SlideShare a Scribd company logo
Shall we learn how to protect
our personal data?
An introduction to personal privacy in European context
Dr. Nikolay Yanev
Sofia University St. Kliment Ohridski
Why it matters
• “Google has been fined 50 million euros (about $57 million) by a
French regulator for not properly disclosing to users how their data is
collected and used for targeted advertising.
• The penalty is the biggest yet imposed under a new European privacy
law that went into effect in 2018. The European Union's General Data
Protection Regulation gives Europeans more control over their
information and how companies use it.”
[cnet.com]
US company vs US idea
• Boston lawyers Samuel Warren, Louis Brandeis:
• the individual shall have full protection in person and in property is a
principle … it has been found necessary from time to time to define anew the
exact nature and extent of such protection…
• Recent inventions and business methods call attention to the next step which
must be taken for the protection of the person, and for securing to the
individual what Judge Cooley calls the right "to be let alone". Instantaneous
photographs and newspaper enterprise have invaded the sacred precincts of
private and domestic life; and numerous mechanical devices threaten to
make good the prediction that "what is whispered in the closet shall be
proclaimed from the house-tops.“
[Harvard Law Review, 1890]
XIX century
• In 1837 Samuel Morse constructed the electrical telegraph /the
Morse code/
• In 1839 Louis Daguerre introduced the high-quality photography
(“commercially viable photographic process”)
• In 1876 Alexander Graham Bell signs his patent for the telephone
• In 1877, in Boston, Massachussets, the Bell telephone company is
created (Now American Telephone and Telegraph Company)
From the article to the court
• 1928 Olmstead vs the US:
• Wiretapping of liquor-smuggling ring, headed by Roy Olmstead
• 2 mln $ clandestine annual turnover
• US supreme court decision:
• “The language of the amendment cannot be extended and expanded to include
telephone wires”
• Justice Brandeis: “The makers of our Constitution undertook to secure conditions
favourable to the pursuit of happiness… They conferred, as against the Government,
the right to be let alone — the most comprehensive of rights and the right most
valued by civilized men. To protect that right, every unjustifiable intrusion by the
Government upon the privacy of the individual, whatever the means employed, must
be deemed a violation of the Fourth Amendment.
Total War and totalitarian state
• War efforts
• Militarization
• Securitization
• Political police, state security and secret police services
• Huge databases of personal files (dossiers)
• Individual freedoms sacrificed for public security
The turning tide
• Post-war preoccupation with abuse of personal privacy
• Nov 4, 1950: Convention for the Protection of Human Rights and
Fundamental Freedoms (Council of Europe)
• The European court of human rights is established
• Art. 8: respect of private and family life
• In America, 1967, Katz vs the US. Charles Katz, an illicit gambler won
the case “to be let alone”:
• The Government's eavesdropping activities violated the privacy upon which
petitioner justifiably relied while using the telephone booth;
[US Supreme Court]
The war on terror
• 9/11 2001
• The Foreign Surveillance Act was changed to lower the legal bar for the
government to engage in wiretapping and other surveillance practices
• The Patriot Act (Oct. 26, 2001| allowed for easier and more comprehensive
surveillance of suspects as well as for thorough search of their records.
• Barack Obama, 2013:
we strengthened our defences – hardening targets, tightening transportation
security, and giving law enforcement new tools to prevent terror. Most of these
changes were sound. Some caused inconvenience. But some, like expanded
surveillance, raised difficult questions about the balance we strike between
our interests in security and our values of privacy.
1890: The right to be let alone (Harvard
Law Review)
1928: Olmstead vs the United States
1950: Convention for the protection of
Human Rights and Fundamental Principles
1967: Katz vs the United States
1995: The European Data Protection
Directive (Directive 95/46/EC)
1930-1945: The Totalitarian
Experience
2001: The Patriot Act
2006: Wikileaks starts publishing
documents
2014: Edward Snowden testimony to EU
Parliament
2014-2016-2018:
GDPR is adopted and enters into force
Security
Versus
Privacy
GDPR
• Regulation (EU) 2016/679 of the European Parliament and of the
Council of 27 April 2016 on the protection of natural persons with
regard to the processing of personal data and on the free movement
of such data alias General Data Protection Regulation
• Successor of:
• European Convention on Human rights and fundamental principles (1950)
• Data Protection Directive 1995
Definitions and practices
• What is “personal data” (any information relating to an identified or
identifiable natural person)
• What is “processor” (a natural or legal person, public authority,
agency or other body which processes personal data)
• What is “controller” (agency or other body which, alone or jointly
with others, determines the purposes and means of the processing of
personal data)
• Rights for rectification or erasure (the right to be forgotten)
• Data protection agencies and officers
• Penalties
E-OpenSpace
• Distant, web-based training in the basics of GDPR and data protection
• Free courses for registered users
• Pilot project 2017-2019
http://eopen.cpdp.bg/
• Bulgaria, Poland, Italy, Croatia
• Government agencies, NGOs, Academia
Shall we learn how to protect out personal data? An introduction to personal privacy in European context.
Shall we learn how to protect out personal data? An introduction to personal privacy in European context.
Further steps
• Bug reporting and system optimization
• Content development
• Mass on-line training
• Video lectures
You can contact me at:
n_yanev@yahoo.com

