Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 341 trang
THÔNG TIN TÀI LIỆU
Cấu trúc
Preface
Contents
Contributors
Acronyms
List of Figures
1 Disruptive Technologies Shaping the Law of the Future
Abstract
1 Introduction
2 Parts
2.1 Purpose and Limitation
2.2 Innovation Intermediaries
2.3 Digital Evidence
3 Chapters
References
Purpose and Limitation
2 The Principle of Purpose Limitation and Big Data
Abstract
1 Introduction
2 Big Data Definition
3 The Development of the Principle of Purpose Limitation
3.1 European Convention on Human Rights (ECHR)
3.2 Council of Europe Resolutions (73) 22 and (74) 29
3.3 Convention 108
3.4 OECD Guidelines
4 The Purpose Limitation Principle Under the Data Protection Directive (DPD) and Its Implications for Big Data Applications
4.1 Starting Position
4.2 Specified, Explicit and Legitimate Purpose (Purpose Specification)
4.2.1 Purpose Must Be Specified
4.2.2 Purpose Must Be Explicit
4.2.3 Purpose Must Be Legitimate
4.3 Assessment of Compatibility
4.4 Consequences of the Requirements of the Purpose Limitation Principle Established by the DPD for Big Data Applications
5 New Developments Regarding the Purpose Limitation Principle Under the General Data Protection Regulation and Its Impact on Big Data Applications
5.1 The General Data Protection Regulation—“A Hybrid of Old and New”
5.2 Continuation of the Requirement of Purpose Specification and Compatible Use
5.3 New Aspects with Regard to Purpose Specification
5.4 Inclusion of the Compatibility Assessment Test into the Legal Text of the GDPR
5.5 The New Privileging Rule for Further Processing for Archiving Purposes in the Public Interest, Scientific or Historical Research Purposes or Statistical Purposes
5.6 The Waiver of the Requirement of a Legal Basis for the Processing of Personal Data that Qualifies as a Compatible Use
