ANTI-SURVEILLANCE MOVEMENT 2.0 8.4.1 DATA
RETENTION AND THE PARTICIPATORY RESISTANCE
AGAINST SURVEILLANCE 8.4.2 FROM THE INTERNET TO THE STREETS AND INTO POP
CULTURE 8.4.3 PUTTING PRIVACY ON THE POLITICAL AGENDA 8.4.4 LESSONS
LEARNED REFERENCES
9 VERIFIABILITY OF ELECTRONIC VOTING: BETWEEN CONFIDENCE AND TRUST
WOLTER PIETERS 9.1 INTRODUCTION 9.2 TRUST
9.2.1 GOOD AND BAD TRUST 9.2.2 CONFIDENCE AND TRUST 159
9.2.3 TRUST IN E-VOTING 9.3 VERIFIABILITY 163
9.3.1 VOTER-VERIFIABLE ELECTIONS 9.3.2 VERIFIABILITY AND
RECEIPT-FREENESS 9.3.3 VARIANTS OF VERIFIABILITY 9.4 VERIFIABILITY AND
TRUST 9.4.1 THE POLITICS OF VOTING TECHNOLOGY 9.4.2 WHAT PROOF DO WE
PREFER?
IMAGE 5
CONTENTS
9.4.3 BEYOND ELECTRONIC VOTING
9.5 CONCLUSIONS 173
REFERENCES 174
10 ELECTRONIC VOTING IN GERMANY MELANIE VOLKAMER 10.1 INTRODUCTION 10.2
APPROACHES APPLIED IN GERMANY
10.2.1 MECHANICAL VOTING MACHINES 10.2.2 DIRECT RECORDING ELECTRONIC
(DRE) VOTING COMPUTERS 10.2.3 PAPER-BASED ELECTRONIC VOTING SYSTEMS
10.2A INTERNET VOTING SYSTEMS 10.3 REQUIREMENT DOCUMENTS
10.3.1 GERMAN FEDERAL ORDINANCE FOR VOTING MACHINES 10.3.2 PROTECTION
PROFILE FOR THE DIGITAL VOTING PEN 10.3.3 ONLINE-VOTING SYSTEM
REQUIREMENTS FOR NONPARLIAMENTARY ELECTIONS 185
10.3 A CATALOGUE OF THE GERMAN SOCIETY OF COMPUTER SCIENTISTS 10.3.5
GJ/BSI/DFKI PROTECTION PROFILE ACTIVISTS ACTIVITIES 10.5 THE FEDERAL
CONSTITUTIONAL COURT JUDGMENT 10.6 FUTURE OF ELECTRONIC VOTING IN
GERMANY REFERENCES 188
PART III THIRD PILLAR ISSUES
II THE NEW COUNCIL DECISION STRENGTHENING THE ROLE OF EUROJUST: DOES IT
ALSO STRENGTHEN DATA PROTECTION AT EUROJUST? DIANA ALONSO BLAS 11.1
INTRODUCTION
11.2 AMENDMENTS WITH DATA PROTECTION RELEVANCE 11.2.1 PRESERVATION OF
THE SPECIFICITY OF THE EUROJUST DATA PROTECTION REGIME 11.2.2 CLEAR
DEFINITION OF NATIONAL COMPETENCES 11.2.3 EXTENSION OF THE CATEGORIES OF
PERSONAL DATA
WHICH EUROJUST MAY LEGALLY PROCESS 11.2A IMPROVEMENT OF THE INFORMATION
PROVISION FROM MEMBER STATES 11.2.5 CMS-RELATED ISSUES AND SECURE
COMMUNICATION
WITH MEMBER STATES 11.2.6 TIME LIMITS 11.2.7 RELATIONS WITH THIRD
PARTIES 11.2.8 EU CLASSIFIED INFORMATION 11.3 AMENDMENTS WITH RELEVANCE
TO THE JOINT SUPERVISORY
BODY OF EUROJUST (JSB) IIA CONCLUDING REMARKS
IMAGE 6
CONTENTS
12 THE CASE OF THE 2008 GERMAN-US AGREEMENT ON DATA
EXCHANGE: AN OPPORTUNITY TO RESHAPE POWER RELATIONS? ROCCO BELLANOVA
12.1 INTRODUCTION 12.2 TOWARDS A PRUEM MODEL ?
12.3 CONTEXT: TRANSITIONAL PERIODS? 12.4 CONTENTS AND CORE PROVISIONS.
WHICH CORE? WHICH PROVISIONS? 12.5 MEMBERSHIPS AND ACTORS 12.6
DIVERGENCES AMONG PROVISIONS OF PRUEM INSTRUMENTS 12.7 RESISTANCE TO THE
PRUEM MODEL ?
12.8 FINAL CONSIDERATIONS 222
REFERENCES 223
13 DNA DATA EXCHANGE: GERMANY FLEXED ITS MUSCLE SYLVIA KIERKEGAARD 13.1
INTRODUCTION 13.2 BACKGROUND
13.3 SUBSTANTIVE LAW 13.4 GERMAN HEGEMONY & DEMOCRATIC DEFICIT 13.5
INNOCENT LAMBS FOR SLAUGHTER
13.6 DATA PROTECTION 13.7 CONCLUSION REFERENCES
PART IV TECHNOLOGY ASSESSMENT VIEWS
14 INFORMATION PRIVACY IN EUROPE FROM A TA PERSPECTIVE WALTER PEISSL
14.1 INTRODUCTION 14.2 ABOUT EPTA
14.3 ICT AND PRIVACY IN EUROPE: THE FIRST COMMON EPTA PROJECT 14.3.1
