Database Reference
In-Depth Information
is a risk of identification or re-identification, will lead to an inflation of the per-
sonal sphere. In some cases, applying data protection law may be ineffective and
even counterproductive.
To counter the drawbacks that currently flow forth from the application of data
protection legislation, a first option could be to differentiate between different
types of data (identified, identifiable, non-identifiable). While this would make
data protection law more flexible and practical it will not necessarily address all
the issues associated with profiling, nor remedy all the drawbacks of applying data
protection law in the context of profiling. Therefore, in addition to the data centric
approach, we should focus more on the actual goal of the profiling exercise and
determine on the basis of the actual risks associated with this goal which safe-
guards should apply. Not only would such an approach likely provide more pro-
tection to the individual, it would also allow for a better balancing of the interests
of the data subject and those of the data controller.
References
Barbaro, M., Zeller, T.: A face is exposed for AOL searcher no. 44177179. New York
Times (2006), online version via:
http://www.nytimes.com/2006/08/09/technology/09aol.html
(last visited: December 28, 2011)
Borking, J.J.F.M.: Privacyrecht is code. Kluwer, Deventer (2010) (in Dutch)
Blok, P.: Het Recht op Privacy. Boom Juridische uitgevers, Den Haag (2002) (in Dutch)
Bygrave, L.: Minding the machine: article 15 of the EC data protection directive and auto-
mated profiling. Computer Law & Security Report 17, 17-24 (2001)
Custers, B.H.M.: Data Mining with Discrimination Sensitive and Privacy Sensitive
Attributes. In: Proceedings of ISP 2010, International Conference on Information Secu-
rity and Privacy, Orlando, Florida, July 12/14 (2010)
Hildebrandt, M.: Defining Profiling: A New Type of Knowledge? In: Hildebrandt, M.,
Gutwirth, S. (eds.) Profiling the European Citizen, Cross-Disciplinary Perspectives.
Springer Science (2008)
van den Hoven, J.: Privacy and the Varieties of Informational Wrongdoing. Australian
Journal of Professional and Applied Ethics, Special Issue 1 (June 1999)
van den Hoven, J.: Information Technology, Privacy and the Protection of Personal Data.
In: van den Hoven, J., Weckert, J., et al. (eds.) Information Technology and Moral Phi-
losophy, pp. 301-332. Cambridge University Press, Cambridge (2008)
Lessig, L.: Code 2.0. Perseus Book Group, New York (2006)
Ohm: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymiza-
tion. UCLA Law Review 57, 1701-1777 (2010)
Schermer, B.W.: Software Agents, Surveillance, and the Right to Privacy: a Legislative
Framework for Agent-enabled Surveillance, PhD. Thesis. Leiden University (2007)
Schwarz, Solove: The PII Problem: Privacy and a new concept of personal identifiable in-
formation. New York University Law Review 86, 1814 (2011)
Terstegge, J.: Back to basics: privacy ethics (2009), http://jeroenterstegge.blogspot.com
(last visited: December 28, 2011)
Search WWH ::




Custom Search