Delegation for Privacy Management from Womb to Tomb - A European Perspective

被引:0
作者
Hansen, Marit [1 ]
Raguse, Maren [2 ]
Storf, Katalin [1 ]
Zwingelberg, Harald [1 ]
机构
[1] Unabhangiges Landeszentrum Datenschutz Schleswig, Holstenstr 98, D-24103 Kiel, Germany
[2] Ministerium Arbeit, Soziales & Gesundheit Schleswig Holstein, G-24146 Kiel, Germany
来源
PRIVACY AND IDENTITY MANAGEMENT FOR LIFE | 2010年 / 320卷
关键词
lifelong privacy; user-controlled identity management; delegation of privacy; incapability to exercise rights; privacy by delegate;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our information society with processing of personal data in almost all areas of life, the legally granted right to privacy is quite hard to preserve. User-controlled identity management systems have been proposed as a means to manage one's own private sphere. Still there is no functioning concept how privacy protection can be effectively safeguarded over a long time period and how self-determination in the field of privacy can be maintained in all stages of life from the womb to the tomb. When user control and the capability to exercise rights can not yet or no longer be carried out by the data subject herself, the decisions concerning the processing of personal data may have to be delegated to a delegate. In this text, we elaborate on delegation of privacy-relevant actions under a lifelong perspective and point out possible legal, technological, and organizational measures to appropriately take up the arising challenges. For crucial gaps in current concepts we sketch solutions and explain implications on user-controlled identity management systems. Finally we give recommendations to stakeholders such as data controllers, application designers and policy makers.
引用
收藏
页码:18 / +
页数:3
相关论文
共 17 条
[1]  
Alrodhan W., 2008, P 3 C ADV COMP SEC F, P67
[2]  
[Anonymous], 31 INT C DAT PROT PR
[3]  
[Anonymous], 2009, GEN GUIDELINES SPECI
[4]  
[Anonymous], 2009, 163 DAT PROT WORK PA
[5]  
Clauss S., 2009, P ECHALLENGES 2009
[6]  
Crispo B, 1999, LECT NOTES COMPUT SC, V1550, P118
[7]  
Gomi H., 2005, Proceedings of the Workshop on Digital Identity Management (Fairfax, VA, USA, November 11-11, 2005) DIM '05 ACM, New York, NY, P94
[8]  
Hansen M., 2008, 13 INF SEC, V13, P83
[9]  
Hansen M, 2007, INFORM COMM TECH KNO, V4, P1360
[10]  
Leenes R., 2006, ID RELATED CRIME COM