METHODOLOGY OF THE PROJECT 14.3.2 OUTCOME 14.3.3 SOME FINDINGS .
14.3.4 THE CHALLENGES: AND HOW TO DEAL WITH THEM
249
251 252 253 254 REFERENCES
15 PRIVACY AND SECURITY: A BRIEF SYNOPSIS OF THE RESULTS OF THE EUROPEAN
TA-PROJECT PRISE JOHANN CAS 15.1 INTRODUCTION 257
15.2 BACKGROUND AND OBJECTIVES OF PRISE 15.3 PROJECT METHODS
IMAGE 7
15.4 RESULTS OF THE INTERVIEW MEETINGS
15.5 CRITERIA FOR PRIVACY ENHANCING SECURITY TECHNOLOGIES 15.6 NEXT
STEPS AND CONTINUATIVE RECOMMENDATIONS REFERENCES 262
CONTENTS XIII
PART V LEGAL PRACTITIONER S VIEWS
16 THE ROLE OF PRIVATE LAWYERS IN THE DATA PROTECTION WORLD CHRISTOPHER
KUNER 16.1 THE ROLES OF DATA PROTECTION LAWYERS 16.1.1 LEGAL PRACTICE
16.1.2 SPEAKING, WRITING, AND OTHER PRO BONO ACTIVITIES 16.2 THE
CHALLENGES OF PRACTICING DATA PROTECTION LAW 16.3 OUTLOOK FOR DATA
PROTECTION LAW PRACTICE 16.4 CONCLUSIONS
17 TRANSFER AND MONITORING: TWO KEY WORDS IN THE CURRENT DATA PROTECTION
PRIVATE PRACTICE: A LEGAL PRACTITIONER S VIEW TANGUY VAN OVERSTRAETEN,
SYLVIE ROUSSEAU AND GUILLAUME COUNESON 17.1 INTRODUCTION
17.2 INTERNATIONAL DATA FLOWS: THE ISSUE OF TRANSFER 17.2.1 UNAMBIGUOUS
CONSENT: A SUBSIDIARY SOLUTION? 17.2.2 STANDARD CONTRACTUAL CLAUSES: A
SOLUTION TO BE FURTHER HARMONISED 274
17.2.3 BINDING CORPORATE RULES: THE WAY FORWARD 17.2.4 NO ONE SIZE
FITS-ALL SOLUTION TO THE DATA TRANSFER 17.3 BIG BROTHER IS WATCHING YOU:
THE ISSUE OF MONITORING 17.3.1 MONITORING BY PRIVATE COMPANIES
17.3.2 MONITORING BY PUBLIC AUTHORITIES 17.3.3 MONITORING BY INDIVIDUALS
17.4 CONCLUSION
PART VI TECHNOLOGIST S VIEWS
18 ARCHITECTURE IS POLITICS: SECURITY AND PRIVACY ISSUES IN TRANSPORT
AND BEYOND 289
BART JACOBS 18.1 ARCHITECTURAL ISSUES 18.2 WHAT WENT WRONG: SMART CARDS
IN PUBLIC TRANSPORT 18.3 WHAT CAN STILL GO RIGHT: ROAD PRICING 18.4
PRIVACY AND TRUST FOR BUSINESS REFERENCES 298
IMAGE 8
CONTENTS
19 PETS IN THE SURVEILLANCE SOCIETY: A CRITICAL REVIEW OF THE
POTENTIALS AND LIMITATIONS OF THE PRIVACY AS CONFIDENTIALITY PARADIGM
SEDA GUERSES AND BETTINA BERENDT 19.1 INTRODUCTION
19.2 PRIVACY AS DATA CONFIDENTIALITY AND ANONYMITY 19.2.1 PERSONAL DATA
AS THE FOCUS OF PETS 19.2.2 ANONYMITY AS A PRIVACY ENHANCING MECHANISM
19.2.3 ANONYMITY AND CONFIDENTIALITY IN THE INTERNET:
ASSUMPTIONS OF PETS
19.3 SURVEILLANCE SOCIETY AND ITS EFFECTS ON PETS 19.3.1 THE DAILY
PERSPECTIVE ON SURVEILLANCE 19.3.2 THE MARKETING PERSPECTIVE ON
SURVEILLANCE 19.3.3 THE POLITICAL PERSPECTIVE ON SURVEILLANCE
19.3.4 THE PERFORMATIVE PERSPECTIVE ON SURVEILLANCE 19.4 THE INFORMATION
PERSPECTIVE ON SURVEILIANCE 19.5 REVISITING THE ASSUMPTIONS 19.6
CONCLUSION REFERENCES 3 19
20 PRIVACY BY DESIGN: A MATTER OF CHOICE DANIEL LE METAYER 20.1
INTRODUCTION 20.2 WHAT DO WE MEAN BY PRIVACY BY DESIGN?
20.3 A MATTER OF CHOICE 20.4 FROM A VICIOUS CYCLE TO A VIRTUOUS CYCLE
20.4.1 LAWYERS AND LEGISLATORS 20.4.2 COMPUTER SCIENTISTS
20.4.3 A VIRTUOUS CYCLE REFERENCES 332
|
any_adam_object | 1 |
author2 | Gutwirth, Serge 1960- Poullet, Yves Hert, Paul de 1965- |
author2_role | edt edt edt |
author2_variant | s g sg y p yp p d h pd pdh |
author_GND | (DE-588)173585973 (DE-588)1012001601 |
author_facet | Gutwirth, Serge 1960- Poullet, Yves Hert, Paul de 1965- |
