Skip to main content

The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU’s Regulatory Architecture

  • Conference paper
  • First Online:
Privacy and Identity Management. Sharing in a Digital World (Privacy and Identity 2023)

Abstract

EU information technology law is built like a multi-storey house: on the ground floor is technology development and on the top floor are regulatory principles and rights; in the middle floor lie standards, which should connect the top with the ground floor. The house is built on the premise that these floors are seamlessly connected, but are they? The multi-storey house was in fact built without staircases, causing a practical disconnect between regulatory principles and technology development. This keynote speech, which draws from the 2023 book ‘Cybersecurity, Privacy and Data Protection in EU law’, will explore why information technology is effaced from EU law in practice, and the implications for cybersecurity, data protection, data markets, identity management, privacy and many other fields. This keynote speech will explore what collaborative approaches may be needed to redesign the EU regulatory architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The New Legislative Framework, originally called ‘New Approach’, is a framework introduced to enable product harmonization in support for the free circulation of goods, and thus instrumental for the development of the Single Market, by providing for common health and safety requirements, mechanisms for market surveillance and conformity assessment. The most recent package was introduced in 2008: https://single-market-economy.ec.europa.eu/single-market/goods/new-legislative-framework_en. For a discussion of the New Approach/NLF and the effacement of technology from EU law, see [1], 148–50, 152 and 154. See also Paul Craig and Gráinne de Búrca, EU Law. Text, Cases and Materials. Oxford, Oxford University Press (2020, seventh edition), chapter 7.

  2. 2.

    Let us take as an example the (negative formulation of the) essence of the right to the protection of personal data discussed in Sect. 1. Neither the law nor courts specify what are the security safeguards that should be included in the legal instrument to ensure the integrity and confidentiality of personal data. The practical determination is pegged to the state of the art and standardization, and is therefore it is driven by the market. This mechanism is discussed in-depth in [1], 193, 258–59, 262–69.

References

  1. Porcedda, M.G.: Cybersecurity, Privacy and Data Protection in EU Law. A Law, Policy and Technology Analysis. Hart Publishing, Oxford (2023)

    Google Scholar 

  2. Charter of Fundamental Rights of the European Union [2012] OJ C 326/391 (CFR)

    Google Scholar 

  3. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) [2016] OJ L119/1

    Google Scholar 

  4. Consolidated versions of the Treaty on European Union (TEU) and the Treaty on the Functioning of the European Union (TFEU), OJ C 83/01 (Lisbon Treaty)

    Google Scholar 

  5. Digital Rights Ireland and Seitlinger and Others, Joined cases C-293/12 and C-594/12, EU:C:2014:238

    Google Scholar 

  6. Opinion 1/15 of 26 July 2017 pursuant to Article 218(11) TFEU EU:C:2017:592

    Google Scholar 

  7. Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act or CSA) [2019] OJ L 151/15

    Google Scholar 

  8. Council Implementing Regulation (EU) (2020)

    Google Scholar 

  9. Wuyts, K.: LINDDUN: a Privacy Threat Analysis Framework

    Google Scholar 

  10. Danezis, G., et al.: Privacy and data protection by design – from policy to engineering (ENISA) (2014)

    Google Scholar 

  11. Hoepman, J-H.: Privacy by Design Strategies (The Little Blue Book) (2022)

    Google Scholar 

  12. Lessig, L: Code: And Other Laws of Cyberspace. Version 2.0. Basic Books, New York (2006)

    Google Scholar 

  13. Reidenberg, J.R.: Lex informatica: the formulation of information policy rules through technology. Tex. Law Rev. 76, 553 (1998)

    Google Scholar 

  14. Gellert, R.: The Risk-Based Approach to Data Protection. Oxford University Press, Oxford (2020)

    Book  Google Scholar 

  15. Stichting Rookpreventie Jeugd and others, C-160/20, EU:C:2022:101

    Google Scholar 

  16. Shackelford, S.J., Russell, S., Haut, J.: Bottoms up: a comparison of voluntary cybersecurity frameworks. UC Davis Bus. Law J. 16, 217–260 (2020)

    Google Scholar 

  17. Peng, S.Y.: ‘Private’ Cybersecurity Standards? Cyberspace Governance, Multistakeholderism and the (ir)relevance of the TBT Regime’ Cornell Int. Law J. 15 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Grazia Porcedda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Porcedda, M.G. (2024). The Effacement of Information Technology from EU Law: The Need for Collaborative Approaches to Redesign the EU’s Regulatory Architecture. In: Bieker, F., de Conca, S., Gruschka, N., Jensen, M., Schiering, I. (eds) Privacy and Identity Management. Sharing in a Digital World. Privacy and Identity 2023. IFIP Advances in Information and Communication Technology, vol 695. Springer, Cham. https://doi.org/10.1007/978-3-031-57978-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57978-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57977-6

  • Online ISBN: 978-3-031-57978-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics