Cover of book: Building-Blocks of a Data Protection Revolution
Book Titles Open Access Full access

Building-Blocks of a Data Protection Revolution

The Uneasy Case for Blockchain Technology to Secure Privacy and Identity
Authors:
Publisher:
 2018

Summary

Die Datenschutz-Grundverordnung (DSGVO) hat am 25. Mai 2018 nach einem langwierigen Regulierungsprozess die ausgediente Datenschutz-Richtlinie ersetzt. Die schnell wachsende Technologielandschaft wird die Fähigkeit der DSGVO, persönliche Daten und den freien Datenverkehr zu schützen, auf die Probe stellen. Dieses Werk schlägt eine technologische Ergänzung vor, um das in der DSGV festgehaltene Ziel des Datenschutzes zu realisieren. Es handelt sich um digitale Identitätsmanagement-Plattformen auf der Grundlage von Blockchain-Technologie. Die Struktur der Blockchain stellt jedoch einige Herausforderungen mit Bezug auf die Vereinbarkeit mit der DSGVO. Dementsprechend wird auch der Anspruch der DSGVO als neutrale Rechtsvorschrift auf die Probe gestellt. Die Vereinbarkeit einer Blockchain-basierten Lösung wird auf der Grundlage von Datenschutz-Prinzipien wie der Rechenschaftspflicht, der Datenminimierung, Kontrolle und eingebautem Datenschutz in Verbindung mit dem Recht auf Vergessenwerden und auf Datenübertragbarkeit untersucht.

Keywords



Bibliographic data

Copyright year
2018
ISBN-Print
978-3-8487-5222-5
ISBN-Online
978-3-8452-9402-5
Publisher
Nomos, Baden-Baden
Series
Munich Intellectual Property Law Center - MIPLC Studies
Volume
35
Language
English
Pages
62
Product type
Book Titles

Table of contents

ChapterPages
  1. Titelei/InhaltsverzeichnisPages 1 - 10 Download chapter (PDF)
  2. I. IntroductionPages 11 - 14 Download chapter (PDF)
  3. Download chapter (PDF)
    1. A. Easing into the Blockchain enigma
    2. B. Leveraging Blockchain Technology for Personal Data Protection
  4. Download chapter (PDF)
    1. A. The Contours of Right to Privacy and Right to Data Protection
    2. B. Privacy and Identity: In the Shadow of Profiling
    3. C. Identity Management: The Blockchain Way Forward
  5. Download chapter (PDF)
    1. A. GDPR: A Technolog(icall)y Neutral Law?
      1. 1. Accountability
      2. 2. Data Minimisation
      3. 3. Control
      4. 4. Right to be Forgotten
      5. 5. Right to Data Portability
      6. 6. Data Protection by Design
  6. V. ConclusionPages 53 - 56 Download chapter (PDF)
  7. Download chapter (PDF)
    1. Primary Sources
    2. Secondary Sources

Bibliography (84 entries)

