Skip to main content

Privacy Protection During Criminal Investigations of Personal Data Held by Third Parties

  • Conference paper
  • First Online:
Human Choice and Digital by Default: Autonomy vs Digital Determination (HCC 2022)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 656))

Included in the following conference series:

  • 554 Accesses

Abstract

This study focuses on privacy issues concerning personal data held by third parties during criminal investigations. The development of information technology has made it possible to collect and store vast amounts of information. Since data held by third parties are often provided to investigating authorities without the data subject’s knowledge, serious privacy issues are a concern. There are two possible approaches to protecting the rights of the individual in such a situation. One relates to the restriction of investigating authorities and the other concerns the confidentiality obligations of data controllers. This study compares the relevant legislation on the privacy of personal data held by third parties and criminal investigations in the United States, the European Union, and Japan to propose appropriate solutions to address data privacy concerns. Specifically, the main recommendations of this study are that investigating authorities should be subject to certain restrictions and greater transparency requirements when processing personal data and that data controllers should be subject to greater confidentiality obligations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dos Falcon, A.: Cyber Privacy: Who Has Your Data and Why You Should Care. BenBella Books, Dallas (2020)

    Google Scholar 

  2. Schneier, B.: Data and Goliath. Norton, New York (2015)

    Google Scholar 

  3. Cate, H., Dempsey, J. (eds.): Bulk Collection. Oxford University Press, New York (2017)

    Google Scholar 

  4. Ferguson, A.: The Rise of Big Data Policing. New York University Press, New York (2017)

    Book  Google Scholar 

  5. Komukai, T.: Access to personal data held by third parties by investigating authorities and protection of the individual. J. Inf. Commun. Policy 4(1), 63–80 (2020)

    Google Scholar 

  6. Solove, D.: Understanding Privacy. Harvard University Press, Cambridge (2008)

    Google Scholar 

  7. Fuster, G.: The Emergence of Personal Data Protection as a Fundamental Right of the EU. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05023-2

    Book  Google Scholar 

  8. United States Senate Webpage, Constitution of the United States. https://www.senate.gov/civics/constitution_item/constitution.htm. Accessed 30 Jan 2022

  9. Davies, T.: Recovering the original Fourth Amendment. Mich. Law Rev. 98(3), 547 (1999)

    Article  Google Scholar 

  10. Dressler, J., Michaels, A., Simmons, R.: Understanding Criminal Procedure. Carolina Academic Press, Durham (2017)

    Google Scholar 

  11. Boyd v. United States, 116 U.S. 616, 627: Olmstead v. United States, 277 U.S. 438, Goldman v. United States, 316 US 129, 134–136 (1886)

    Google Scholar 

  12. Katz v. US, 389 U.S. 347 (1967)

    Google Scholar 

  13. United States v Miller, 425 U.S. 435, 442 (1976)

    Google Scholar 

  14. Carpenter v. United States, 138 S. Ct. 2206, 2221 (2018)

    Google Scholar 

  15. Taslitz, A., Henderson, S.: Reforming the grand jury to protect privacy in third party records. Am. Univ. Law Rev. 64, 195 (2014)

    Google Scholar 

  16. United States v Morton Salt Co, 338 U.S. 632, 643 (1950)

    Google Scholar 

  17. Michael, P.: Taking data. Univ. Chicago Law Rev. 86, 77–141 (2019)

    Google Scholar 

  18. European Union: Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (2016). https://eur-lex.europa.eu/eli/reg/2016/679/oj. Accessed 30 Jan 2022

  19. Ferguson v. City of Charleston, 532 U.S. 67 (2001)

    Google Scholar 

  20. Council of Europe, European Convention on Human Rights and Fundamental Freedoms. https://www.echr.coe.int/Documents/Convention_ENG.pdf. Accessed 30 Jan 2022

  21. European Union: Directive 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA (2016). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32016L0680. Accessed 30 Jan 2022

  22. Charter of Fundamental Rights of the European Union, 7 December 2000. https://www.europarl.europa.eu/charter/pdf/text_en.pdf. Accessed 30 Jan 2022

  23. Voigt, P., von dem Bussche, A.: The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-57959-7

    Book  Google Scholar 

  24. Prime Minister of Japan and His Cabinet webpage, The Constitution of Japan. https://japan.kantei.go.jp/constitution_and_government_of_japan/constitution_e.html. Accessed 30 Jan 2022

  25. Judgment of Supreme Court, 16 March, Japan (1976). https://www.courts.go.jp/app/hanrei_en/detail?id=47. Accessed 30 Jan 2022

  26. Kyodo News: Denuded private life, Sekai No. 921, pp. 106–114 (2019)

    Google Scholar 

  27. The Code of Criminal Investigations, Rules of the National Public Safety Commission No. 2, Article 99 (1957)

    Google Scholar 

  28. Judgment of Nagoya District Court, 16 July 2004, Japan (2004). https://www.courts.go.jp/app/hanrei_jp/detail4?id=7540. Accessed 30 Jan 2022

  29. Uga, K.: A Commentary of the Act on the Protection of Personal Information (APPI), 6th edn. Yuhikaku, Tokyo (2018)

    Google Scholar 

  30. Ministry of Internal Affairs and Communications (MIC): Commentary for guidelines For Protection Of Personal Information In Telecommunications Business, MIC Notice No. 152 of 2017; Last Amendment: MIC Notice No. 297 of 2017, September 2017 (Updated in February 2021). https://www.soumu.go.jp/main_content/000744055.pdf. Accessed 30 Jan 2022

  31. Yonemura, S.: Lectures on Medical Law. Nippon Hyoron Sha, Tokyo (2016)

    Google Scholar 

  32. Gray, D.: The Fourth Amendment in an Age of Surveillance. Cambridge University Press, Cambridge (2017)

    Book  Google Scholar 

Download references

Acknowledgements

This work was supported by JSPS KAKENHI (Grant Number JP18K01393).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taro Komukai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Komukai, T. (2022). Privacy Protection During Criminal Investigations of Personal Data Held by Third Parties. In: Kreps, D., Davison, R., Komukai, T., Ishii, K. (eds) Human Choice and Digital by Default: Autonomy vs Digital Determination. HCC 2022. IFIP Advances in Information and Communication Technology, vol 656. Springer, Cham. https://doi.org/10.1007/978-3-031-15688-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15688-5_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15687-8

  • Online ISBN: 978-3-031-15688-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics