Skip to main content

Information Privacy in Europe from a TA Perspective

  • Chapter
  • First Online:
Data Protection in a Profiled World

Abstract

This chapter presents the results from a joint project of European Parliamentary Technology Assessment institutions on information and communication technologies (ICT) and privacy. It reflects the outcome of 28 projects from 7 countries. These TA projects were analysed under a common framework. The analysis rendered a set of challenges for European policy and finally several policy options on how to deal with these challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For a brief discussion of different approaches towards “security”, the historical development and recent EU-policy in this field see: (Raguse et al. 2008). Further reading: (Daase et al. 2002; ÖAW 2005; Study Group on Europe’s Security Capabilities 2004; Hayes 2006; Eriksson and Giacomello 2007; von Bredow 2005; Council of Europe 2003).

  2. 2.

    For a theoretical analysis of participatory TA in Europe and a comprehensive overview of participatory methods used in Technology Assessment see (Joss and Bellucci 2002; Stef Steyaert and Hervé Lisoir 2005).

  3. 3.

    For further information on EPTA and especially on the TA projects undertaken by its members, please refer to the EPTA website at http://www.eptanetwork.org/EPTA/.

  4. 4.

    Methods used in the underlying projects were: desktop research, expert interviews, citizens’ panels, consensus conferences, desktop research, expert panels/work groups and focus group studies (Klüver 2006, p. 103ff)

  5. 5.

    Teknologirådet (Denmark), Teknologirådet (Norway), the UK Parliamentary Office of Science and Technology (POST), ViwTA from Flanders, TA-SWISS and ITA from Austria.

  6. 6.

    https://www.european-privacy-seal.eu/.

  7. 7.

    Web 2.0 applications and their consequences for future generations are one example, and are now being dealt with at national and international level.

References

  • Bennett, C.J. 2003. Information privacy and “Datenschutz”: Global assumptions and international governance. In Privacy: Ein Grundrecht mit Ablaufdatum? Interdisziplinäre Beiträge zur Grundrechtsdebatte, ed. W. Peissl, 61–81. Wien: Verlag der Österreichische Akademie der Wissenschaften.

    Google Scholar 

  • Bennett, C.J., and C.D. Raab. 2003. The governance of privacy. Aldershot: Ashgate.

    Google Scholar 

  • von Bredow, W. 2005. The Barcelona report on a Human Security Doctrine for Europe, overview and some critical remarks. Berlin Symposium on Human Security and EU-Canada Relations Canadian Universities’ Centre Berlin. March 3, Berlin.

    Google Scholar 

  • Cas, J. 2006. Technologies that affect privacy. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Klüver, W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold et al. 19–24. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.

    Google Scholar 

  • Cavoukian, A. 2009. Privacy by design … take the challenge. Toronto: Information and Privacy Commisioner of Ontario, Canada. http://www.privacybydesign.ca/pbdbook/PrivacybyDesignBook.pdf.

    Google Scholar 

  • Commission of the European Communities. 2007. COM(2007) 87 final. Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. http://ec.europa.eu/justice_home/fsj/privacy/docs/lawreport/com_2007_87_f_en.pdf. Accessed 7 September 2009.

    Google Scholar 

  • Commission of the European Communities. 2009. COM(2009) 278 final. Communication from the Commission to the European Parliament and the Council, the European Economic and Social Committee and the Committee of the Regions: Internet of Things: —An action plan for Europe; Last update: Brussels, 18.6.2009. http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf. Accessed 7 September 2009.

    Google Scholar 

  • Council of Europe (CoE). 1981. Convention for the protection of individuals with regard to automatic processing of personal data (Convention 108), Strasbourg, 28.I.1981. http://conventions.coe.int/Treaty/EN/Treaties/Html/108.htm.

    Google Scholar 

  • Council of Europe (CoE). 2003. Convention for the protection of human rights and fundamental freedoms as amended by Protocol No. 11 with Protocol Nos. 1, 4, 6, 7, 12 and 13. http://www.echr.coe.int/ECHR/EN/Header/Basic±Texts/Basic±Texts/The±European±Convention±on±Human±Rights±and±its±Protocols/.

    Google Scholar 

  • Daase, C., S. Feske, and I. Peters, eds. 2002. Internationale Risikopolitik: Der Umgang mit neuen Gefahren in den internationalen Beziehungen. Baden-Baden: Nomos Verlag.

    Google Scholar 

  • David, Murakami Wood, ed. 2006. A Report on the surveillance society, by Ball, K., D. Lyon, C. Norris, and C. Raab, commissioned by: Information Commissioner. September 2006, London. www.ico.gov.uk/…/surveillance_society_full_report_2006.pdf.

    Google Scholar 

  • EPTA (European Parliamenty Technology Assessment). 2008. About EPTA. http://www.eptanetwork.org/EPTA/about.php. Accessed 19 May 2009.

