Academia.eduAcademia.edu

Outline

Privacy and Data Protection in the EU Security Continuum

2011

https://doi.org/10.13140/RG.2.1.4386.0880

Abstract
sparkles

AI

This policy brief discusses the implications of automated data processing in the context of EU security measures and its effects on individual privacy rights. It emphasizes the need for compliance with legal frameworks concerning personal data protection and highlights the importance of safeguarding fundamental rights, particularly in light of the extensive data practices encouraged by the EU. The paper reviews critical concepts related to legal dilemmas arising from the intersection of internal and external security and offers insights into necessary policy considerations.

References (22)

  1. See Ben Hayes, Spying in a see through world: The "Open Source" intelligence industry, Statewatch Analysis No. 119, Statewatch, London, 2011, p. 1. 27 Ibid., p. 2.
  2. For instance, the European Commission is funding (through FP7) a project for the design of a "Versatile InfoRmation Toolkit for end-Users oriented Open-Sources explOitation (VIRTUOSO)".
  3. Yet it can conflict with other existing legal notions established in the member states. For instance, the Spanish legal framework regulates the use of data from 'publicly accessible sources' (fuentes accessibles al público), but explicitly limits the number of sources that can be considered as such, and the Internet is not one of them. References European Commission (2009), Communication on an Area of Freedom, Security and Justice Serving the Citizen, COM(2009) 262 final, Brussels, 10 June.
  4. ---------(2010a), Communication on Delivering an Area of Freedom, Security and Justice for Europe's Citizens: Action Plan Implementing the Stockholm Programme, COM(2010) 171 final, Brussels, 20 April.
  5. ---------(2010b), Communication on a Strategy for the Effective Implementation of the Charter of Fundamental Rights by the European Union, COM(2010) 573, Brussels, 19
  6. October.
  7. ---------(2010c), Communication on a Comprehensive Approach on Personal Data Protection in the European Union, COM(2010) 609 final, Brussels, 4 November.
  8. ---------(2010d), Communication on the EU Internal Security Strategy in Action: Five Steps Towards a More Secure Europe, COM(2010) 673 final, Brussels, 22 November.
  9. ---------(2011), Proposal for a Directive of the European Parliament and of the Council on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime, COM(2011) 32 final, Brussels, 2 February, pp. 8-9.
  10. European Data Protection Supervisor (EDPS) (2011), Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions -"A comprehensive approach on personal data protection in the European Union", EDPS, Brussels, 14 January.
  11. European Security Research & Innovation Forum (ESRIF) (2009), ESRIF Final Report, ESRIF, Brussels, December.
  12. González Fuster, Gloria and Serge Gutwirth (2011), "When 'digital borders' meet 'surveilled geographical borders': Why the future of EU border management is a problem", in Peter Burgess and Serge Gutwirth (eds), Security, Migration and Integration (working title), Brussels: VUB Press, forthcoming.
  13. González Fuster, Gloria, Paul De Hert and Serge Gutwirth (2008), State-of-the-art of the Law- Security Nexus in Europe, INEX Deliverable D.2.1, INEX Project, Brussels.
  14. González Fuster, Gloria, Paul De Hert, Erika Ellyne and Serge Gutwirth (2010), Huber, Marper and Others: Throwing new light on the shadows of suspicion, INEX Policy Brief No. 11, CEPS, Brussels, June.
  15. González Fuster, Gloria, Serge Gutwirth and Erika Ellyne (2010), Profiling in the European Union: A high-risk practice, INEX Policy Brief No. 10, CEPS, Brussels, June.
  16. González Fuster, Gloria, Serge Gutwirth and Paul De Hert (2009), Analysis of the value dimensions of European law relevant to current and anticipated challenges of the internal/external security continuum, INEX Deliverable D.2.2, INEX Project, Brussels.
  17. Gutwirth, Serge (2002), Privacy and the information age, Oxford: Rowman & Littlefield Publishers.
  18. Hayes, Ben (2011), Spying in a see through world: The "Open Source" intelligence industry, Statewatch Analysis No. 119, Statewatch, London.
  19. Hildebrandt, Mireille and Serge Gutwirth (eds) (2008), Profiling the European citizen: Cross- disciplinary perspectives, New York: Springer.
  20. House of Lords European Union Committee (2011), Money laundering: Data protection for suspicious activity reports, London: The Stationery Office Limited. Justice and Home Affairs Council (2011), 3071 st meeting, Council conclusions on the Communication from the Commission to the European Parliament and the Council: A comprehensive approach on personal data protection in the European Union, Brussels, 24 and 25 February.
  21. Microsoft (2010), "Privacy by Design at Microsoft", November, Seattle, WA.
  22. Parkin, Joanna (2011), The Intersection between the Schengen Information System and the EU Rule of Law, INEX Policy Brief, CEPS, Brussels, forthcoming.