6 Consequences of the Enactment of the GDPR for Big Data Applications and Conclusion
Acknowledgements
References
3 Scientific Research and Academic e-Learning in Light of the EU’s Legal Framework for Data Protection
Abstract
1 Introduction
1.1 Topic
1.2 Focal Points
1.3 Chapter Structure
2 EU General Data Protection Regulation
2.1 Presentation
2.2 The Swedish Regulatory Approach
2.3 Conceptual Basis
3 Core Questions of Interpretation and Application
3.1 Points of Departure
3.2 Prioritised Scientific Research
3.3 Burdened Academic Education
3.4 Complicated Ethical Framework
4 Concluding Remarks
References
4 Internet of Things: Right to Data from a European Perspective
Abstract
1 Introduction
2 The Internet of Things (IoT)
2.1 IoT Statistics
2.2 IoT and Big Data
2.3 IoT Scenarios
2.4 Stakeholders and Data in the IoT Ecosystem
2.5 IoT Development in the EU
3 Right to Data: A Business Perspective
3.1 Data as a Property
3.2 Copyright and Database Protection
3.2.1 Copyright in IoT Data
3.2.2 Copyright in IoT Data Analysis
3.3 Contract Law
3.4 Bankruptcy Law
3.5 Trade Secrets
3.6 Business Rights to Data in Practice
4 Right to Data: The Individual Perspective
4.1 Privacy as a Property
4.2 Data Erasure
4.3 Data Portability
4.4 Data Protection as a Right to Data
5 Protection of Data
5.1 Challenges of IoT
5.2 Security Breaches and Data Loss in IoT
5.3 Security Requirements in an IoT Context
5.4 Protecting IoT Data in Practice
6 Current Status and Future Development
6.1 Right to Own Data Versus Right to Another’s Data
6.2 Right to Data Versus Protection of Data
6.3 Right to Data Versus Open Access
References
5 Right to be Forgotten: A New Privacy Right in the Era of Internet
Abstract
1 Introduction
2 The Right to Be Forgotten: An Extended Privacy Right in an Online World
2.1 Development of the Right to Be Forgotten
2.2 Rationale
2.3 Reactions to the Right to Be Forgotten
3 Controversial Issues on the Right to Be Forgotten
3.1 To Be Forgotten Equals to Be Delisted?
3.2 Antagonistic Interests
3.3 Privacy Knots
4 Next Phases and Challenges
4.1 Resetting Privacy Criteria
4.2 Divergence on Balancing Values
5 Current Situation Regarding the Right to Be Forgotten in Japan
5.1 A Protero-Right to Be Forgotten
5.2 Decisions of District Courts
5.3 Japanese Reaction
Acknowledgements
References
Innovation Intermediaries
6 Intermediaries and Mutual Trust: The Role of Social Capital in Facilitating Innovation and Creativity
Abstract
1 Introduction
2 Changing Landscape of Innovation Ecosystems
2.1 IP Rights, “Free” Competition and Innovation
2.2 Missing Bits and Pieces of Philosophical Justifications of IP Rights
3 The Notion of Mutual Trust
3.1 Shifting Focus to Social Capital and Mutual Trust
3.2 Multi-Layered Notion of Mutual Trust
3.3 Trust, Expectations and Risk
3.4 Autonomy, Delegation, and the Dynamic Aspect of Trust
4 Innovation Intermediaries and Mutual Trust
4.1 Network Structure and the Bridging Role of Intermediaries
4.2 Intermediaries, Growth and the Value of Social Capital
5 Designing a Trust-Based Innovation Ecosystem
5.1 Main Players in the Innovation Ecosystem
5.2 Choice Architecture, Social Capital and the Law
6 Conclusion
References
7 Nudging Cloud Providers: Improving Cloud Architectures Through Intermediary Services
Abstract
1 Introduction
2 Cloud Computing and Big Data Sprawling the IT Market
3 The Suica Scandal and a New Legal Landscape for Big Data in Japan: Who “Owns” the Data?
4 A Behavioral Law and Economics Approach
4.1 Nudge Theory and Cloud Brokerage Architectures
4.2 Behavioral Market Failures, Different Types of Nudges and Soft Paternalism
5 Turning Nudges into Simpler and More Effective SLAs
6 Default Rules and Information Disclosure as Prime Nudges
7 A Sui Generis Contractual Framework
8 Automated Framework: The “Dead Man’s Switch”
9 XML-Based Description Schema
10 Conclusion
Acknowledgements
References
8 A Brokering Framework for Assessing Legal Risks in Big Data and the Cloud
Abstract
1 Introduction
2 Risk Assessment: Literature Review, Motivation and Justification
3 Risk Assessment Methodology
3.1 High Level Analysis of the System
3.2 Identifying the Assets Involved
3.3 Identifying the Threats in Each Cloud Deployment Scenario
4 Embracing Legal Risks and Enhancing Legal Interoperability
5 Conventional Databases Versus Big Data: Striking the Right Balance
5.1 Territorial Scope of Protection
5.2 “Ownership” Rights of New Data Generated by Big Data
5.3 Lack of International Legal and Contractual Standards
6 Risk Assessment Techniques and Typical Actors Involved in Brokering WS-Agreements
7 Risk Inventory Design
8 Different Stages of Risk Assessment in Cloud Brokerage Scenarios (CBS)
9 Use Case Scenario: Examples
9.1 Use Case Scenario: Genetic Research Projects Within Clinical Trials
10 Conclusion
Acknowledgements
References
9 Internet Intermediaries and Copyright Enforcement in the EU: In Search of a Balanced Approach
Abstract
1 Introduction
2 Dramatis Personae: The Ratione Personae Scope of Injunctions Against Internet Intermediaries in EU Copyright Law
2.1 General Overview
2.2 Internet Intermediaries According to the E-Commerce Directive
2.3 The Practical Significance of the Personal Scope of Application
3 The Procedural Scope of Injunctions Against Internet Intermediaries
3.1 General Overview of the Limits on the Procedural Scope of Injunctions Against Intermediaries
3.2 The Procedural Scope of Injunctions Against Intermediaries in the Case Law of the CJEU
3.2.1 Episode 1: Turn Intermediaries into “Police”
3.2.2 Episode 2: Turn Intermediaries into Judge, Juries and Executioners
3.2.3 Episode 3: Turn Passive Mere Conduits into Active Copyright Enforcers
4 Conclusion
Acknowledgements
References
Digital Evidence
10 The Collection of Electronic Evidence in Germany: A Spotlight on Recent Legal Developments and Court Rulings
Abstract
1 Introduction
1.1 Scope and Aim
1.2 The EVIDENCE Project
2 The German Legal System: The Fundamental Distinction Between Preventive and Investigative Measures
2.1 General Observations on the German Situation
2.2 Preventive Measures
2.3 Investigative Measures
2.4 Resulting Legal Principles and Structures
2.5 Considerations on Preventive Measures as a Scale for Investigative Measures
2.6 German Police Forces, their Tasks and Corresponding Legal Framework
3 Important Technical Developments and their Effects
3.1 Innovative Monitoring Technologies
3.2 Resulting New Quality of Impact on Fundamental Human Rights
4 Corresponding Judicature: Decisions of the Federal Constitutional Court and the Federal Supreme Court
4.1 The Federal Supreme Court’s Decision on Computer-Assisted Search for Investigative Purposes
4.2 The Federal Constitutional Court’s Decision on Computer-Assisted Search for Preventive Purposes
4.2.1 Secret Monitoring and Other Reconnaissance of the Internet
4.2.2 Secret Access to IT Systems
4.2.3 The New Fundamental Human Right to Integrity and Confidentiality of IT Systems
4.2.4 Comments on and Reactions to the Judgment
4.2.5 The Corresponding Changes to the Law on the Federal Criminal Police Office (BKAG)
4.3 The Federal Constitutional Court’s Decision on the Law on the Federal Criminal Police Office (Preventive Measures)
4.3.1 Constitutional Requirements for Carrying Out Surveillance Measures
4.3.2 The Constitutionality of § 20k BKAG (Covert Access to IT Systems)
4.3.3 Other Important Aspects of the Judgment with Regard to Electronic Evidence
4.3.4 The Lack of Unanimity of the Decision and Reactions
5 Conclusion
5.1 Considerations on Investigative Measures to Be Drawn from These Developments
5.2 Outlook
Acknowledgements
References
11 LegalAIze: Tackling the Normative Challenges of Artificial Intelligence and Robotics Through the Secondary Rules of Law
Abstract
1 Introduction
2 The Goals of the Law
3 Primary Legal Rules for Accident Control
4 Secondary Legal Rules for Accident Control
5 Conclusion
References
12 In the Shadow of Banking: Oversight of Fintechs and Their Service Companies
Abstract
1 Introduction
2 Third-Party Service Providers’ Risks
3 Blockchain Technology
4 Regulatory Oversight of Third-Party Service Providers
4.1 Federal Regulation
4.1.1 Bank Service Companies Act
4.1.2 Examination Parity and Year 2000 Readiness for Financial Institutions Act
4.1.3 Application to Anti-Money Laundering Regulation
4.2 State Regulation
4.3 Coordinating Examinations Between States and the Federal Government
5 Extension of Authority Over MSB Service Providers
5.1 Risk and Virtual Currency Businesses
5.2 Mitigating the Risk of MSB Service Providers
5.3 Regulatory Authority Should Not Be Extended to MSB Service Providers