  1. Books Open Google Scholar
  2. Bakhoum, M., et al (eds), Personal Data in Competition, Consumer Protection and IP Law –Towards a Holistic Approach? (Springer 2017). Open Google Scholar
  3. Bernal, P., Internet Privacy Rights: Rights to Protect Autonomy (Cambridge 2014). Open Google Scholar
  4. Bygrave, L.A., Data Privacy Law: An Interntional Perspective (Oxford 2014). Open Google Scholar
  5. Clippinger, J.H. and Bollier, D. (eds), From Bitcoin to Burning Man and Beyond: The Quest for Identity and Autonomy in a Digital Society (Institute for Institutional Innovation by Data-Driven Design 2014), Open Google Scholar
  6. de Burca, C., EU Law: Text Cases and Materials (6th edn, Oxford 2015). Open Google Scholar
  7. DeCew, J., Privacy (The Stanford Encyclopedia of Philosophy, Spring 2015) Open Google Scholar
  8. Falke, J. and Schepel, H. (eds.), Legal Aspects of Standardisation in the Member States of the EC and of EFTA, vol 1 (H. S. A. Luxembourg: Office for Official Publications of the European Communities 2000). Open Google Scholar
  9. Fischer-Hübner, S., et al (eds), Privacy and Identity Management for Life (Springer 2010). Open Google Scholar
  10. Fuster, G.G., The Emergence of Personal Data Protection as a Fundamental Right of the EU (Springer 2014). Open Google Scholar
  11. Gutwirth, S., et al (eds), Reinventing Data Protection? (Springer 2009). Open Google Scholar
  12. Gutwirth, S., Poullet, Y. and Paul de Hart (eds), Data Protection in a Profiled World (Springer 2010). Open Google Scholar
  13. Hildebrandt, M. and Gutwirth, S., (eds), Profiling the European Citizen: Cross-disciplinary perspectives (Springer 2008). Open Google Scholar
  14. Leenes, R. et al (eds), Data Protection and Privacy: (In)visibilities and Infrastructures (Springer 2017). Open Google Scholar
  15. Morgan, B. and Yeung, K., An Introduction to Law and Regulation: Text and Materials (Cambridge University Press 2007) Open Google Scholar
  16. Neethling, J. et al, Neethling’s Law of Personality (Butterworths 1996) Open Google Scholar
  17. Olleros, F.X., and Elgar, M.Z.E. (ed.), Research Handbook on Digital Transformations (2016). Open Google Scholar
  18. Rennenberg, K., Royer, D. and Deuker, A. (eds), The Future of Identity in the Information Society: Challenges and Opportunities (Springer 2009). Open Google Scholar
  19. Contribution to edited books Open Google Scholar
  20. Bart van der Sloot, ‘Legal Fundamentalism: Is Data Protection Really a Fundamental Right’ in Ronald Leenes et al (eds), Data Protection and Privacy: (In)visibilities and Infrastructures (Springer 2017). Open Google Scholar
  21. Jean-Marc Dinant, ‘The Concepts of Identity and Identifiablity: Legal and Technical Deadlocks for Protecting Human Beings in the Information Society?’ as cited in Gutwirth et al (eds), Reinventing Data Protection? (Springer 2009). Open Google Scholar
  22. Manon Oostveen and Kristina Irion, ‘The Golden Age of Personal Data: How to Regulate an Enabling Fundamental Right?’ as cited in Bakhoum, M., et al (eds), Personal Data in Competition, Consumer Protection and IP Law –Towards a Holistic Approach? (Springer 2017). Open Google Scholar
  23. Marc Pilkington, ‘Blockchain Technology: Principles and Applications’ (September 18, 2015) in F. Xavier Olleros and Majlinda Zhegu. Edward Elgar (ed.), Research Handbook on Digital Transformations (2016). Open Google Scholar
  24. Norberto Andrade, ‘Data Protection, Privacy and Identity: Distinguishing Concepts and Articulating Rights’ in Simone Fischer-Hübner et al (eds), Privacy and Identity Management for Life (Springer 2010). Open Google Scholar