building | Verbundindex |
bvnumber | BV036729975 |
classification_rvk | PZ 4100 |
ctrlnum | (OCoLC)699493587 (DE-599)BVBBV036729975 |
discipline | Rechtswissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02334nam a2200565 c 4500</leader><controlfield tag="001">BV036729975</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101020s2010 a||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB047269</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789048188642</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-90-481-8864-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789400792395</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-94-007-9239-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699493587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036729975</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-B170</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4100</subfield><subfield code="0">(DE-625)141176:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">340</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data protection in a profiled world</subfield><subfield code="c">Serge Gutwirth; Yves Poullet; Paul De Hart (Editors)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dordrecht; Heidelberg; London; New York</subfield><subfield code="b">Springer</subfield><subfield code="c">[2010]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 334 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Law and legislation / Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of / Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenaustausch</subfield><subfield code="0">(DE-588)4227289-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Personenbezogene Daten</subfield><subfield code="0">(DE-588)4173908-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datennetz</subfield><subfield code="0">(DE-588)4011130-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Brüssel</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Personenbezogene Daten</subfield><subfield code="0">(DE-588)4173908-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datennetz</subfield><subfield code="0">(DE-588)4011130-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datenaustausch</subfield><subfield code="0">(DE-588)4227289-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gutwirth, Serge</subfield><subfield code="d">1960-</subfield><subfield code="0">(DE-588)173585973</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Poullet, Yves</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hert, Paul de</subfield><subfield code="d">1965-</subfield><subfield code="0">(DE-588)1012001601</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-90-481-8865-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020647677&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020647677</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Brüssel gnd-content |
genre_facet | Konferenzschrift 2009 Brüssel |
id | DE-604.BV036729975 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:46:47Z |
institution | BVB |
