Abstract
This chapter introduces the book. It delineates what is meant by enforcing privacy. It makes the point that enforcement can contribute to the legitimacy of privacy rules. Regulators endowed with legitimate authority to define and impose norms can easily lose that authority if they have no effective way of enforcing these rules. We argue that regulators and privacy advocates should not circumscribe privacy to equate with only data protection. Other types of privacy deserve protection and enforcement too. While this book is primarily concerned with data protection, many of the measures discussed in these pages are applicable to the enforcement of all types of privacy. Enforcement typically means the activity of a regulator to ensure that third parties comply with a law or regulation or code. But we and our co-authors view privacy enforcement as an activity that goes beyond regulatory enforcement. Privacy advocates and members of the public play or can play an important role in enforcing privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Linkomies, Laura, and Stewart Dresner, “Multinationals face increasing pressure from DPAs. A Belgian court supported the Belgian DPA’s record breaking 250,000 Euros per day fine on Facebook”, Privacy Laws & Business, Issue 138, 2015, pp. 1–4.
- 2.
See Cadiot, Sarah, and Laura De Boel, “Safe Harbor invalid: What to expect after the ruling?”, Privacy Laws & Business, Issue 137, 2015, pp. 1, 3.
- 3.
See Soós, Andrea Klára, “ECJ clarifies meaning of territorial scope in DP Directive”, Privacy Laws & Business, Issue 137, 2015, pp. 1, 5.
- 4.
For an overview of recent proposals for modernising information privacy law in the USA, the European Union, Australia and New Zealand, see Gunasekara, Gehan, “Paddling in unison or just paddling? International trends in reforming information privacy law”, International Journal of Law and Information Technology, 2013, pp. 1–37. Also, on the matter of accountability in Australia, the United States (e.g., Title V, Gramm-Leach-Bliley Act of 1999) and Canada (e.g., Sch. 1, Principle 1, Personal Information Protection and Electronic Documents Act (PIPEDA ), 2000), see Crompton, Malcolm, Christine Cowper and Christopher Jefferis, “The Australian Dodo Case: An Insight for Data Protection Regulation ”, BNA World Data Protection Report, Vol. 9, No. 1, 2009, pp. 5–8.
- 5.
Morgan, Bronwen, and Karen Yeung, An introduction to Law and Regulation , Cambridge University Press, 2007, p. 10.
- 6.
Reed, Chris, “Cloud Governance: The Way Forward” in Christopher Millard (ed.), Cloud Computing Law, Oxford University Press, 2013, p. 374.
- 7.
See De Hert, Paul and Vagelis Papakonstantinou, “The EDPS as a Unique Stakeholder in the European Data Protection Landscape, Fulfilling the Explicit and Non-explicit Expectations”, in Hielke Hijmans and Herke Kranenborg (eds.), Data Protection Anno 2014: How to Restore Trust ? Contributions in honour of Peter Hustinx , European Data Protection Supervisor (2004–2014), Intersentia, 2014, pp. 237–252. See also “EDPS aims to be proactive and focus on external relations”, Privacy Laws & Business, Issue 133, 2015, pp. 1–4.
- 8.
Gellert, Raphaël, and Serge Gutwirth, “The legal construction of privacy and data protection”, Computer Law & Security Review, Vol. 29, 2013, pp. 522–530; González Fuster, Gloria, The Emergence of Personal Data Protection as a Fundamental Right of the EU, Springer, 2014; Lynskey, Orla, “Deconstructing Data Protection: The ‘Added- Value’ of a Right to Data Protection in the EU Legal Order”, International and Comparative Law Quarterly, Vol. 63, 2014, pp. 569–597.
- 9.
Kuner, Chris, Fred H. Cate, Christopher Millard and Dan J. B. Svantesson, “Taking Stock after Four Years”, International Data Privacy Law, Vol. 4, No. 2, 2014, pp. 87–88. See also Zalnieriute, Monika, “An international constitutional moment for data privacy in the times of mass-surveillance ”, International Journal of Law and Information Technology, Vol. 23, 2015, pp. 99–133.
