Ana səhifə

Jur 5630: Privacy, data protection and lex informatica


Yüklə 23.16 Kb.
tarix24.06.2016
ölçüsü23.16 Kb.

JUR 5630: Privacy, data protection and lex informatica




Lecture and Tutorial Overview, Spring 2007


29th January Introduction to course. Trends in surveillance and control. Catalysts for emergence of data protection law.



  • Technological-organisational developments;

  • Public fears;

  • Economic factors;

  • Legal factors.

- Lee Bygrave


[Required reading: Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002), chapter 6, sections 6.2–6.4]
[Supplementary reading: Froomkin, “The Death of Privacy?”, Stanford Law Review, 2000, vol. 52, pp. 1461–1543; Solove, “Privacy and Power: Computer Databases and Metaphors for Information Privacy”, Stanford Law Review, 2001, vol. 53, pp. 1393–1462; Westin, Privacy and Freedom (1970)]
1st February Data protection law in context: its interrelationship with

  • Human rights;

  • Administrative law;

  • Other legal fields.

- Lee Bygrave
[Required reading: Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002), chapter 6, section 6.4.1; Bygrave, “Data Protection Pursuant to the Right to Privacy in Human Rights Treaties”, International Journal of Law & Information Technology, 1998, vol. 6, pp. 247–284; Bygrave & Aarø, “Privacy, Personality and Publicity – An Overview of Norwegian Law”, in Henry (ed.), International Privacy, Publicity and Personality Laws (2001), pp. 333–346]
[Relevant regulatory instruments: European Convention on Human Rights (1950), especially Art. 8; International Covenant on Civil and Political Rights (1967), especially Art. 17]
8th February Regulatory logic of data protection law.

- Lee Bygrave
[Required reading: Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002), chapters 2, 7]
[Relevant regulatory instruments: Council of Europe’s Convention on data protection (1981); EC Directive on data protection (1995); EC Directive on privacy and electronic communications (2002); Norway’s Personal Data Act (2000); OECD’s Guidelines on data protection (1980); UN’s Guidelines on data protection (1990)]
12th February Regulatory logic of data protection law – continued.

- Lee Bygrave
[Required reading: Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002), chapters 3, 18–19]
[Relevant regulatory instruments: as for lecture on 8th February]
15th February Regulatory logic of data protection law – continued.

  • Core principles (cont’d)

- Lee Bygrave

[Required reading: as for lecture on 12th February]


[Relevant regulatory instruments: as for lecture on 8th February]
26th February Tutorial: (i) Recent case law on data protection pursuant to the European Convention on Human Rights; (ii) The scope of “personal data” concept.

- Yue Liu


1st March Regulatory logic of data protection law – continued.

  • Oversight and enforcement

- Lee Bygrave
[Required reading: Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002), chapter 4, pp. 70–79]
[Supplementary reading: Flaherty, Protecting Privacy in Surveillance Societies (1989)]
[Relevant regulatory instruments: as for lecture on 8th February]
5th March Inter-legal aspects of data protection law.

  • Regulation of transborder data flow;

  • Issues of jurisdiction and applicable law.

- Lee Bygrave
[Required reading: Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits (2002), pp. 79–83, 223–228; Bygrave, “Determining Applicable Law pursuant to European Data Protection Legislation”, Computer Law & Security Report (2000), vol. 16, pp. 252–257; alternatively Bing, “Data protection, jurisdiction and the choice of law”, Privacy Law & Policy Reporter (1999), vol. 6, pp. 92–98]
[Supplementary reading: Kuner, European Data Privacy Law and Online Business (2003), chapters 3–5; Schaffer, “Globalization and Social Protection: The Impact of E.U. and International Rules in Ratcheting Up of U.S. Privacy Standards”, Yale Journal of International Law, 2000, volume 25, pp. 1–88]
[Relevant regulatory instruments: EC Directive on data protection (1995), Arts 1, 4, 25 & 26; “Safe Harbor” decision of 2000]]
8th March EU legislation on privacy and e-communications

  • E-communications privacy Directive

  • Data retention Directive

  • Lee Bygrave

[Relevant regulatory instruments: Directive 2002/58/EC; Directive 2006/24/EC]

12th March Tutorial: (i) Lindqvist-decision; (ii) Applicable law

- Yue Liu


15th March Data privacy law outside Europe, with particular focus on Asia-Pacific jurisdictions

  • USA;

  • China;

  • Harmonisation prospects.

