𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Data Security Breaches and Privacy in Europe

✍ Scribed by Rebecca Wong (auth.)


Publisher
Springer-Verlag London
Year
2013
Tongue
English
Leaves
59
Series
SpringerBriefs in Cybersecurity
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.

✦ Table of Contents


Front Matter....Pages i-vii
Introduction....Pages 1-2
Data Protection Directive 95/46/EC....Pages 3-8
The Amended Directive on Privacy and Electronic Communications....Pages 9-16
Article 29 Working Party: Future of Privacy....Pages 17-21
European Commission Communication Opinion 2010....Pages 23-24
Proposed Data Protection Regulation 2012: Data Security Breach Notifications....Pages 25-29
Framework Decision 2005/222/JHA and the Directive Against Information Systems....Pages 31-34
European Data Protection Supervisor’s Opinion on Cybersecurity....Pages 35-37
Cybersecurity Directive 2013....Pages 39-42
Criticism of the Cybersecurity Directive....Pages 43-48
Concluding Remarks....Pages 49-50
Back Matter....Pages 51-54

✦ Subjects


Computers and Society; International IT and Media Law, Intellectual Property Law; Criminology & Criminal Justice


πŸ“œ SIMILAR VOLUMES


Practical Data Privacy: Enhancing Privac
✍ Katharine Jarmul πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under

Practical Data Privacy: Enhancing Privac
✍ Katharine Jarmul πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under

Data Privacy and Security
✍ David Salomon (auth.) πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag New York 🌐 English

<p><P>Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the

Privacy and Security Policies in Big Dat
✍ Sharvari Tamane, Vijender Kumar Solanki πŸ“‚ Library πŸ“… 2017 πŸ› IGI Global 🌐 English

In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference sour

Privacy, Data Protection and Cybersecuri
✍ Wolf J. SchΓΌnemann, Max-Otto Baumann (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p>This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions regarding privacy and cyber security, and examines socio-polit