Abstract
This paper briefly explains the concept of Privacy by Design (PBD); provides an overview of the benefits and value of PBD for regulating and minimizing the threats to privacy posed by the increasing development, deployment and use of Privacy-Invading Technologies (PITs); outlines some of the limitations, constraints and potential criticism of PBD and the practical challenges of achieving, implementing and enforcing PBD legislation; and provides some potential counter-arguments to the criticism and some ways to help overcome the main challenges and constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agre, P.E., Rotenberg, M. (eds.): Technology and Privacy: The New Landscape. MIT Press (1997)
Albrechtslund, A.: Ethics and technology design. Ethics and Information Technology, 63–72 (2007)
Borking, J.: Assessing investments mitigating privacy risks. In: Mommers, L., Franken, H., van den Herik, J., van der Klaauw, F., Zwenne, G.-J. (eds.) Het Binnenste Buiten; Liber Amicorum Ter Gelegenheid van Het Emeritaat aan Prof. dr. Aernout, H.J.Schmidt, Hoogleraar Recht en Informatica te Leiden, eLaw@Leiden, pp. 255–273 (2010)
Cannataci, J.A.: Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America? International Journal of RF Technologies 2, 173–187 (2011)
Cave, J., van Oranje, C., Schindler, R., Ahehabi, A., Brutscher, P.H.-B., Robinson, N.: Trends in connectivity technologies and their socio-economic impacts, Policy Options for the Ubiquitous Internet Society. Final Report. RAND Europe (July 2009)
Cavoukian, A.: Privacy by Design (2009)
Cavoukian, A.: 7 Foundational Principles of Privacy by Design (January 2011), http://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
Dommering, E.: Regulating technology: Code is not law. In: Dommering, E.J., Asscher, L.F. (eds.) Coding Regulation: Essays on the Normative Role of Information Technology, pp. 1–17. T.M.C. Asser Press (2006)
Grimmelmann, J.: Regulation by Software. Yale Law Journal 114, 1719–1758 (2005)
Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Information and Software Technology 51(2), 337–350 (2009)
Gutwirth, S., De Hert, P., De Sutter, L.: The trouble with technology regulation from a legal perspective. Why Lessig’s ‘optimal mix’ will not work. In: Brownsword, R., Yeung, K. (eds.) Regulating Technologies, pp. 193–218. Hart Publishers (2008)
Fischer-Hübner, S.: IT-Security and Privacy. LNCS, vol. 1958, pp. 107–165. Springer, Heidelberg (2001)
Hildebrandt, M., Koops, B.-J.: The Challenges of Ambient Law and Legal Protection in the Profiling Era. Modern Law Review 73(3), 428–460 (2010)
Hirsch, D.: Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law. Georgia Law Review 41(1), 1–64 (2006)
Lessig, L.: Code and Other Laws of Cyberspace. Basic Books (1999)
Kim, Y., Lee, S.W., Lee, D.H., Kim, J., Lee, M.W.: Sound Detection as an Aid to Increase Detectability of CCTV in Surveillance System. In: Aykin, N. (ed.) HCII 2007. LNCS, vol. 4560, pp. 382–389. Springer, Heidelberg (2007)
Koops, B.-J.: Criteria for Normative Technology: An Essay on the Acceptability of ’Code as Law’ in Light of Democratic and Constitutional Values. Tilburg University Legal Studies, Working Paper no. 007/2007 (2007)
Pasic, A.: Privacy by Design: An industry perspective on the challenges and opportunities of privacy (2011), http://www.eurescom.eu/?id=531
Porter, M., van der Linde, C.: Green and Competitive, Harvard Business Review, 120–134 (September-October 1995)
Posner, R.: The economics of privacy. American Economic Review 71(2), 405–409 (1981)
Reidenberg, J.R.: Privacy Protection and the Interdependence of Law, Technology and Self-Regulation (2000), http://reidenberg.home.sprynet.com/Interdependence.htm
RISEPTIS: Trust in the Information Society: Research and Innovation on Security, Privacy and Trustworthiness in the Information Society. A Report of the Advisory Board RISEPTIS (2009)
The Royal Academy of Engineering: Dilemmas of Privacy and Surveillance: Challenges of Technological Change, London (2007), http://www.raeng.org.uk/news/publications/list/reports/dilemmas_of_privacy_and_surveillance_report.pdf
Schermer, B.W.: Software agents, surveillance, and the right to privacy: a legislative Framework for agent-enabled surveillance, PhD diss. Leiden University Press (2007)
Schneier, B.: Strong Laws, Smart Tech Can Stop Abusive ‘Data Reuse’, June 28. Wired News (2007), http://www.schneier.com/essay-175.html
Sollie, P., Düwell, M. (eds.): Evaluating New Technologies: Methodological Problems For The Ethical Assessment of Technology Developments. Springer (2009)
Schwartz, P.M.: Beyond Lessig’s code for Internet Privacy: Cyberspace Filters, Privacy-Control, and Fair Information Practices. Wisconsin Law Review 2000(4), 743–787 (2000)
Williams, M.-A.: Privacy Management: The Law and Global Business Strategies: A Case for Privacy Driven Design. Innovation and Enterprise Research Laboratory, University of Technology, Sydney (2009)
van Blarkom, G.W., Borking, J.J., Olk, J.G.E. (eds.): The Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents (2003)
Yeung, K., Dixon-Woods, M.: Design-based regulation and patient safety: A regulatory studies perspective. Social Science & Medicine 71(3), 502–509 (2010)
Yueh-Hsuan, W., Chien-Hsun, C., Cheun-Tsai, S.: Safety Intelligence and Legal Machine Language-Do we need the Three Laws of Robotics? In: Yoshihiko, T. (ed.) Service Robot Applications. InTech Education & Publishing (2008), http://works.bepress.com/weng_yueh_hsuan/3
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Klitou, D. (2014). A Solution, But Not a Panacea for Defending Privacy: The Challenges, Criticism and Limitations of Privacy by Design. In: Preneel, B., Ikonomou, D. (eds) Privacy Technologies and Policy. APF 2012. Lecture Notes in Computer Science, vol 8319. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54069-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-54069-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54068-4
Online ISBN: 978-3-642-54069-1
eBook Packages: Computer ScienceComputer Science (R0)