Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Free access

In privacy law, it's the U.S. vs. the world

Published: 25 January 2016 Publication History

Abstract

Snowden revelations force changes, but Facebook (and others) resist.

References

[1]
Rich, C.: "Privacy Laws in Africa and the Middle East" (et sim.), Bloomberg BNA Privacy and Security Law Report, http://www.mofo.com/people/r/rich-cynthia-j?tabs=publications
[2]
Belgian Privacy Commission, "On 13 May the Belgian Privacy Commission adopted a first recommendation of principle on Facebook", http://www.privacycommission.be/en/news/13-may-belgian-privacycommission-adopted-first-recommendationprinciple-facebook (Unofficial English translation, 2015)
[3]
Belgian Official Journal, "Act of 8 December 1992 on the protection of privacy in relation to the processing of personal data," http://www.privacycommission.be/sites/privacycommission/files/documents/Privacy_Act_1992.pdf (Unofficial Englishtranslation, 2014)
[4]
European Commission "Protection of Personal Data" website, http://ec.europa.eu/justice/data-protection/index_en.htm (English version)
[5]
European Commission, "Reform of the data protection legal framework in the EU," http://ec.europa.eu/justice/data-protection/reform/index_en.htm
[6]
European Commission, "Factsheet on the 'Right to be Forgotten' Ruling (C-131/12)", 3 June 2014, http://ec.europa.eu/justice/newsroom/data-protection/news/140602_en.htm.
[7]
U.S. Government (multiple agencies), "Welcome to the U.S.-EU & U.S.-Swiss Safe Harbor Frameworks," http://www.export.gov/safeharbor/
[8]
Schrems, Max "Europe versus Facebook," http://europe-v-facebook.org
[9]
DLA Piper, "Data Protection Laws of the World," http://dlapiperdataprotection.com

Cited By

View all
  • (2024)State-of-the-art Review on Intelligent Computing-based Privacy Preservation Technologies for Power Internet of ThingsProceedings of the 2024 6th International Conference on Big Data Engineering10.1145/3688574.3688582(54-59)Online publication date: 24-Jul-2024
  • (2022)Traditional written media coverage and cybersecurity events: the NSA caseOpinião Pública10.1590/1807-0191202228126828:1(268-291)Online publication date: Mar-2022
  • (2021)Pre-adolescents’ digital competences in the area of safety. Does frequency of social media use mean safer and more knowledgeable digital usage?Education and Information Technologies10.1007/s10639-020-10302-426:1(1043-1067)Online publication date: 1-Jan-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 59, Issue 2
February 2016
110 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2886013
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 January 2016
Published in CACM Volume 59, Issue 2

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Pre-selected

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)83
  • Downloads (Last 6 weeks)7
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)State-of-the-art Review on Intelligent Computing-based Privacy Preservation Technologies for Power Internet of ThingsProceedings of the 2024 6th International Conference on Big Data Engineering10.1145/3688574.3688582(54-59)Online publication date: 24-Jul-2024
  • (2022)Traditional written media coverage and cybersecurity events: the NSA caseOpinião Pública10.1590/1807-0191202228126828:1(268-291)Online publication date: Mar-2022
  • (2021)Pre-adolescents’ digital competences in the area of safety. Does frequency of social media use mean safer and more knowledgeable digital usage?Education and Information Technologies10.1007/s10639-020-10302-426:1(1043-1067)Online publication date: 1-Jan-2021
  • (2019)Why do data users say healthcare data is difficult to utilize? A cross-sectional survey study (Preprint)Journal of Medical Internet Research10.2196/14126Online publication date: 28-Mar-2019
  • (2019)International Biomedical Laws in the Field of Genetic InterventionsComparative Legal Frameworks for Pre-Implantation Embryonic Genetic Interventions10.1007/978-3-030-22308-3_5(175-212)Online publication date: 2-Aug-2019
  • (2017)A Methodology for Privacy-Aware IoT-Forensics2017 IEEE Trustcom/BigDataSE/ICESS10.1109/Trustcom/BigDataSE/ICESS.2017.293(626-633)Online publication date: Aug-2017

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media