Abstract
This chapter presents the results from a joint project of European Parliamentary Technology Assessment institutions on information and communication technologies (ICT) and privacy. It reflects the outcome of 28 projects from 7 countries. These TA projects were analysed under a common framework. The analysis rendered a set of challenges for European policy and finally several policy options on how to deal with these challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For a brief discussion of different approaches towards “security”, the historical development and recent EU-policy in this field see: (Raguse et al. 2008). Further reading: (Daase et al. 2002; ÖAW 2005; Study Group on Europe’s Security Capabilities 2004; Hayes 2006; Eriksson and Giacomello 2007; von Bredow 2005; Council of Europe 2003).
- 2.
- 3.
For further information on EPTA and especially on the TA projects undertaken by its members, please refer to the EPTA website at http://www.eptanetwork.org/EPTA/.
- 4.
Methods used in the underlying projects were: desktop research, expert interviews, citizens’ panels, consensus conferences, desktop research, expert panels/work groups and focus group studies (Klüver 2006, p. 103ff)
- 5.
Teknologirådet (Denmark), Teknologirådet (Norway), the UK Parliamentary Office of Science and Technology (POST), ViwTA from Flanders, TA-SWISS and ITA from Austria.
- 6.
- 7.
Web 2.0 applications and their consequences for future generations are one example, and are now being dealt with at national and international level.
References
Bennett, C.J. 2003. Information privacy and “Datenschutz”: Global assumptions and international governance. In Privacy: Ein Grundrecht mit Ablaufdatum? Interdisziplinäre Beiträge zur Grundrechtsdebatte, ed. W. Peissl, 61–81. Wien: Verlag der Österreichische Akademie der Wissenschaften.
Bennett, C.J., and C.D. Raab. 2003. The governance of privacy. Aldershot: Ashgate.
von Bredow, W. 2005. The Barcelona report on a Human Security Doctrine for Europe, overview and some critical remarks. Berlin Symposium on Human Security and EU-Canada Relations Canadian Universities’ Centre Berlin. March 3, Berlin.
Cas, J. 2006. Technologies that affect privacy. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Klüver, W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold et al. 19–24. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.
Cavoukian, A. 2009. Privacy by design … take the challenge. Toronto: Information and Privacy Commisioner of Ontario, Canada. http://www.privacybydesign.ca/pbdbook/PrivacybyDesignBook.pdf.
Commission of the European Communities. 2007. COM(2007) 87 final. Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. http://ec.europa.eu/justice_home/fsj/privacy/docs/lawreport/com_2007_87_f_en.pdf. Accessed 7 September 2009.
Commission of the European Communities. 2009. COM(2009) 278 final. Communication from the Commission to the European Parliament and the Council, the European Economic and Social Committee and the Committee of the Regions: Internet of Things: —An action plan for Europe; Last update: Brussels, 18.6.2009. http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf. Accessed 7 September 2009.
Council of Europe (CoE). 1981. Convention for the protection of individuals with regard to automatic processing of personal data (Convention 108), Strasbourg, 28.I.1981. http://conventions.coe.int/Treaty/EN/Treaties/Html/108.htm.
Council of Europe (CoE). 2003. Convention for the protection of human rights and fundamental freedoms as amended by Protocol No. 11 with Protocol Nos. 1, 4, 6, 7, 12 and 13. http://www.echr.coe.int/ECHR/EN/Header/Basic±Texts/Basic±Texts/The±European±Convention±on±Human±Rights±and±its±Protocols/.
Daase, C., S. Feske, and I. Peters, eds. 2002. Internationale Risikopolitik: Der Umgang mit neuen Gefahren in den internationalen Beziehungen. Baden-Baden: Nomos Verlag.
David, Murakami Wood, ed. 2006. A Report on the surveillance society, by Ball, K., D. Lyon, C. Norris, and C. Raab, commissioned by: Information Commissioner. September 2006, London. www.ico.gov.uk/…/surveillance_society_full_report_2006.pdf.
EPTA (European Parliamenty Technology Assessment). 2008. About EPTA. http://www.eptanetwork.org/EPTA/about.php. Accessed 19 May 2009.
