Vulnerability and Data Protection Law

Vulnerability and Data Protection Law
Author: Gianclaudio Malgieri
Publisher: Oxford University Press
Total Pages: 305
Release: 2023-04-01
Genre: Law
ISBN: 019269751X

Vulnerability has traditionally been viewed through the lens of specific groups of people, such as ethnic minorities, children, the elderly, or people with disabilities. With the rise of digital media, our perceptions of vulnerable groups and individuals have been reshaped as new vulnerabilities and different vulnerable sub-groups of users, consumers, citizens, and data subjects emerge. Vulnerability and Data Protection Law not only depicts these problems but offers the reader a detailed investigation of the concept of data subjects and a reconceptualization of the notion of vulnerability within the General Data Protection Regulation. The regulation offers a forward-facing set of tools that-though largely underexplored-are essential in rebalancing power asymmetries and mitigating induced vulnerabilities in the age of artificial intelligence. Considering the new risks and potentialities of the digital market, the new awareness about cognitive weaknesses, and the new philosophical sensitivity about the condition of human vulnerability, the author looks for a more general and layered definition of the data subject's vulnerability that goes beyond traditional labels. In doing so, he seeks to promote a 'vulnerability-aware' interpretation of the GDPR. A heuristic analysis that re-interprets the whole GDPR, this work is essential for both scholars of data protection law and for policymakers looking to strengthen regulations and protect the data of vulnerable individuals.

The Risk-Based Approach to Data Protection

The Risk-Based Approach to Data Protection
Author: Raphaël Gellert
Publisher: Oxford University Press, USA
Total Pages: 305
Release: 2020-10-06
Genre: Law
ISBN: 0198837712

The concept of a risk-based approach to data protection came to the fore during the overhaul process of the EU's General Data Protection Regulation (GDPR). At its core, it consists of endowing the regulated organizations that process personal data with increased responsibility for complying with data protection mandates. Such increased compliance duties are performed through risk management tools. This book provides a comprehensive analysis of this legal and policy development, which considers a legal, historical, and theoretical perspective. By framing the risk-based approach as a sui generis implementation of a specific regulation model known as meta regulation, this book provides a recollection of the policy developments that led to the adoption of the risk-based approach in light of regulation theory and debates. It also discusses a number of salient issues pertaining to the risk-based approach, such as its rationale, scope, and meaning; the role for regulators; and its potential and limits. The book also looks at they way it has been undertaken in major statutes with a focus on key provisions, such as data protection impact assessments or accountability. Finally, the book devotes considerable attention to the notion of risk. It explains key terms such as risk assessment and management. It discusses in-depth the role of harms in data protection, the meaning of a data protection risk, and the difference between risks and harms. It also critically analyses prevalent data protection risk management methodologies and explains the most important caveats for managing data protection risks.

Vulnerability, Childhood and the Law

Vulnerability, Childhood and the Law
Author: Jonathan Herring
Publisher: Springer
Total Pages: 74
Release: 2018-04-05
Genre: Law
ISBN: 3319786865

This book will challenge the orthodox view that children cannot have the same rights as adults because they are particularly vulnerable. It will argue that we should treat adults and children in the same way as the child liberationists claim. However, the basis of that claim is not that children are more competent than we traditionally given them credit for, but rather that adults are far less competent than we give them credit for. It is commonly assumed that children are more vulnerable. That is why we need to have a special legal regime for children. Children cannot have all the same rights as adults and need especial protect from harms. While in the 1970s “child liberationists” mounted a sustained challenge to this image, arguing that childhood was a form of slavery and that the assumption that children lacked capacity was unsustainable. This movement has significantly fallen out of favour, particularly given increasing awareness of child abuse and the multiple ways that children can be harmed at the hands of adults. This book will explore the concept of vulnerability, the way it used to undermine the interests of children and our assumptions that adults are not vulnerable in the same way that children are. It will argue that a law based around mutual vulnerability can provide an approach which avoids the need to distinguish adults and children.