More Related Content

PPTX
Legal constraints in media
PPTX
Race powerpoint
PPTX
Law acts
PPTX
Legal constraints in media
PPTX
Legal constraints in media
PPTX
Laws & Acts relating to the Media Industry
PPTX
Legal constraints in media
PPTX
Legislation in the creative media industry
Legal constraints in media
Race powerpoint
Law acts
Legal constraints in media
Legal constraints in media
Laws & Acts relating to the Media Industry
Legal constraints in media
Legislation in the creative media industry

What's hot (19)

PPTX
Legal constraints in media
PPTX
Freedom of Information Act
PPTX
Laws and regulations
DOCX
PPTX
PPT
Freedom of Information
DOCX
Legal and ethical constraints in the creative media sector
PPTX
Privacy implications of using drones under current Australian law
PPTX
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
PPTX
Licensing act 2003
PPTX
Licensing act 2003
PPTX
Legislation in the creative media industry
PPTX
Externship ihr presentation
PPTX
Legal Constraints In Media
PPTX
Laws
PPTX
MEDIA LAWS AND ETHICS
PPTX
Legislation in the Creative Media Industry
PPTX
Joes work on rights
PPTX
Laws & acts relating to the media industry
Legal constraints in media
Freedom of Information Act
Laws and regulations
Freedom of Information
Legal and ethical constraints in the creative media sector
Privacy implications of using drones under current Australian law
Is open, co-created, hyperlocal democracy really democratic? - a #Notwestmins...
Licensing act 2003
Licensing act 2003
Legislation in the creative media industry
Externship ihr presentation
Legal Constraints In Media
Laws
MEDIA LAWS AND ETHICS
Legislation in the Creative Media Industry
Joes work on rights
Laws & acts relating to the media industry
Ad

Similar to Shall we learn how to protect out personal data? An introduction to personal privacy in European context. (20)

ODP
Privacy; Past, Present and Future
PDF
Privacy in the Virtually Legal Context
PPT
ethcpp04-Unit 3.ppt
PPTX
Revision Data Protection Act ( Eduardo And Salvador)
PPT
ethcpp04-Unit 3.ppt
PPT
Privacy in a Human Rights and Social Justice Context
DOCX
Surveillance Coursework (COMPLETED-2
PDF
Privacy Law In A Nutshell 2nd Ed John Soma Stephen Rynerson
PPTX
Lesson4-Privacy and Data Protection.pptx
PDF
Perspectives On Privacy Increasing Regulation In The Usa Canada Australia And...
PDF
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
PDF
Privacy and Surveillance
PDF
The Right To Privacy In The Light Of Media Convergence Perspectives From Thre...
PPSX
How Will Privacy Regulation Impact Your Business in 2012
PPT
Online digital privacy (final)
PPTX
Keeping our secrets? Shaping Internet technologies for the public good
PPT
NYCLA Privacy CLE_october_1_2014_presentation
PDF
The Right To Be Forgotten 2nd Edition Paul Lambert
PDF
Ethics in Technology - Privacy
PPT
Chapter2
Privacy; Past, Present and Future
Privacy in the Virtually Legal Context
ethcpp04-Unit 3.ppt
Revision Data Protection Act ( Eduardo And Salvador)
ethcpp04-Unit 3.ppt
Privacy in a Human Rights and Social Justice Context
Surveillance Coursework (COMPLETED-2
Privacy Law In A Nutshell 2nd Ed John Soma Stephen Rynerson
Lesson4-Privacy and Data Protection.pptx
Perspectives On Privacy Increasing Regulation In The Usa Canada Australia And...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Privacy and Surveillance
The Right To Privacy In The Light Of Media Convergence Perspectives From Thre...
How Will Privacy Regulation Impact Your Business in 2012
Online digital privacy (final)
Keeping our secrets? Shaping Internet technologies for the public good
NYCLA Privacy CLE_october_1_2014_presentation
The Right To Be Forgotten 2nd Edition Paul Lambert
Ethics in Technology - Privacy
Chapter2
Ad