Eriksson, J., and G. Giacomello, eds. 2007. International relations and security in the digital age. Routlegde Advances in International Relations and Global Politics. Oxford: Routledge.
European Parliament and Council. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=EN&numdoc=31995L0046&model=guichett.
Hayes, B. 2006. Arming big brother: The EU’s security research programme. No. TNI Briefing series 2006/1. Amsterdam: Transnational Institute.
ITU. 2005. IITU internet reports 2005: The internet of things: Executive summary. www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf. Accessed 07 September 2009.
Joss, S., and S. Bellucci, eds. 2002. Participatory technology assessment. European perspectives, edited by CSD. London: Centre for the Study of Democracy (Centre for the Study of Democracy and Swiss Centre for Technology Assessment).
Klüver, L., W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold, et al. 2006. ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, 16 October 2006. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.
Lyon, D., ed. 2003. Surveillance as social sorting. Privacy, risk and digital discrimination. London: Routledge.
ÖAW. 2005. Sicherheitsforschung, Begriffsfassung und Vorgangsweise für Österreich. Vienna: ÖAW.
OECD. 1980. Guidelines on the protection of privacy and transborder flows of personal data. OECD, 23 September 1980. http://www.oecd.org/document/20 / 0,2340,en_2649_33703_15589524_1_1_1_37409,00.html.
Pauer-Studer, H. 2003. Privatheit: ein ambivalenter aber unverzichtbarer Wert. In Privacy: ein Grundrecht mit Ablaufdatum? Interdisziplinäre Beiträge zur Grundrechtsdebatte, ed. W. Peissl, 9–22. Wien: Verlag der Österreichische Akademie der Wissenschaften.
Peissl, W. 1999. Parlamentarische Technikfolgen-Abschätzung in Europa. In Handbuch der Technikfolgen-Abschätzung, eds. S. Bröchler et al., 469–478, 2nd ed. Berlin: Edition Sigma.
Peissl, W. 2003. Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11 (1 March 2003): 19–24.
Peissl, W. 2005. ICT and privacy: Das erste gemeinsame EPTA-Projekt, Technikfolgen-Abschätzung: Theorie und Praxis 14 (2): 88–91.
Peissl, W. 2006. Legislation: Current situation and recent developments. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Klüver, W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold et al., 26–31. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.
Raguse, M., M. Meints, O. Langfeldt, and P. Walter. 2008. PRISE D6.2: Criteria for privacy enhancing security technologies. Commissioned by: European Commission PASR. Vienna: Institute of Technology Assessment Austrian Academy of Sciences. http://prise.oeaw.ac.at/docs/PRISE_D_6.2_Criteria_for_privacy_enhancing_security_technologies.pdf.
Rössler, B. 2001. Der Wert des Privaten. Frankfurt am Main: Suhrkamp (Philosophie an der Universität von Amsterdam).
Stef, Steyaert, and Hervé, Lisoir, eds. 2005. Participatory Methods Toolkit: A practitioner’s manual. Brussels: King Baudouin Foundation and the Flemish Institute for Science and Technology Assessment (viWTA). http://www.viwta.be/files/30890_ToolkitENGdef.pdf.
Study Group on Europe’s Security Capabilities. 2004. A human security doctrine for Europe the barcelona report of the study group on Europe’s security capabilities presented to EU High representative for common foreign and security policy Javier Solana, 15 September 2004. Barcelona: Study group on Europe’s security capabilities. http://www.lse.ac.uk/Depts/global/Publications/HumanSecurityDoctrine.pdf.
ULD. 2006. Systemdatenschutz. ULD.https://www.datenschutzzentrum.de/systemdatenschutz/index.htm. Accessed 7 September 2009.
Vig, N.J., and H. Paschen, eds. 2000. Parliaments and technology. Albany, USA: State Univ. New York Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Peissl, W. (2010). Information Privacy in Europe from a TA Perspective. In: Gutwirth, S., Poullet, Y., De Hert, P. (eds) Data Protection in a Profiled World. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8865-9_14
Download citation
DOI: https://doi.org/10.1007/978-90-481-8865-9_14
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-8864-2
Online ISBN: 978-90-481-8865-9
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)