- 10.
Clarke , Roger, “What’s “Privacy”?.” Version of 7 August 2006. http://www.rogerclarke.com/DV/Privacy.html. Finn, Rachel, David Wright and Michael Friedewald, “Seven Types of Privacy ”, in Serge Gutwirth, Yves Poullet et al. (eds.), European data protection: coming of age?, Springer, Dordrecht, 2013.
- 11.
Wright, David, and Paul De Hert (eds.), Privacy Impact Assessment , Springer, Dordrecht, 2012.
- 12.
Reed, Chris, “Cloud Governance: The Way Forward”, in Christopher Millard (ed.), Cloud Computing Law, Oxford University Press, 2013, p. 362.
- 13.
“The most obvious reason why this should be so is that the Internet is global in reach, and thus cuts across the hierarchical structures of national law.” Reed, ibid., p. 365.
- 14.
Ibid., p. 374.
- 15.
Ibid.
- 16.
Morgan and Yeung, op. cit., p. 101.
References
Clarke, Roger, “What’s “Privacy”?.” Version of 7 August 2006. http://www.rogerclarke.com/DV/Privacy.html.
Crompton, Malcolm, Christine Cowper and Christopher Jefferis, “The Australian Dodo Case: An Insight for Data Protection Regulation”, BNA World Data Protection Report, Vol. 9, No. 1, 2009, pp. 5–8.
De Hert, Paul, and Vagelis Papakonstantinou, “The EDPS as a Unique Stakeholder in the European Data Protection Landscape, Fulfilling the Explicit and Non-explicit Expectations”, in Hielke Hijmans and Herke Kranenborg (eds.), Data Protection Anno 2014: How to Restore Trust? Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004–2014), Intersentia, 2014, pp. 237–252.
Finn, Rachel, David Wright and Michael Friedewald, “Seven Types of Privacy”, in Serge Gutwirth, Yves Poullet et al. (eds.), European data protection: coming of age?, Springer, Dordrecht, 2013.
Gellert, Raphaël, and Serge Gutwirth, “The legal construction of privacy and data protection”, Computer Law & Security Review, Vol. 29, 2013, pp. 522–530.
González Fuster, Gloria, The Emergence of Personal Data Protection as a Fundamental Right of the EU, Springer, 2014.
Gunasekara, Gehan, “Paddling in unison or just paddling? International trends in reforming information privacy law”, International Journal of Law and Information Technology, 2013, pp. 1–37.
Hijmans, Hielke, and Herke Kranenborg (eds.), Data Protection Anno 2014: How to Restore Trust? Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004–2014), Intersentia, 2014, pp. 237–252.
Kuner, Chris, Fred H. Cate, Christopher Millard, and Dan J. B. Svantesson, “Taking Stock after Four Years”, International Data Privacy Law, Vol. 4, No. 2, 2014, pp. 87–88.
Lynskey, Orla, “Deconstructing Data Protection: The ‘Added- Value’ of a Right to Data Protection in the EU Legal Order”, International and Comparative Law Quarterly, Vol. 63, 2014, pp. 569–597.
Privacy Laws & Business, “EDPS aims to be proactive and focus on external relations”, Issue 133, 2015, pp. 1–4.
Reed, Chris, “Cloud Governance: The Way Forward”, in Christopher Millard (ed.), Cloud Computing Law, Oxford University Press, 2013.
Wright, David, and Paul De Hert (eds.), Privacy Impact Assessment, Springer, Dordrecht, 2012.
Zalnieriute, Monika, “An international constitutional moment for data privacy in the times of mass-surveillance”, International Journal of Law and Information Technology, Vol. 23, 2015, pp. 99–133.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wright, D., De Hert, P. (2016). Introduction to Enforcing Privacy. In: Wright, D., De Hert, P. (eds) Enforcing Privacy. Law, Governance and Technology Series(), vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-25047-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-25047-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25045-8
Online ISBN: 978-3-319-25047-2
eBook Packages: Law and CriminologyLaw and Criminology (R0)