More from NikoYanev (20)

PDF
Структурните фондове на ЕС - кратък курс (ІІ част)
PPTX
Структурните фондове на ЕС - Занятие 8
PPTX
Структурните фондове на ЕС - Занятие 7
PPTX
Структурните фондове на ЕС - Занятие 6
PPTX
Структурните фондове на ЕС - Занятие 5
PPTX
Структурните фондове на ЕС - Занятие 4
PPTX
Структурните фондове на ЕС - 2016 - Занятие 3
PPTX
Структурните фондове на ЕС - 2016 - Занятие 2
PPTX
Структурните фондове на ЕС - 2016 - занятие 1
PDF
Въведение в проекта #5: Възможности за финансиране
PDF
Въведение в проекта #4: Изпълнение, управление и отчитане
PDF
Въведение в проекта #3: Ресурси и бюджет
PDF
Въведение в проекта #2: Планиране - проблем, дейност, време
PDF
Въведение в проекта #1: Проектът - история и значение
PPTX
#8 Занятие: Защита на финансовите интереси на ЕС
PPTX
#6 Занятие: Управление на проекта - изпълнение и отчитане
PPTX
#5 Занятие: Кандидатстването - ресурси и бюджет
PPTX
#7 Занятие: Управление на оперативните програми
PPTX
#4 Занятие: Кандидатстване I - проект и формуляр
PPTX
#3 Занятие: Оперативните програми - инвестиции в хората
Структурните фондове на ЕС - кратък курс (ІІ част)
Структурните фондове на ЕС - Занятие 8
Структурните фондове на ЕС - Занятие 7
Структурните фондове на ЕС - Занятие 6
Структурните фондове на ЕС - Занятие 5
Структурните фондове на ЕС - Занятие 4
Структурните фондове на ЕС - 2016 - Занятие 3
Структурните фондове на ЕС - 2016 - Занятие 2
Структурните фондове на ЕС - 2016 - занятие 1
Въведение в проекта #5: Възможности за финансиране
Въведение в проекта #4: Изпълнение, управление и отчитане
Въведение в проекта #3: Ресурси и бюджет
Въведение в проекта #2: Планиране - проблем, дейност, време
Въведение в проекта #1: Проектът - история и значение
#8 Занятие: Защита на финансовите интереси на ЕС
#6 Занятие: Управление на проекта - изпълнение и отчитане
#5 Занятие: Кандидатстването - ресурси и бюджет
#7 Занятие: Управление на оперативните програми
#4 Занятие: Кандидатстване I - проект и формуляр
#3 Занятие: Оперативните програми - инвестиции в хората

Recently uploaded (20)

PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
My India Quiz Book_20210205121199924.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
HVAC Specification 2024 according to central public works department
PDF
Trump Administration's workforce development strategy
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
advance database management system book.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
What if we spent less time fighting change, and more time building what’s rig...
My India Quiz Book_20210205121199924.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
HVAC Specification 2024 according to central public works department
Trump Administration's workforce development strategy
IGGE1 Understanding the Self1234567891011
Introduction to pro and eukaryotes and differences.pptx
advance database management system book.pdf
Computer Architecture Input Output Memory.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Weekly quiz Compilation Jan -July 25.pdf
History, Philosophy and sociology of education (1).pptx
Virtual and Augmented Reality in Current Scenario
Share_Module_2_Power_conflict_and_negotiation.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf

Shall we learn how to protect out personal data? An introduction to personal privacy in European context.