isbn | 9789048188642 9789400792395 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020647677 |
oclc_num | 699493587 |
open_access_boolean | |
owner | DE-12 DE-188 DE-739 DE-M382 DE-B170 |
owner_facet | DE-12 DE-188 DE-739 DE-M382 DE-B170 |
physical | xxiii, 334 Seiten Illustrationen |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
spelling | Data protection in a profiled world Serge Gutwirth; Yves Poullet; Paul De Hart (Editors) Dordrecht; Heidelberg; London; New York Springer [2010] © 2010 xxiii, 334 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Data protection / Law and legislation / Congresses Privacy, Right of / Congresses Recht Privatsphäre (DE-588)4123980-5 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datenaustausch (DE-588)4227289-0 gnd rswk-swf Personenbezogene Daten (DE-588)4173908-5 gnd rswk-swf Datennetz (DE-588)4011130-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Brüssel gnd-content Datenschutz (DE-588)4011134-9 s Privatsphäre (DE-588)4123980-5 s DE-604 Personenbezogene Daten (DE-588)4173908-5 s Datennetz (DE-588)4011130-1 s Datenaustausch (DE-588)4227289-0 s DE-188 Gutwirth, Serge 1960- (DE-588)173585973 edt Poullet, Yves edt Hert, Paul de 1965- (DE-588)1012001601 edt Erscheint auch als Online-Ausgabe 978-90-481-8865-9 SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020647677&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Data protection in a profiled world Data protection / Law and legislation / Congresses Privacy, Right of / Congresses Recht Privatsphäre (DE-588)4123980-5 gnd Datenschutz (DE-588)4011134-9 gnd Datenaustausch (DE-588)4227289-0 gnd Personenbezogene Daten (DE-588)4173908-5 gnd Datennetz (DE-588)4011130-1 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4011134-9 (DE-588)4227289-0 (DE-588)4173908-5 (DE-588)4011130-1 (DE-588)1071861417 |
title | Data protection in a profiled world |
title_auth | Data protection in a profiled world |
title_exact_search | Data protection in a profiled world |
title_full | Data protection in a profiled world Serge Gutwirth; Yves Poullet; Paul De Hart (Editors) |
title_fullStr | Data protection in a profiled world Serge Gutwirth; Yves Poullet; Paul De Hart (Editors) |
title_full_unstemmed | Data protection in a profiled world Serge Gutwirth; Yves Poullet; Paul De Hart (Editors) |
title_short | Data protection in a profiled world |
title_sort | data protection in a profiled world |
topic | Data protection / Law and legislation / Congresses Privacy, Right of / Congresses Recht Privatsphäre (DE-588)4123980-5 gnd Datenschutz (DE-588)4011134-9 gnd Datenaustausch (DE-588)4227289-0 gnd Personenbezogene Daten (DE-588)4173908-5 gnd Datennetz (DE-588)4011130-1 gnd |
topic_facet | Data protection / Law and legislation / Congresses Privacy, Right of / Congresses Recht Privatsphäre Datenschutz Datenaustausch Personenbezogene Daten Datennetz Konferenzschrift 2009 Brüssel |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020647677&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT gutwirthserge dataprotectioninaprofiledworld AT poulletyves dataprotectioninaprofiledworld AT hertpaulde dataprotectioninaprofiledworld |