Rage against the machine: does machine-to-machine communication fall within the scope of the confidentiality principle?

被引:0
作者
Storms, Stijn [1 ]
Valcke, Peggy [1 ]
Kindt, Els [1 ]
机构
[1] Katholieke Univ Leuven, Ctr IT & IP Law CiTiP, Leuven, Belgium
来源
INTERNATIONAL JOURNAL OF LAW AND INFORMATION TECHNOLOGY | 2019年 / 27卷 / 04期
关键词
machine-to-machine communication; confidentiality of communications; ePrivacy Directive; ePrivacy Regulation; privacy; freedom of expression; FREE SPEECH; INFORMATION; EXPRESSION; FREEDOM;
D O I
10.1093/ijlit/eaz012
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
In this paper we confront the technological notion of machine-to-machine communication (M2M) to the legal principle of confidentiality of communications (art. 5.1 ePrivacy Directive) in order to determine whether M2M is a protected communication. After demonstrating the answer is not straightforwardly found in the legal text we turn our attention to other aspects which can have an impact on the matter. We build up our case by considering four different levels. At the first level we ask whether the concepts used in the legal definition of 'communication' allow for the inclusion of M2M. At the second level we involve the history of the ePrivacy Directive in the discussion. At the third level the values behind the confidentiality principle come into play. Lastly at the fourth level we look at the issue from a practical stance. The resulting picture points towards the inclusion of M2M in the scope of the confidentiality principle.
引用
收藏
页码:372 / 408
页数:37
相关论文
共 53 条
[1]  
Akandji-Kombe Jean-Francois., 2007, POSITIVE OBLIGATIONS
[2]  
Arnbak Axel Martin, 2015, SECURING PRIVATE COM, P103
[3]  
Asscher LF, 2003, VERKEERSGEGEVENS JUR, P18
[4]  
Asscher LF, 2002, COMMUNICATIEGRONDREC, P18
[5]  
Bambauer J, 2014, STANFORD LAW REV, V66, P57
[6]  
Barendt Eric, 2007, FREEDOM SPEECH, P54
[7]   Is it possible to grant legal personality to artificial intelligence software systems? [J].
Cerka, Paulius ;
Grigiene, Jurgita ;
Sirbikyte, Gintare .
COMPUTER LAW & SECURITY REVIEW, 2017, 33 (05) :685-699
[8]  
DaCosta F., 2013, Rethinking the Internet of Things a scalable approach to connecting everything
[9]  
De Hert Paul, 2011, INT DAT PROT C 2011
[10]  
Directorate-General for Internal Policies-Policy Department Citizens, 2017, 583V152 PE DIR GEN I