  25. Samuel Warren and Louis Brandeis, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193, as cited in Judith DeCew, ‘Privacy’, The Stanford Encyclopedia of Philosophy (Spring 2015). Open Google Scholar
  26. Yves Poullet, ‘About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?’ in Serge Gutwirth, Yves Poullet and Paul de Hart (eds), Data Protection in a Profiled World (Springer 2010) 14. Open Google Scholar
  27. Journal articles Open Google Scholar
  28. Christophe Lazaro and Daniel Le Métayer, ‘Control over Personal Data: True Remedy or Fairy Tale?’ (2015) 12 (1) SCRIPTed 3. Open Google Scholar
  29. David Nuñez and Isaac Agudo, ‘BlindIdM: A privacy-preserving approach for identity management as a service’ (2014) 13 (2) International Journal of Information Security 199. Open Google Scholar
  30. Dennis D Hirsch, ‘In Search of the Holy Grail: Achieving Global Privacy Rules Through Sector-Based Codes of Conduct’ (2013) 74 Ohio State Law Journal 1029. Open Google Scholar
  31. Edgar A. Whitley, ‘Informational privacy, consent and the ‘control’ of personal data’ (2009) 14 Information Security Technical Report 154. Open Google Scholar
  32. Gary T Marx, ‘Murky Conceptual Waters: The Public and The Private’ (2001) 3 Ethics and Information Technology 157. Open Google Scholar
  33. Gerrit Hornung and Christoph Schnabel, ‘Data protection in Germany I: The population census decision and the right to informational self-determination’ (2009) 25 Computer Law and Security Review 84 Open Google Scholar
  34. Irwin Altman, ‘Privacy: A Conceptual Analysis’ (1976) 8 Environment and Behavior 7. Open Google Scholar
  35. Janice Y Tsai et al, ‘The Effect of Online Privacy Information on Purchasing Behaviour: An Experimental Study’ (2011) 22(2) Information Systems Research 254. Open Google Scholar
  36. Johann Neethling, ‘Personality Rights: A Comparative Overview’ (2005) 38 (2) Comparative and International Law Journal of Southern Africa 210. Open Google Scholar
  37. Juliane Kokott and Christoph Sobotta, ‘The Distinction between Privacy and Data Protection Jurisprudence of the CJEU and ECtHR’ (2013) 3 (4) International Data Privacy Law 222. Open Google Scholar
  38. Marco Iansiti and Karim Lakhani, ‘The Truth About Blockchain’ (Harvard Business Review, January-February 2017). Open Google Scholar
  39. Matthias Berberich and Malgorzata Steiner, ‘Blockchain Technology and the GDPR: How to Reconcile Privacy and Distributed Ledgers’ (2016) 2 European Data Protection Law Review 422. Open Google Scholar
  40. Mireille Hilderbrandt and Laura Tielmans, ‘Data Protection by Design and Technology Neutral Law’ (2013) 29 Computer Law and Security Review 509. Open Google Scholar
  41. Nadja Kanellopoulou, ‘Legal Philosophical Dimensions of Privacy’, EnCoRe Briefing Paper 2009. Open Google Scholar
  42. Paul de Hert and Vagelis Papakonstantinou, ‘The New General Data Protection Regulation: Still a Sound System for The Protection of Individuals?’ (2016) 32 Computer Law and Security Review 179. Open Google Scholar
  43. Raphael Gallert and Serge Gutwirth, ‘The Legal Construction of Privacy and Data Protection’ (2013) 29 (5) Computer Law and Security Review 522. Open Google Scholar
  44. Ronald H Coase, ‘The Problem of Social Cost’ (1960) 3 Journal of Law and Economics 1. Open Google Scholar
  45. Scott R. Peppet, ‘Unraveling privacy: The personal prospectus and the threat of a full-disclosure future.’ (2011) 105 Northwestern University Law Review 1153 1183. Open Google Scholar
  46. Simone Fischer-Hübner, C. Hoofnagle, I. Krontiris, K. Rannenberg, and M. Waidner (eds.), ‘Online Privacy: Towards Information Self-Determination on the Internet’, Dagstuhl Manifestos, Vol. 1 Issue 1 1–20. Open Google Scholar
  47. Online articles Open Google Scholar
