Filters








117 Hits in 9.9 sec

The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective [chapter]

Els J. Kindt
2010 IFIP Advances in Information and Communication Technology  
The paper presents a review from a legal perspective of these privacy enhancing technologies which are being developed in the 7 th framework EU project TURBINE.  ...  The deployment of biometric systems could have serious life long implications for the privacy and data protection rights of individuals.  ...  See used by the police in the past, but that a database with fingerprints is likely to be used by the police in the future as well, and is to become 'a new instrument of the police', irrespective of  ... 
doi:10.1007/978-3-642-14282-6_11 fatcat:jkgq5o5kofhnbk2ronxntpyxji

Data mining of biometric data: revisiting the concept of private life?

Crystalie Bourcha, Maria Louiza Deftou, AnthiKoskina no
2017 IUS ET SCIENTIA  
of privacy under the European Convention on Human Rights (ECHR) and of the existing EU data protection legislation in securing an adequate legal framework is facing a new ordeal.  ...  This paper seeks to review, especially in the aftermath of the recent Luxembourg Court's case law, whether evolving data mining practices materialize the need of adjusting the legal treatment of biometric  ...  Netherlands Passport law, the biometric data collected for that purpose are also transferred and stored in a decentralized database in order to be further used for national security or judicial purposes  ... 
doi:10.12795/ietscientia.2017.i02.04 fatcat:pot5zsm445dtjakqvha3vb5xva

Ambient Intelligence and the Right to Privacy: The Challenge of Detection Technologies

Shara Monteleone
2011 Social Science Research Network  
The objective of this study is to envisage some of the main legal challenges posed by the new Ambient Intelligence technologies (AmI) and in particular by the new security enforcement technologies for  ...  privacy and data protection.  ...  A solution is particularly recommended in the Opinion in order to promote privacy by design: the promotion of a legal obligation for the producers and users of information system to use systems in accordance  ... 
doi:10.2139/ssrn.1953939 fatcat:pz4egipn35a2piwbynhlci4bsq

Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields

Rene Von Schomberg
2011 Social Science Research Network  
Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007(FP7/ -2013  ...  WE WELCOME the regular use of privacy enhancing and "privacy-by-design" technologies in WBI system design.  ...  will decide on the next steps to take, including whether or not to propose an EU legal framework on the use of Security Scanners at EU airports and the conditions to be included in such a framework to  ... 
doi:10.2139/ssrn.2436399 fatcat:6gveo3yisndd5evuqjgmmn7v7q

OLAF – 20 Years of Protecting the Financial Interests of the EU

Margarete Hofmann, Stanislav Stoykov
2020 eucrim – The European Criminal Law Associations Forum  
The European Public Prosecutor's Office (EPPO) -Past, Present, and Future  ...  The convention strived for enhancing police cooperation between some EU Member States.  ...  The EU-US Privacy Shield is a legal framework that protects the fundamental rights of anyone in the EU whose personal data is transferred to the United States for commercial purposes.  ... 
doi:10.30709/eucrim-2019-024 fatcat:7nbdzd4tbbanzbkshg37ytmy4m

Interpol review of forensic biology and forensic DNA typing 2016-2019

John M. Butler, Sheila Willis
2020 Forensic Science International: Synergy  
This review paper covers the forensic-relevant literature in biological sciences from 2016 to 2019 as a part of the 19th Interpol International Forensic Science Managers Symposium.  ...  The review papers are also available at the Interpol website at: https://www.interpol.int/content/download/14458/file/Interpol%20Review%20Papers%202019.pdf.  ...  In no case does such identification imply a recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that any of the entities identified are necessarily the  ... 
doi:10.1016/j.fsisyn.2019.12.002 pmid:33385135 pmcid:PMC7770417 fatcat:ereve6gbvrawdcenlj54odvrqy

Deliverable D3.7 Consolidated Projects Summary Report

Alasdair Reid, Matias Barberis Rami
2021 Zenodo  
The NGI Trust project aims to support the development of a human- centric Internet, by developing a stronger European ecosystem of researchers, innovators and technology developers in the field of privacy  ...  This report is part of a project that has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No.825618  ...  The baseline system is to be engineered and designed abiding to the principles of privacy by design. During the TRUSTRULES project, research was performed aiming to evaluate the possible  ... 
doi:10.5281/zenodo.5767430 fatcat:w2lxzgxktretjcv7h4xotz7xaq

Lessons Learned Too Well

A. Michael Froomkin
2011 Social Science Research Network  
But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world.  ...  Offering normative and pragmatic arguments for why communicative anonymity is important, this Article argues that anonymity is the bedrock of online freedom, and it must be preserved.  ...  The Strategy envisions an "Identity Ecosystem" described as a system that will enhance privacy and civil liberties: The Identity Ecosystem will use privacy-enhancing technology and policies to inhibit  ... 
doi:10.2139/ssrn.1930017 fatcat:jtlf7mbinfe55pvdwlig7b2k7a