    Google Scholar 

  • Eriksson, J., and G. Giacomello, eds. 2007. International relations and security in the digital age. Routlegde Advances in International Relations and Global Politics. Oxford: Routledge.

    Google Scholar 

  • European Parliament and Council. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://europa.eu.int/smartapi/cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=EN&numdoc=31995L0046&model=guichett.

    Google Scholar 

  • Hayes, B. 2006. Arming big brother: The EU’s security research programme. No. TNI Briefing series 2006/1. Amsterdam: Transnational Institute.

    Google Scholar 

  • ITU. 2005. IITU internet reports 2005: The internet of things: Executive summary. www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf. Accessed 07 September 2009.

    Google Scholar 

  • Joss, S., and S. Bellucci, eds. 2002. Participatory technology assessment. European perspectives, edited by CSD. London: Centre for the Study of Democracy (Centre for the Study of Democracy and Swiss Centre for Technology Assessment).

    Google Scholar 

  • Klüver, L., W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold, et al. 2006. ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, 16 October 2006. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.

    Google Scholar 

  • Lyon, D., ed. 2003. Surveillance as social sorting. Privacy, risk and digital discrimination. London: Routledge.

    Google Scholar 

  • ÖAW. 2005. Sicherheitsforschung, Begriffsfassung und Vorgangsweise für Österreich. Vienna: ÖAW.

    Google Scholar 

  • OECD. 1980. Guidelines on the protection of privacy and transborder flows of personal data. OECD, 23 September 1980. http://www.oecd.org/document/20 / 0,2340,en_2649_33703_15589524_1_1_1_37409,00.html.

    Google Scholar 

  • Pauer-Studer, H. 2003. Privatheit: ein ambivalenter aber unverzichtbarer Wert. In Privacy: ein Grundrecht mit Ablaufdatum? Interdisziplinäre Beiträge zur Grundrechtsdebatte, ed. W. Peissl, 9–22. Wien: Verlag der Österreichische Akademie der Wissenschaften.

    Google Scholar 

  • Peissl, W. 1999. Parlamentarische Technikfolgen-Abschätzung in Europa. In Handbuch der Technikfolgen-Abschätzung, eds. S. Bröchler et al., 469–478, 2nd ed. Berlin: Edition Sigma.

    Google Scholar 

  • Peissl, W. 2003. Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11 (1 March 2003): 19–24.

    Article  Google Scholar 

  • Peissl, W. 2005. ICT and privacy: Das erste gemeinsame EPTA-Projekt, Technikfolgen-Abschätzung: Theorie und Praxis 14 (2): 88–91.

    Google Scholar 

  • Peissl, W. 2006. Legislation: Current situation and recent developments. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Klüver, W. Peissl, T. Tennøe, D. Bütschi, J. Cas, R. Deboelpaep, C. Hafskjold et al., 26–31. EPTA. Copenhagen/Oslo/Vienna. http://epub.oeaw.ac.at/ita/ita-projektberichte/e2-2a44.pdf.

    Google Scholar 

  • Raguse, M., M. Meints, O. Langfeldt, and P. Walter. 2008. PRISE D6.2: Criteria for privacy enhancing security technologies. Commissioned by: European Commission PASR. Vienna: Institute of Technology Assessment Austrian Academy of Sciences. http://prise.oeaw.ac.at/docs/PRISE_D_6.2_Criteria_for_privacy_enhancing_security_technologies.pdf.

    Google Scholar 

  • Rössler, B. 2001. Der Wert des Privaten. Frankfurt am Main: Suhrkamp (Philosophie an der Universität von Amsterdam).

    Google Scholar 

  • Stef, Steyaert, and Hervé, Lisoir, eds. 2005. Participatory Methods Toolkit: A practitioner’s manual. Brussels: King Baudouin Foundation and the Flemish Institute for Science and Technology Assessment (viWTA). http://www.viwta.be/files/30890_ToolkitENGdef.pdf.

    Google Scholar 

  • Study Group on Europe’s Security Capabilities. 2004. A human security doctrine for Europe the barcelona report of the study group on Europe’s security capabilities presented to EU High representative for common foreign and security policy Javier Solana, 15 September 2004. Barcelona: Study group on Europe’s security capabilities. http://www.lse.ac.uk/Depts/global/Publications/HumanSecurityDoctrine.pdf.

    Google Scholar 

  • ULD. 2006. Systemdatenschutz. ULD.https://www.datenschutzzentrum.de/systemdatenschutz/index.htm. Accessed 7 September 2009.

    Google Scholar 

  • Vig, N.J., and H. Paschen, eds. 2000. Parliaments and technology. Albany, USA: State Univ. New York Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Peissl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Peissl, W. (2010). Information Privacy in Europe from a TA Perspective. In: Gutwirth, S., Poullet, Y., De Hert, P. (eds) Data Protection in a Profiled World. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8865-9_14

Download citation

Publish with us

Policies and ethics