The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data [Book Review]
David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 1 (4):283-293 (1999)
The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in the Directive, whichare, arguably, among the central problems pertaining to theprotection of individual rights in the information society. Inthe third part of the paper, some suggestions are made for a richerphilosophical theory of data protection and privacy. It is arguedthat this account is better suited to the task of characterizingthe central issues raised by the Directive.
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Kirsten E. Martin (2012). Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract. Journal of Business Ethics 111 (4):519-539.
Similar books and articles
David Lyon (2001). Facing the Future: Seeking Ethics for Everyday Surveillance. [REVIEW] Ethics and Information Technology 3 (3):171-180.
James R. Maxeiner, Business Information and 'Personal Data': Some Common Law Observations About the Draft EU Data Protection Directive.
Gloria González Fuster (2010). Inaccuracy as a Privacy-Enhancing Tool. Ethics and Information Technology 12 (1):87-95.
Laura B. Pincus & Roger Johns (1997). Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for Their Comparative Evaluation. [REVIEW] Journal of Business Ethics 16 (12-13):1237-1260.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Estelle Derclaye, The European Court of Justice Interprets the Database Sui Generis Right for the First Time.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Alexander Dix (2010). Built-in Privacy—No Panacea, but a Necessary Condition for Effective Privacy Protection. Identity in the Information Society 3 (2):257-265.
David L. Wiesenthal & Neil I. Wiener (1996). Privacy and the Human Genome Project. Ethics and Behavior 6 (3):189 – 202.
Added to index2009-01-28
Total downloads8 ( #176,689 of 1,099,863 )
Recent downloads (6 months)2 ( #189,854 of 1,099,863 )
How can I increase my downloads?