Enforcing privacy : regulatory, legal and technological approaches /

"If regulators do not enforce laws or regulations or codes or do not have the resources, political support or wherewithal to enforce them, they effectively eviscerate and make meaningless such laws or regulations or codes, no matter how laudable or well-intentioned. In some cases, however, the...

Full description

Saved in:
Bibliographic Details
Other Authors: Wright, David, 1948 December 10-, Hert, Paul de
Format: Book
Language:English
Published: Switzerland : Springer, [2016]
Series:Law, governance and technology series ; v. 25
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Introduction to enforcing privacy
  • Enforcing privacy
  • Failures of privacy self-regulation in the United States
  • From a model pupil to a problematic grown-up : enforcing privacy and data protection in Hungary
  • A tale of two privacies : enforcing privacy with hard power and soft power in Japan
  • The Spanish experience of enforcing privacy norms : two decades of evolution from sticks to carrots
  • Data protection and enforcement in Latin America and in Uruguay
  • The International Working Group on Data Protection in Telecommunications : contributions to transnational privacy enforcement
  • Enforcing privacy across different jurisdictions
  • Cross-border breach notification
  • Responsive regulation of data privacy : theory and Asian examples
  • Enforcement and reform of the EU-US Safe Harbor Agreement
  • How effective are fines in enforcing privacy?
  • Enforcing privacy rights : class action litigation and the challenge of cy pres
  • Data protection certification : decorative or effective instrument? Audit and seals as a way to enforce privacy
  • The co-existence of administrative and criminal law approaches to data protection wrongs
  • Whom to trust? Using technology to enforce privacy
  • Irish DPA and its approach to data protection
  • Getting our act together : European Data Protection Authorities face up to Silicon Valley
  • Regaining control and sovereignty in the digital age
  • Privacy enforcement in search of its base