  48. Aaron Wright and Primavera Di Filippi, ‘Decentralized Blockchain Technology and the Rise of Lex Cryptographia’ (10 March 2015) <www.intgovforum.org/cms/wks2015/uploads/proposal_background_paper/SSRN-id2580664.pdf>. Open Google Scholar
  49. Alan F. Westin, ‘Privacy and Freedom’, Washington and Lee Law Review, Vol. 25 Issue 1 (1967) 7. <http://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?article=3659&context=wlulr>. Open Google Scholar
  50. Bert-Jaap Koops, ‘The Trouble with European Data Protection Law’ (TILT Law and Technology Preprint Publications 2014). <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2505692> Open Google Scholar
  51. Blockchain Bundesverbrand, ‘Blockchain, data protection, and the GDPR’ (May 2018). < https://www.bundesblock.de/wp-content/uploads/2018/05/GDPR_Position_Paper_v1.0.pdf > Open Google Scholar
  52. Christian Lundkvist, Rouven Heck, Joel Torstensson, Zac Mitton and Michael Sena, ‘Uport: A Platform for Self-Sovereign Identity’ (21 February 2017). <https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf>. Open Google Scholar
  53. David S. Evans, ‘Economic Aspects of Bitcoin and Other Decentralized Public-Ledger Currency Platforms’, Coase-Sandor Institute for Law & Economics, Research Paper No. 685 3 (15 April 2014). <http://dx.doi.org/10.2139/ssrn.2424516>. Open Google Scholar
  54. David Reinsel, John Gantz and John Rydning, ‘Data Age 2025: The Evolution of Data to Life-Critical’ (April 2017). <www.seagate.com/www-content/our-story/trends/files/Seagate-WP-DataAge2025-March-2017.pdf>. Open Google Scholar
  55. Don Tapscott and Alex Tapscott, ‘The Impact of the Blockchain Goes Beyond Financial Services’ (10 May 2016) <https://hbr.org/2016/05/the-impact-of-the-blockchain-goes-beyond-financial-services?referral=03759&cm_vc=rr_item_page.bottom>. Open Google Scholar
  56. Guy Ziskind, Oz Nathan and Alex Sandy Pentland, ‘Decentralizing Privacy: Using Blockchain to Protect Personal Data’, 2015 IEEE Computer Society - IEEE CS Security and Privacy Workshops. <www.computer.org/csdl/proceedings/spw/2015/9933/00/9933a180.pdf>. Open Google Scholar
  57. H T Tavani, ‘Privacy and the Internet’ (2000) Boston College Intellectual Property & Technology. <www.bc.edu/bc_org/avp/law/st_org/iptf/commentary/content/2000041901.html> Open Google Scholar
  58. Irene Kamara, ‘Co-regulation in EU Personal Data Protection: The Case of Technical Standards and the Privacy by Design Standardisation 'Mandate'’ (2017) 8(1) European Journal of Law and Technology. <http://ejlt.org/article/view/545/723>. Open Google Scholar
  59. Joseph Bonneau et al., ‘Research Perspectives and Challenges for Bitcoin and Open Google Scholar
  60. Cryptocurrencies’ IEEE Security and Privacy. <www.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf.>. Open Google Scholar
  61. Lilian Mitrou and Maria Karyda, ‘EU’s Data Protection Reform and the Right to be Forgotten: A Legal Response to a Technological Challenge’. <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2165245&rec=1&srcabs=2032325&alg=1&pos=10>. Open Google Scholar
  62. Massachusetts Institute of Technology, ‘Core Identity Blockchain Project’ (2017). <https://law.mit.edu/blog/core-identity-blockchain-project>. Open Google Scholar
  63. Moritz Walther, ‘The EU GDPR and Distributed Ledgers (Blockchain): Solutions to a Worst Case Scenario’ (2018). <https://www.researchgate.net/publication/325069696_The_EU_GDPR_and_Distributed_Ledgers_Blockchain_Solutions_to_a_Worst_Case_Scenario> Open Google Scholar
  64. Neil M Richards and Jonathan H King, ‘Three Paradoxes of Big Data’ (2013) 66 Stanford Law Review Online 41. <www.stanfordlawreview.org/online/privacy-and-big-data-three-paradoxes-of-big-data/>. Open Google Scholar