I Spy with my little eye - Full Copy

Matt Bucholski, Konrad Duffy, Caro Gröne, Maxime Hensels, Magdalena König, Christophe Leclerc, Jonas Quicker, Pia Sombetzki, Jasmijn Van der Most, Victor Werner, Jakob Zeijl
2016 MaRBLe  
Secondly, loss of privacy resulting from highly integrated surveillance systems and databases is justified by the idea of abuse of the state's social welfare system by so-called economic migrants.  ...  SIS II 6 has added new functions to the system and has become by far the largest database for public security in the EU (ibid.).  ... 
doi:10.26481/marble.2016.v3.263 fatcat:clgaziapfreg5muff4uyvjck3i

Conclusions and Policy Recommendations [chapter]

Sarah Wolff
2021 The Security Sector Governance–Migration Nexus: Rethinking how Security Sector Governance matters for migrants' rights  
I propose specific recommendations below for the military, police forces, judicial systems and independent oversight bodies.  ...  Better planning and foresight when it comes to migration would be useful from a military perspective.  ...  Going beyond the state-centric understanding of security sector reform (SSR), it provides a comprehensive view of the relationship between SSG/R and migration and makes a series of practical recommendations  ... 
doi:10.5334/bcl.f fatcat:yj6exj332zg6pmo6tfupuytwte

The Hybrid Architecture of the EPPO : From the Commission's Proposal to the Final Act

Alexandre Met-Domestici
2017 eucrim – The European Criminal Law Associations Forum  
(TW) eucrim ID=1703040 Opinion 1/15 has no direct, automatic impact on other legal instruments or proposals (such as the Entry/Exit System, ETIAS, the EU-US Umbrella Agreement, or the EU-US Privacy  ...  The purpose was for all EU countries to benefit from improved judicial and police cooperation through the exchange of information.  ...  of the Union, increase the deterrent effect for potential criminals, and solve the "problems related to different applicable legal systems." 3 The achievement of these objectives is nevertheless being  ... 
doi:10.30709/eucrim-2017-014 fatcat:w5naamxia5f2hpmaa5m27gtxte

The Role of Social Movements, Coalitions, and Workers in Resisting Harmful Artificial Intelligence and Contributing to the Development of Responsible AI [article]

Susan von Struensee
2021 arXiv   pre-print
ethics and values of those heavily investing in and profiting from AI are under global scrutiny.  ...  From indigenous people addressing the lack of reliable data, to smart city stakeholders, to students protesting the academic relationships with sex trafficker and MIT donor Jeffery Epstein, the questionable  ...  and legal perspective.  ... 
arXiv:2107.14052v1 fatcat:etqo64ksjzaihmt4kr7b6auxiu

European Baseline Report On Current Oc/Tn Specifics And Collection Of Sources

Pablo Martín Rodríguez
2017 Zenodo  
states (MS), their increasingly salient position within the political agenda of the EU that has mirrored the establishing of a prolific institutional framework where remarkable synergies between public  ...  In Section 3, the scientific state of the art will be summed up focusing on the different perspectives of analysis and major insights that academic literature has brought to attention and should be taken  ...  From this perspective organised crime denotes a systemic condition' (2008, italics added).  ... 
doi:10.5281/zenodo.1232126 fatcat:7qu2p72ocbbkbghr7q2apzqco4

Final Report on mapping of EU legal framework and intermediaries' practices on copyright content moderation and removal

João Pedro Quintais, Peter Mezei, Istvan Harkai, João Carlos Magalhães, Christian Katzenbach, Sebastian Felix Schwemer, Thomas Riis
2022 Zenodo  
This report describes the results of the research carried out in the context of WP6 on the mapping of the EU legal framework and intermediaries' practices on copyright content moderation and removal.  ...  The nature of the research described in this report is that of a mapping exercise, on which the subsequent evaluative work in WP6 is developed, in particular the deliverables D.6.3 (Final Evaluation and  ...  National Reports Experts (Chapter 4) National Report Denmark, Phase 1 Questionnaire National Legal Mapping ReCreating EU, T. Riis and S.F.  ... 
doi:10.5281/zenodo.6461568 fatcat:zloiuxyemrhanfhvcz7pr3fyci

Social control in sports and the CCTV issue: a critical criminological approach [chapter]

2016 Security and Sport Mega Events  
The aim of this volume is to highlight the complex set of legal provisions, surveillance and policing practices, discourses, bureaucratic procedures and spatial and architectural forms that underpin the  ...  an environment of life where sport events and the multiple activities and interests related to them can be kept safe from any risk and potentially harmful occurrence.  ...  A new data system was created to facilitate this process. Some European countries have developed a similar centralized data management system, for example the Striker database in the UK.  ... 
doi:10.4324/9781315742663-24 fatcat:h7jjuxntwbcz7hdhhczytntsqq
« Previous Showing results 1 — 15 out of 117 results