Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021
The ongoing demand for new and faster technologies continues to leave consumers and business users to face the constant challenge of updating systems and software. This unrelenting pace of technological evolution has not always been matched with a commensurate focus on security and privacy matters. In particular, the obligatory move to embrace cloud and IoT that frequently result in the collection and analysis of large data lakes has raised challenges for sovereign data protection and privacy legislationwhere data at rest can change overnightwith © IFIP International Federation for Information Processing 2021 Published by Springer Nature Switzerland AG 2021 M. Goedicke et al. (Eds.): Advancing Research in Information and Communication Technology, IFIP AICT 600, pp. 383–401, 2021. https://doi.org/10.1007/978-3-030-81701-5_16 384 S. Furnell et al. mergers and acquisitions of service providers. This chapter examines the role of IFIP Technical Committee 11 (and its 14 underlyingWorkingG...
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, 2015
This paper is the report on the 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) at the 37th International Conference on Software Engineering (ICSE 2015). TELERISE investigates privacy and security issues in data sharing from a technical and legal perspective. Keynote speech as well as selected papers presented at the event fit the topics of the workshop. This report gives the rationale of TELERISE and it provides a provisional program.
2021
The recent survey of the United Nations Conference on Trade and Development indicates that 128 out of 194 countries have put data privacy legislations in place. By implication, around 66% of countries in the world have enacted legislations on data protection signifying the importance that states attach to the regulation of information flow in the digital age. The General Data Protection Regulation (GDPR) implemented in May 2018 by the European Union (EU) has marked a new era for data protection across the globe. Although the GDPR serves to harmonize data protection regulations within the EU member states, many countries outside the EU have taken the GDPR as an inspiration. The emergence of the GDPR as a model has decreased differences between data protection frameworks globally, however, the differences have not disappeared entirely. In this context, we seek to explore whether the “Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data – No...
Digital Privacy and Security Conference 2018 organization and Scientific Committees welcome you to the first conference. The main goal of a scientific event is to discuss, disseminate and create knowledge. Organizing this conference proved to be a challenging opportunity for us to achieve this goal. Regardless of its small size, it demanded our commitment and hard work but also delivered the proudness of seen the successful concretization of our plans. We take this knowledge for our future and believe that every person enrolled with this conference has improved its knowledge. We are currently living in an information society constantly updated where we believe that hope and more knowledge come from wiser people. In this sense, young students that devote themselves to research deserve our praise for their efforts in the search of new knowledge and better intellectual and technical skills. Persistence and strong motivation constitute the driving force which stimulates students of Supplementary Networking Course, Informatics Engineering degree, from the Lusofona University of Porto (ULP), to the creation of scientific papers related to this field of study, to the promotion of research, and to the knowledgeable discussion and practical demonstration on a variety of issues addressed, particularly in the context of computer science and computer networks. This has proven to be an exciting challenge. This challenge, which takes the shape of a book, is the natural result of these principles put into practice. We would like to thank all those authors whose participation in this endeavor contributed to its success, hoping it will promote a better understanding of the issues that were addressed.
Big Data and security policies: Towards a framework for regulating the phases of analytics and use of Big Data, 2017
Big Data analytics in national security, law enforcement and the fight against fraud have the potential to reap great benefits for states, citizens and society but requires extra safeguards to protect citizens' fundamental rights. This involves a crucial shift in emphasis from regulating Big Data collection to regulating the phases of analysis and use. In order to benefit from the use of Big Data analytics in the field of security, a framework has to be developed that adds new layers of protection for fundamental rights and safeguards against erroneous and malicious use. Additional regulation is needed at the levels of analysis and use, and the oversight regime is in need of strengthening. At the level of analysis-the algorithmic heart of Big Data processes-a duty of care should be introduced that is part of an internal audit and external review procedure. Big Data projects should also be subject to a sunset clause. At the level of use, profiles and (semi-)automated decision-making should be regulated more tightly. Moreover, the responsibility of the data processing party for accuracy of analysis-and decisions taken on its basis-should be anchored in legislation. The general and security-specific oversight functions should be strengthened in terms of technological expertise, access and resources. The possibilities for judicial review should be expanded to stimulate the development of case law.
Data protection concerns have been identified as one of the most serious barriers for the deployment and development of cloud computing. 1 There is a general lack of regulation and policy on a European (EU) level. The Data Protection Directive (DPD) is currently under revision and will be replaced with a regulation in the near future.
