Lecture presentation by Lee Bygrave

advertisement
Erasmus course: Privacy, data protection and lex informatica
Lecture Overview, Spring 2004
3 February
Introduction to course. Trends in surveillance and
control.
- Lee Bygrave
[Required reading: Bygrave, “Systems of Mass
Surveillance and Control”, in Bygrave, Data
Protection Law: Approaching Its Rationale, Logic
and Limits (2002), chapter 6, section 6.2.2]
10 February
Catalysts for emergence of data protection law.
 Technological-organisational developments;
 Public fears;
 Economic factors;
 Legal factors.
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapter 6, sections 6.2–6.4]
17 February
Data protection law in context: its interrelationship
with
 Human rights;
 Administrative law;
 Other legal fields.
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapter 6, section 6.4.1; Bygrave, “Data
Protection Pursuant to the Right to Privacy in
Human Rights Treaties”, International Journal of
Law & Information Technology (1998), volume 6,
pp. 247–284; Bygrave & Aarø, “Privacy,
Personality and Publicity – An Overview of
Norwegian Law”, in Henry (ed.), International
Privacy, Publicity and Personality Laws (2001), pp.
333–346]
[Relevant regulatory instruments: European
Convention on Human Rights (1950), especially
Article 8; International Covenant on Civil and
Political Rights (1967), especially Article 17]
24 February
Regulatory logic of data protection law.
 Field of application
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapters 2, 7]
[Relevant regulatory instruments: Council of
Europe’s Convention on data protection (1981); EC
Directive on data protection (1995); EC Directive
on telecommunications privacy (1997); EC
Directive on privacy and electronic communications
(2002); Norway’s Personal Data Act (2000);
OECD’s Guidelines on data protection (1980);
UN’s Guidelines on data protection (1990)]
2 March
Regulatory logic of data protection law – continued.
 Core principles
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapter 3, 18–19; Bing, “Data Protection in
a Time of Changes”, in Altes, Dommering,
Hugenholtz & Kabel (ed.s), Information Law
Towards the 21st Century (1992), pp. 247–259]
[Relevant regulatory instruments: as for lecture on
24 February]
9 March
Regulatory logic of data protection law – continued.
 Core principles (cont’d)
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapters 18–19; Bing, “Data Protection in a
Time of Changes”, in Altes, Dommering,
Hugenholtz & Kabel (ed.s), Information Law
Towards the 21st Century (1992), pp. 247–259]
[Relevant regulatory instruments: as for lecture on
24 February]
16 March
Regulatory logic of data protection law – continued.
 Oversight and enforcement
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapter 4, pp. 70–79]
[Relevant regulatory instruments: as for lecture on
24 February]
19 March
Inter-legal aspects of data protection law.
 Regulation of transborder data flow;
 Issues of jurisdiction and applicable law.
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), pp. 79–83, 223–228; Bygrave,
“Determining Applicable Law pursuant to European
Data Protection Legislation”, Computer Law &
Security Report (2000), volume 16, pp. 252–257;
alternatively Bing, “Data protection, jurisdiction
and the choice of law”, Privacy Law & Policy
Reporter (1999), volume 6, pp. 92–98]
[Relevant regulatory instruments: EC Directive on
data protection (1995), Arts 1, 4, 25 & 26; “Safe
Harbor” decision of 2000]]
23 March
Cryptography and other privacy-enhancing
technologies
 Interests at stake
 Legal framework
- Thomas Olsen
[Required reading: Burkert, “Privacy-Enhancing
Technologies: Typology, Critique, Vision”, in Agre
& Rotenberg (ed.s), Technology and Privacy: The
New Landscape (1997), pp. 125–142; OECD,
Report on Background and Issues of Cryptography
Policy (1997)]
[Relevant regulatory instruments: Germany’s
Teleservices Data Protection Act (1997); OECD’s
Guidelines for Cryptography Policy (1997); Council
of Europe’s Convention on Cybercrime (2001)]
26 March
Cross-national surveillance: Schengen and related
systems.
 Police cooperation across borders;
 Internal and external border control;
 Schengen Information System and data
protection.
- Stephen Karanja
[Required reading: Karanja, “The Schengen Cooperation: Consequences for the Rights of EU
Citizens”, Mennesker og rettigheter (2000), volume
18, pp. 215–222]
30 March
Data protection and decision-making processes.
 Data protection laws as ensuring fairness and
transparency of decision-making processes.
 Labour division changes with respect to case
processing
- Dag Wiese Schartum
[Required reading: Schartum, “Dirt in the
Machinery of Government? Legal Challenges
Connected to Computerized Case-Processing in
Public Administration”, International Journal of
Law & Information Technology (1995), volume 2,
pp. 327–354; Schartum, “Access to GovernmentHeld Information: Challenges and Possibilities”,
Journal of Information, Law & Technology (1998),
issue 1; Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapter 18, section 18.3.1]
[Relevant regulatory instrument: EC Directive on
data protection (1995), especially Arts 6, 10–12, 15]
2 April
Lex informatica and cyberspace.
 Emergence and particular regulatory challenges
of cyberspace
 Role of information systems architecture in
regulating transactional behaviour in cyberspace
- Jon Bing & Lee Bygrave
[Required reading: Clarke et al, “A Primer on
Internet Technology” (1998); Reidenberg, “Lex
Informatica: The Formulation of Information Policy
Rules Through Technology”, Texas Law Review
(1998), volume 76, pp. 553ff; Lessig, Code and
Other Laws of Cyberspace (New York: Basic
Books, 1999), chapter 11; Lessig, “The Law of the
Horse: What Cyberlaw might Teach”, Harvard Law
Review, 1999, volume 113, pp. 501ff]
16 April
Lex informatica and cyberspace – continued.
- Jon Bing & Lee Bygrave
[Required reading: Greenleaf, “An Endnote on
Regulating Cyberspace: Architecture vs Law?”,
University of New South Wales Law Journal (1998),
volume 21, number 2; Rotenberg, “Fair Information
Practices and the Architecture of Privacy (What Larry
Doesn’t Get)”, Stanford Technology Law Review
(2001)]
20 April
Summing up of course.
- Lee Bygrave
[Required reading: Bygrave, Data Protection Law:
Approaching Its Rationale, Logic and Limits
(2002), chapters 5, 8; Bing, “Data Protection in a
Time of Changes”, in Altes, Dommering,
Hugenholtz & Kabel (ed.s), Information Law
Towards the 21st Century (1992), pp. 247–259]
Download