Publicaties
Gekozen filters:
Gekozen filters:
Data protection by design: promises and, perils in crossing the Rubicon between law and engineering Vrije Universiteit Brussel
This article reports some main findings from a study of recent efforts towards building privacy and other fundamental rights and freedoms into smart ICT systems. It mainly focuses on the concept of ‘Data Protection by Design and by Default’ (DPbD), recently introduced by EU legislation, and as implemented through the new field of privacy engineering. We describe the new constellations of actors that gather around this legislative and ...
Legal protection by design: objections and refutations Vrije Universiteit Brussel
To cope with an increasingly proactive technological infrastructure a so-called 'vision of Ambient Law' has been proposed. It entails that lawyers and legislators should learn to articulate legal protection into the digital environment. It implies that rights to privacy, due process and non-discrimination warrant effective remedies beyond the written law. The lawmakers' Pavlov response of introducing yet another set of administrative rules will ...
Monitoring report on emerging ethical challenges and current societal debates : deliverable D2.2 of the LASIE (LArge Scale Information Exploitation of Forensic Data) project Universiteit Gent
The purpose of this deliverable is to report to the LASIE consortium on any changes on the technological, regulatory and societal levels that might be of importance in the LASIE prototype and its further development. The work reported in this deliverable was done under WP2, as part of the task T2.2 (Privacy Monitoring). The structure contains four main sections, the first two reporting on the technological landscape and change, and the two next ...
Regulating profiling in a democratic constitutional state Vrije Universiteit Brussel
In this contribution De Hert and Gutwirth rethink notions such as privacy and data protection against
the background of the principles of the democratic constitutional state. They focus upon the necessity
to differentiate between privacy and data protection in relation to the distinction they make between
opacity tools and transparency tools. Proceeding by the prohibition of certain kinds of conduct, opacity
tools tend to ...
the background of the principles of the democratic constitutional state. They focus upon the necessity
to differentiate between privacy and data protection in relation to the distinction they make between
opacity tools and transparency tools. Proceeding by the prohibition of certain kinds of conduct, opacity
tools tend to ...
Trustworthy Migrant-Centric Apps and Other ICT Tools: Data Protection as the Last Line of Defence Vrije Universiteit Brussel
The potential of deploying smartphone applications (apps) and other information communication technologies (ICTs) in the sphere of migration has gained significant attention in the last decade. Take, for example, tailored apps and their fundamental role in fostering migrants’ socio-economic integration in society. However, their deployment requires the processing of migrants’ personal data which holds specific human rights and data protection ...
Noninterference through secure multi-execution KU Leuven Vrije Universiteit Brussel
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this property (or closely related properties) can be achieved through information flow analysis, using either a static analysis (with a type system or otherwise), or using a dynamic monitoring system. We propose an alternative approach, based on a technique we call secure ...
The Belgian e-ID case. Identity of persons and documents. The role of governments in providing eSignatures Vrije Universiteit Brussel
By the end of 2009 all Belgian citizens above the age of 12 will have received an eID with 2 certificates, one for authentication and one for eSignature. Belgium is the only country adopting an opt-out strategy related to both certificates, meaning that these certificates are activated as a default. The Belgian e-ID as such would not have existed without prior initiatives such as the Crossroads Bank for Social Security, the resulting Social ...
An Overview of Runtime Data Protection Enforcement Approaches KU Leuven
A regulatory framework such as the GDPR succeeds in (i) providing clarity about the nature and the reach of fundamental rights to data privacy and the sovereign role of the data subject, (ii) raising broader awareness of the substantial impact of large-scale, contemporary software-intensive data processing operations on these rights and freedoms, and (iii) creating urgency and imposing gravity, by forcing organizations to take these rights and ...
The vulnerable data subject: A gendered data subject? Vrije Universiteit Brussel
Vulnerability is an emerging topic in many different fields, but data protection and privacy discussions of vulnerability have rarely engaged with gender studies. This paper investigates the notion of the ‘vulnerable data subject’ from a gender perspective, to question whether gender should be regarded as factor of vulnerability at all, and, if yes, how. It also asks what do these reflections tell us about the (gendered or un-gendered) notion of ...