  65. Neil Robinson et al, Review of the European Data Protection Directive (Cambridge 2009). <https://ico.org.uk/media/about-the-ico/documents/1042349/review-of-eu-dp-directive.pdf>. Open Google Scholar
  66. Patrick Tucker, ‘Has Big Data made Anonymity Impossible?’ MIT Technology Review - Business Report (7 May 2013). <www.technologyreview.com/s/514351/has-big-data-made-anonymity-impossible/?set=514341>. Open Google Scholar
  67. Sarah Eskens, ‘Profiling the European Consumer in the Internet of Things: How Will the General Data Protection Regulation Apply to this Form of Personal Data Processing, and How Should It?’. <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2752010>. Open Google Scholar
  68. Satoshi Nakomoto, ‘Bitcoin: A Peer-to-Peer Electronic Cash System’ BITCOIN.ORG 3 (2009). <https://bitcoin.org/bitcoin.pdf>. Open Google Scholar
  69. Vernon Turner, ‘The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things’ (April 2014). <www.emc.com/leadership/digital-universe/2014iview/digital-universe-of-opportunities-vernon-turner.htm>. Open Google Scholar
  70. World Economic Forum, ‘A Blueprint for Digital Identity’ (August 2016). <www3.weforum.org/docs/WEF_A_Blueprint_for_Digital_Identity.pdf>. Open Google Scholar
  71. Yli-Huumo J, Ko D, Choi S, Park S, Smolander K (2016) Where Is Current Research on Blockchain Technology?—A Systematic Review. PLoS ONE 11(10): e0163477. <https://doi.org/10.1371/journal.pone.0163477>. Open Google Scholar
  72. Website and blogs Open Google Scholar
  73. Ashurst, ‘Blockchain 101: An Introductory Guide to Blockchain’, Digital Economy, 20 March 2017. <www.ashurst.com/en/news-and-insights/insights/blockchain-101/>. Open Google Scholar
  74. Accenture, ‘Editing the Uneditable Blockchain: Why Distributed Ledger Technology Must Adapt to an Imperfect World’. <www.accenture.com/t00010101T000000__w__/es-es/_acnmedia/PDF-33/Accenture-Editing-Uneditable-Blockchain.pdf>. Open Google Scholar
  75. Djuri Baars, ‘Towards Self-Sovereign Identity Using Blockchain Technology’, Master Thesis, University of Twente 2016. <http://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf> Open Google Scholar
  76. Ethereum Stack Exchange, ‘What's the difference between proof of stake and proof of work?’. <https://ethereum.stackexchange.com/questions/118/whats-the-difference-between-proof-of-stake-and-proof-of-work>. Open Google Scholar
  77. Gartner Press Release, ‘Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015’ (Stamford, 10 November 2015). <www.gartner.com/newsroom/id/3165317>. Open Google Scholar
  78. Gartner Press Release, ‘Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage’ (August 2016). <www.gartner.com/newsroom/id/3412017>. Open Google Scholar
  79. Goldman Sachs Global Investment Research, ‘Blockchain: Putting Theory into Practice’ (2016). <https://www.scribd.com/doc/313839001/Profiles-in-Innovation-May-24-2016-1>. Open Google Scholar
  80. ITU-T, ‘NGN Identity Management Framework’, (2009) Recommendation Y.2720. < https://www.itu.int/rec/T-REC-Y.2720-200901-I>. Open Google Scholar
  81. Sovrin, ‘Identity for all’. <www.sovrin.org/>. Open Google Scholar
  82. TNS Opinion & Social, ‘Data Protection’ Special Eurobarometer 431 (June 2011). <http://ec.europa.eu/commfrontoffice/publicopinion/archives/ebs/ebs_431_sum_en.pd>. Open Google Scholar
  83. Vitalik Buterin, ‘On Public and Private Blockchains’ (7 August 2015). <https://blog.ethereum.org/2015/08/07/on-public-and-private-blockchains/>. Open Google Scholar
  84. Wikipedia, ‘Blocks’ <https://en.bitcoin.it/wiki/Blocks>. Open Google Scholar

Similar publications

from the topics "Data Protection Law & Information Law & Digital Law", "European Law & International Law & Comparative Law"