Vulnerability

Vulnerability
Author: Martha Albertson Fineman
Publisher: Routledge
Total Pages: 246
Release: 2016-02-11
Genre: Law
ISBN: 1317000900

Martha Albertson Fineman’s earlier work developed a theory of inevitable and derivative dependencies as a way of problematizing the core assumptions underlying the ’autonomous’ subject of liberal law and politics in the context of US equality discourse. Her ’vulnerability thesis’ represents the evolution of that earlier work and situates human vulnerability as a critical heuristic for exploring alternative legal and political foundations. This book draws together major British and American scholars who present different perspectives on the concept of vulnerability and Fineman's ’vulnerability thesis’. The contributors include scholars who have thought about vulnerability in different ways and contexts prior to encountering Fineman’s work, as well as those for whom Fineman’s work provided an introduction to thinking through a vulnerability lens. This collection demonstrates the broad and intellectually exciting potential of vulnerability as a theoretical foundation for legal and political engagements with a range of urgent contemporary challenges. Exploring ways in which vulnerability might provide a new ethical foundation for law and politics, the book will be of interest to the general reader, as well as academics and students in fields such as jurisprudence, philosophy, legal theory, political theory, feminist theory, and ethics.

EU Data Privacy Law and Serious Crime

EU Data Privacy Law and Serious Crime
Author: Nora Ni Loideain
Publisher: Oxford University Press, USA
Total Pages: 280
Release: 2020-07-14
Genre: Law
ISBN: 9780198837169

This book provides the first comprehensive doctrinal and comparative study to examine the influence of the fundamental human right to respect for private life on data retention within EU law, specifically communications data and passenger name record data, for the purpose of countering serious crime. First, it is the only academic publication that offers a complete picture of the EU's institutions, not just the Court of Justice of the EU, at work in a legally and politically sensitive field from a variety of perspectives, thereby contributing to a scholarly understanding of topics which tend to attract generalized opinions not based on detailed analysis of law and practice in specific areas. Secondly, this original analysis of EU data retention law casts a spotlight on the real and actual extent of the weight now being given in the mainstreaming of fundamental rights within the EU policymaking process, providing a more complete picture of the role and impact of human rights on this area of law and policymaking. Thirdly, this book is the only work to outline and examine in detail the impact of the tensions and dialogue between the EU and European Convention on Human Rights (ECHR) legal systems within the case law of both courts on data privacy and serious crime. In addition, this book also sets out the implications of the above analysis, and recent landmark jurisprudence on Article 8 ECHR and Articles 7 and 8 of the EU Charter of Fundamental Rights, for new related EU legislation, including Directive 2016/680 on data processing for the purposes of the prevention, investigation, detection or prosecution of criminal offences and relevant provisions of the forthcoming E-Privacy Regulation.

Fundamentals of Clinical Data Science

Fundamentals of Clinical Data Science
Author: Pieter Kubben
Publisher: Springer
Total Pages: 219
Release: 2018-12-21
Genre: Medical
ISBN: 3319997130

This open access book comprehensively covers the fundamentals of clinical data science, focusing on data collection, modelling and clinical applications. Topics covered in the first section on data collection include: data sources, data at scale (big data), data stewardship (FAIR data) and related privacy concerns. Aspects of predictive modelling using techniques such as classification, regression or clustering, and prediction model validation will be covered in the second section. The third section covers aspects of (mobile) clinical decision support systems, operational excellence and value-based healthcare. Fundamentals of Clinical Data Science is an essential resource for healthcare professionals and IT consultants intending to develop and refine their skills in personalized medicine, using solutions based on large datasets from electronic health records or telemonitoring programmes. The book’s promise is “no math, no code”and will explain the topics in a style that is optimized for a healthcare audience.

Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
Total Pages: 59
Release: 2010-09
Genre: Computers
ISBN: 1437934889

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

The Right to Erasure in EU Data Protection Law

The Right to Erasure in EU Data Protection Law
Author: Jef Ausloos
Publisher:
Total Pages:
Release: 2020
Genre: Data protection
ISBN: 9780192587220

The right to erasure (or ""right to be forgotten"") has become a major flashpoint in the courts and public opinion of the potential and limits of data protection law to empower individuals to control their data. This is the first book to focus on the right to erasure in the context of Article 17 of the GDPR, its theory, history, and legal scope.