  • 1. Shall we learn how to protect our personal data? An introduction to personal privacy in European context Dr. Nikolay Yanev Sofia University St. Kliment Ohridski
  • 2. Why it matters • “Google has been fined 50 million euros (about $57 million) by a French regulator for not properly disclosing to users how their data is collected and used for targeted advertising. • The penalty is the biggest yet imposed under a new European privacy law that went into effect in 2018. The European Union's General Data Protection Regulation gives Europeans more control over their information and how companies use it.” [cnet.com]
  • 3. US company vs US idea • Boston lawyers Samuel Warren, Louis Brandeis: • the individual shall have full protection in person and in property is a principle … it has been found necessary from time to time to define anew the exact nature and extent of such protection… • Recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right "to be let alone". Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops.“ [Harvard Law Review, 1890]
  • 4. XIX century • In 1837 Samuel Morse constructed the electrical telegraph /the Morse code/ • In 1839 Louis Daguerre introduced the high-quality photography (“commercially viable photographic process”) • In 1876 Alexander Graham Bell signs his patent for the telephone • In 1877, in Boston, Massachussets, the Bell telephone company is created (Now American Telephone and Telegraph Company)
  • 5. From the article to the court • 1928 Olmstead vs the US: • Wiretapping of liquor-smuggling ring, headed by Roy Olmstead • 2 mln $ clandestine annual turnover • US supreme court decision: • “The language of the amendment cannot be extended and expanded to include telephone wires” • Justice Brandeis: “The makers of our Constitution undertook to secure conditions favourable to the pursuit of happiness… They conferred, as against the Government, the right to be let alone — the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.
  • 6. Total War and totalitarian state • War efforts • Militarization • Securitization • Political police, state security and secret police services • Huge databases of personal files (dossiers) • Individual freedoms sacrificed for public security
  • 7. The turning tide • Post-war preoccupation with abuse of personal privacy • Nov 4, 1950: Convention for the Protection of Human Rights and Fundamental Freedoms (Council of Europe) • The European court of human rights is established • Art. 8: respect of private and family life • In America, 1967, Katz vs the US. Charles Katz, an illicit gambler won the case “to be let alone”: • The Government's eavesdropping activities violated the privacy upon which petitioner justifiably relied while using the telephone booth; [US Supreme Court]
  • 8. The war on terror • 9/11 2001 • The Foreign Surveillance Act was changed to lower the legal bar for the government to engage in wiretapping and other surveillance practices • The Patriot Act (Oct. 26, 2001| allowed for easier and more comprehensive surveillance of suspects as well as for thorough search of their records. • Barack Obama, 2013: we strengthened our defences – hardening targets, tightening transportation security, and giving law enforcement new tools to prevent terror. Most of these changes were sound. Some caused inconvenience. But some, like expanded surveillance, raised difficult questions about the balance we strike between our interests in security and our values of privacy.
  • 9. 1890: The right to be let alone (Harvard Law Review) 1928: Olmstead vs the United States 1950: Convention for the protection of Human Rights and Fundamental Principles 1967: Katz vs the United States 1995: The European Data Protection Directive (Directive 95/46/EC) 1930-1945: The Totalitarian Experience 2001: The Patriot Act 2006: Wikileaks starts publishing documents 2014: Edward Snowden testimony to EU Parliament 2014-2016-2018: GDPR is adopted and enters into force Security Versus Privacy
  • 10. GDPR • Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data alias General Data Protection Regulation • Successor of: • European Convention on Human rights and fundamental principles (1950) • Data Protection Directive 1995
  • 11. Definitions and practices • What is “personal data” (any information relating to an identified or identifiable natural person) • What is “processor” (a natural or legal person, public authority, agency or other body which processes personal data) • What is “controller” (agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data) • Rights for rectification or erasure (the right to be forgotten) • Data protection agencies and officers • Penalties
  • 12. E-OpenSpace • Distant, web-based training in the basics of GDPR and data protection • Free courses for registered users • Pilot project 2017-2019 http://eopen.cpdp.bg/ • Bulgaria, Poland, Italy, Croatia • Government agencies, NGOs, Academia
  • 15. Further steps • Bug reporting and system optimization • Content development • Mass on-line training • Video lectures
  • 16. You can contact me at: n_yanev@yahoo.com