- Lee Bygrave & Yue Liu
[Required reading: Bygrave, “Privacy Protection in a Global Context – A Comparative Overview”, Scandinavian Studies in Law, 2004, vol. 47, pp. 319–348]
[Supplementary reading: Reidenberg, “Resolving Conflicting International Data Privacy Rules in Cyberspace”, Stanford Law Review, 2000, vol. 52, pp. 1315–1371; Bennett & Raab, The Governance of Privacy (2006)]
19th March Biometrics

  • Development of biometric identification and authentication systems;

  • Regulatory framework for such systems.

- Yue Liu
[Supplementary reading: Grijpink, “Privacy Law: Biometrics and Privacy”, Computer Law & Security Report, 2001, vol. 17, no. 3, pp. 154–160]
22nd March Privacy-enhancing technologies and identity management

- Thomas Olsen
[Required reading: Burkert, “Privacy-Enhancing Technologies: Typology, Critique, Vision”, in Agre & Rotenberg (eds.), Technology and Privacy: The New Landscape (1997), pp. 125–142]
[Supplementary reading: Olsen & Mahler, “Data Protection Issues in Collaborative Identity Management: Compliance and Responsibility in Circles of Trust” (2006), working paper; Bygrave, “Privacy-enhancing technologies – caught between a rock and a hard place”, Privacy Law & Policy Reporter, 2002, vol. 9, pp. 135–137; Bygrave, “Electronic Agents and Privacy: A Cyberspace Odyssey 2001”, International Journal of Law and Information Technology, 2001, vol. 9, pp. 275–294]
[Relevant regulatory instruments: EC Data Protection Directive (1995); EC Directive on Privacy and Electronic Communications (2002); Germany’s Teleservices Data Protection Act (1997); OECD’s Guidelines for Cryptography Policy (1997)]
26th March Cross-national surveillance: Schengen and related systems.

  • Police cooperation across borders;

  • Internal and external border control;

  • Schengen Information System and data protection.

- Stephen Karanja
[Required reading: Karanja, “The Schengen Co-operation: Consequences for the Rights of EU Citizens”, Mennesker og rettigheter, 2000, vol. 18, pp. 215–222; Karanja, “SIS II Legislative Proposals 2005: Gains and Losses!” (2005)]
29th March Lex informatica and cyberspace.

  • Emergence and particular regulatory challenges of cyberspace

  • Role of information systems architecture in regulating transactional behaviour in cyberspace

- Jon Bing & Lee Bygrave
[Required reading: Clarke et al, “A Primer on Internet Technology” (1998); Reidenberg, “Lex Informatica: The Formulation of Information Policy Rules Through Technology”, Texas Law Review, 1998, vol. 76, pp. 553ff; Lessig, Code and Other Laws of Cyberspace (New York: Basic Books, 1999), chapter 11; Lessig, “The Law of the Horse: What Cyberlaw might Teach”, Harvard Law Review, 1999, vol. 113, pp. 501ff]
10th April Lex informatica and cyberspace – continued.

- Lee Bygrave


[Required reading: Greenleaf, “An Endnote on Regulating Cyberspace: Architecture vs Law?”, University of New South Wales Law Journal, 1998, vol. 21, no. 2; Rotenberg, “Fair Information Practices and the Architecture of Privacy (What Larry Doesn’t Get)”, Stanford Technology Law Review, 2001]
12th April Tutorial: (i) Lex informatica theme; (ii) Biometrics theme.

- Yue Liu


Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©atelim.com 2016
rəhbərliyinə müraciət