ECOEI V, 2019
The Edward Snowdens June 2013 leaks of United States National Security Agency (NSA) documents unsettled the global community of internet users, Governments and the Civil Society at large. At the heart of Snowdens leaks was the NSA top-secret PRISM programs that the NSA was using to obtained mass users data through direct access to the systems of Google, Facebook, Apple and other US internet service providers. Complicit with the NSA PRISM program was UKs General Communications Headquarters or GCHQ through its own covert mass data collection program TEMPORA. Google, Facebook and Microsoft etc. denied their complicity in the PRISM program. Verizon came forward and revealed that the communications that were being targeted by the PRISM did not just stop at the metadata rather it also collected the contents of the specifically targeted data subject. It can be argued that the US and UK intelligence communities were responding to the emerging threats of “Global terrorism”. The PRISM program was working under the US Legislation of FAA or the FISA Amendments Act. The Foreign Intelligence Surveillance Act (FISA) of 1978 Amendments Act of 2008 allowed the US intelligence agencies to collect mass data for surveillance without any Court Orders or seeking the cooperation of the internet service providers. It can be stated with confidence that the present day European Unions May 2018 General Data Protection regulation (GDPR) and USAs Clarifying Overseas Use of Data (CLOUD) Act March 2018 are the culmination of a series of legal battles on both sides to tackle the uncertainties that occurred with the lawful handling of Big Data. This paper seeks to review the brief history of both the legal instruments and how these two competing laws would affect the future handling of personal data for those using internet technologies. The international reach of both the laws makes them unique as the Supra-National nature of both the laws aims to satisfy the prescribed needs of EU and USA only. We will also focus our attention to the possible tension that these laws create for the subject of these laws, the individual or the data-subjects whose data is the focal point these laws. It is ubmitted that both EU GDPR and USAs CLOUD Act have far reaching social and legal implications on how the internet use and the development of its technologies proceeds in the future.
Computer Law & Security Review, 2015
Privacy Technologies and Policy, 2018
The EU's General Data Protection Regulation is poised to present major challenges in bridging the gap between law and technology. This paper reports on a workshop on the deployment, content and design of the GDPR that brought together academics, practitioners, civil-society actors, and regulators from the EU and the US. Discussions aimed at advancing current knowledge on the use of abstract legal terms in the context of applied technologies together with best practices following state of the art technologies. Five themes were discussed: state of the art, consent, de-identification, transparency, and development and deployment practices. Four traversal conflicts were identified, and research recommendations were outlined to reconcile these conflicts.
Journal of Contemporary European Research, 2010
The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out o...
The workshop on Restrictions in the Implementation of EU Data Protection Directive for Public Interest, Security and Defence, was the second of the two problem-solving workshops to be held in the HIDE project. This one-and-a-half-day workshop took place at Grand Hotel Union – Hotel and Conference Centre, Miklošičeva 1, Ljubljana, Slovenia on 17-18 September 2009. The workshop was organized by the Laboratory of Artificial Perception, Systems and Cybernetics, Faculty of Electrical Engineering, University of Ljubljana, in cooperation with the Centre for Science, Society and Citizenship (CSSC), Italy. This paper summarizes the results of the workshop.
Florida Law Review, 2019
This Article questions the widespread contention that recent updates to European Union (EU) data protection law will drive a disruptive wedge between EU and United States (U.S.) data privacy regimes. Europe's General Data Protection Regulation (GDPR), which took effect in May 2018, gives all EU citizens easier access to their data, a right to portability, a right to be forgotten, and a right to learn when their data has been hacked. These mandatory privacy protections apply to non-EU companies that offer goods or services to EU consumers, whether through a subsidiary or a website. The "Brussels Effect" hypothesis projects a "race to the top" as multinational entities find it easier to adopt the most stringent data protection standards worldwide, rather than satisfying divergent data privacy rules. The GDPR is said to be a prime example of the Brussels Effect because of its aggressive extraterritorial scope that unilaterally imposes EU law on U.S. entities. This Article acknowledges a Brussels Effect, but there is also an overlooked "D.C. Effect" reflected in the GDPR's adoption of many U.S. data privacy innovations. The GDPR imports long-established U.S. tort concepts for the first time into European privacy law, including deterrence-based fines, collective redress, wealth-based punishment, and arming data subjects with the right to initiate public enforcement. Under the GDPR, the EU Commission adopted "Privacy by Design" and security breach notification obligations, innovations pioneered in the U.S. The net effect of the GDPR is a bilateral transatlantic privacy convergence, which is rapidly evolving into a global data privacy 1. The authors would like to acknowledge the support, encouragement, and ideas of
Kiteworks, 2024
Today, the protection of sensitive content has become more critical than ever. As organizations increasingly rely on digital communication and collaboration and their third-party ecosystems grow, the risks associated with data breaches continue to escalate. Our report highlights the trends and challenges that organizations must navigate to ensure the security and compliance of their sensitive content. Malicious events from the past year ratcheted up risks associated with third parties and the software supply chain (e.g., the MOVEit and GoAnywhere managed file transfer data breaches). Accordingly, Verizon, in its 2024 Data Breach Investigations Report (DBIR), highlighted a staggering 68% increase in data breaches connected to third parties, which now account for 15% of all incidents. At the same time, personal data is the target of most cyberattacks, leading government and industry bodies to double-down on instituting additional data privacy regulations—all which makes data security and compliance increasingly more complex and difficult to achieve. On that note, as cross-analysis of our survey data shows, proliferation of communication tools used to send and share sensitive content, as well as a continued broad universe of third parties with which sensitive content is exchanged, remain critical risk factors. Failure to vet communication tools to ensure they employ advanced security capabilities is also a salient takeaway in the survey findings. Ultimately, the proof is in the survey “pudding”: Data breach rates and litigation costs are significantly higher for organizations that rely on higher numbers of communication tools, exchange sensitive content with larger numbers of third parties, and fail to employ advanced security technologies. While we are certainly a bit biased, we believe the Kiteworks Private Content Network can help organizations overcome these challenges—safeguarding email and file data communications while enabling organizations to demonstrate compliance with various data privacy and cybersecurity compliance mandates. We hope you find the data insights and takeaways in this year’s report informative and actionable. And as always, we welcome your comments and suggestions.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.