Skip to main content

Privacy and Data Protection in Electronic Communications

  • Conference paper
Computer Network Security (MMM-ACNS 2003)

Abstract

The digitalisation of networks thus offering of new services may entail inherent risks to privacy of the user, as well as possible inhibitions on his/her freedom of communication. This paper addresses issues of privacy and fair processing of personal data in electronic communications. It focuses on the analysis of the Directive 2002/58/EC “on privacy and electronic communications”. Emphasis is given on the provisions concerning traffic data and on the prohibition of the use of cookies as an expression of confidentiality and protection of anonymity. This paper further refers with the intention to introduce technology neutral rules and argues that this objective is a contradiction per se as each regulator, when setting out to regulate, still has a given, particular technology in mind. We argue that protection of privacy should be achieved through rather than despite technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albert, J.: Privacy on the Internet: Protecting and Empowering Users, EC Conference, Data Protection Conference on the Implementation of 95/46/EC. In: Workshop 2: Developments in the Information Society: Internet and Privacy Enhancing Technologies (2002)

    Google Scholar 

  2. Broughon, J., Eft, K.: Security and privacy risks of doing business on the Web, http://istpub.berkeley.edu:4201/bcc/Summer2000/

  3. Data Protection Working Party. In: Privacy on the Internet – An integrated EU Approach to online Data Protection (2000)

    Google Scholar 

  4. Dinant, J.M.: The arrival of the new Internet network numbering system and its major risks to data protection. In: 23rd Int. Conference on Privacy and Personal Data Protection (2001)

    Google Scholar 

  5. Flaherty, D.: Privacy Impact Assessments: an essential tool for data protection. In: 22nd International Conference on Privacy and Personal Data Protection, Venice (2000)

    Google Scholar 

  6. Gritzalis, D., Moulinos, K., Kostis, K.: A Privacy-Enhancing e-business Model Based on Infomediaries. In: Workshop on Mathematical Methods, Models, and Architectures for Computer Networks Security, St. Petersburg, Russia (2001)

    Google Scholar 

  7. OECD. Guidelines for the Security of Information Systems and Networks, Paris (2002)

    Google Scholar 

  8. Privacy International. Working Paper on Data Retention presented at EU Forum on Cybercrime (2001), http://www.privacyinternational.org/issues/cybercrime/eu

  9. Reidenberg, J.: Lex Informatica: The Formulation of Information Policy Rules Through Technology. Texas Law Review 86(3) (1998)

    Google Scholar 

  10. Roßnagel, A., Pfitzmann, A., Garstka, H.: Modernisierung des Datenschutzrechts. In: Gutachten im Auftrag des Bundesministerium des Innern, Berlin (2001)

    Google Scholar 

  11. Schwartz, P.: Privacy and Democracy in Cyberspace. Vanderbilt Law Rev. 52 (1609)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mitrou, L., Moulinos, K. (2003). Privacy and Data Protection in Electronic Communications. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45215-7_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40797-3

  • Online ISBN: 978-3-540-45215-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics