Showing papers in "Computer Law & Security Review in 2017"
••
TL;DR: It is argued that blockchain can introduce long–awaited transparency in matters of copyright ownership chain; substantially mitigate risks of online piracy by enabling control over digital copy and creating a civilized market for “used” digital content.
205 citations
••
TL;DR: The application of blockchain to e-Residency has the potential to fundamentally change the way identity information is controlled and authenticated and used in the communications context and this is the first study of its kind to examine policy issues around blockchain.
176 citations
••
TL;DR: The potential issues with legal and practical enforceability that arise from the use of smart contracts within both civil and common law jurisdictions are considered.
172 citations
••
TL;DR: The aim of this article is to propose a first systematic interpretation of this new right, by suggesting a pragmatic and extensive approach, particularly taking advantage as much as possible of the interrelationship that this new legal provision can have with regard to the Digital Single Market and the fundamental rights of digital users.
137 citations
••
TL;DR: If individuals are shown the “price” of their personal data, they can acquire higher awareness about their power in the digital market and thus be effectively empowered for the protection of their information privacy.
86 citations
••
TL;DR: The Australian government has ambitious aims to release greater amounts of its data to the public, but is likely this task will prove difficult due to uncertainties surrounding the reliability of de-identification and the requirements of privacy law, as well as a public service culture which is yet to fully embrace the open data movement.
83 citations
••
TL;DR: In this article, the authors examine the problem of AI memory and the right to be forgotten, and conclude that it may be impossible to fulfill the legal aims of the Right to Be Forgotten in artificial intelligence environments.
73 citations
••
TL;DR: It is suggested that the result of this paper may be its use in further research defining the scope of SAI rights and obligations, which is formulated according to the technical capabilities integrated in SAI and the SAI's ability to interact independently with other legal subjects.
71 citations
••
TL;DR: Why the implementation of Privacy by Design is a necessity in a number of sectors where specific data protection concerns arise and how it can be implemented is demonstrated.
63 citations
••
TL;DR: The extent to which virtual currencies are regulated under EU financial and economic law is analyzed, with particular attention to cryptocurrencies, to provide insights valuable to service providers active in this nascent market.
56 citations
••
TL;DR: Whether international fears of China's new Cyber Security Law are justified is focused on, and why China needs a cyber security regime is analyzed.
••
TL;DR: A framework has to be developed that adds new layers of protection for fundamental rights and safeguards against erroneous and malicious use at the levels of analysis and use and the oversight regime is in need of strengthening.
••
TL;DR: In this article, the authors compared the protection of privacy and personal data in eight EU member states: France, Germany, the UK, Ireland, Romania, Italy, Sweden, and the Netherlands.
••
TL;DR: To what extent a different interpretation of the term ‘driver’ in traffic laws and international Conventions can accommodate the deployment of self-driving cars without a human driver present will be discussed in this article.
••
TL;DR: The article tests the applicability of the GDPR to online price personalisation practices by applying criteria as ‘personal data’ and ‘automated processing’ to several discriminatory pricing cases and examples and provides a capita selecta of rights and obligations pertinent to online discriminatory pricing.
••
TL;DR: This paper argues that pseudonymization can be used both to reduce the risks of reidentification and help data controllers and processors to respect their personal data protection obligations by keeping control over their activities.
••
TL;DR: The paper illustrates and explains information linkage during the process of data integration in a smart neighbourhood scenario to enable a technical and legal framework to ensure stakeholders awareness and protection of subjects about privacy breaches due to information linkage.
••
TL;DR: It is argued that substantive rules that establish a basic set of privacy norms regarding the collection, use and disclosure of data are necessary and can be realized in part via a privacy code of practice for the connected vehicle.
••
TL;DR: This article makes a cross-examination of legislations, compares them with one another in order to offer a reflection on the future of portable data in Europe, and finally attempts to identify the best approach to attribute data portability.
••
TL;DR: The findings of a recent survey of EU DPAs are reported that explore the problems they have in comprehending new technologies and how they are dealing with them.
••
TL;DR: The provisions of the Guidelines and their attempt to address the major challenges of the new big data paradigm set the stage for concluding remarks about the most suitable regulatory model to deal with the different issues posed by the development of technology.
••
TL;DR: Under which circumstance the automated targeting of job advertisements can amount to direct or indirect discrimination, the possibilities of using techniques like data mining and machine learning to actively battle direct and indirect discrimination are explained.
••
TL;DR: A number of key issues and questions that raise concerns from a multi-dimensional children's rights perspective are identified and clarified to clarify remaining ambiguities in the run-up to the actual application of the GDPR from 25 May 2018 onwards.
••
TL;DR: This paper argues that the GDPR turned certification into a new regulatory instrument in data protection, and suggests to call it monitored self-regulation, seeking to fill the gap between self- regulation and traditional regulation in order to build a regulation continuum.
••
TL;DR: Examination of existing laws and oversight bodies in the Russian Federation is discussed, how the current provisions are inadequate to deal with new developments in Big Data, and proposes recommendations for amending and updating existing law and policies.
••
TL;DR: As the business model based on cloud computing grows, public bodies, and in particular the European Union, are striving to find solutions to properly regulate the future economy, either by introducing new laws, or by finding the best ways to apply existing principles.
••
TL;DR: The aim of this paper is to establish the grounds for a future regulatory framework for Person Carrier Robots, which includes legal and ethical aspects, and to take into account other interdisciplinary aspects of robot technology to offer complete legal coverage to citizens.
••
TL;DR: It is contended that the complex legal framework risks posing headaches to bona fide companies deploying biometric data for multifactor authentication and that the new legal regime is not reaching its goal of finding a balance between the free movement of such data and protecting citizens.
••
TL;DR: It is established that stakeholders have a shared responsibility to address cybersecurity threats that can affect medical devices and manufacturers and health care providers should consider identification, detection and prevention steps at the pre-market and post-market stages.
••
TL;DR: It is posits that in clarifying the law, a new approach to categorising personal data is required to achieve the benefits of categorisation and increase the transparency of personal data processing for data subjects.