, to see if you have full access to this publication.
Edited Book No access
Turning Point in Data Protection Law
Two years GDPR on DPOblog.eu- Editors:
- Publisher:
- 2020
Summary
„Turning Point in Data Protection Law“ enthält Beiträge aus den ersten beiden Jahren der DS-GVO des DPOblog.eu. Die Themen erstrecken sich von den neuen Grundlagen der DS-GVO über die aktuellen Entscheidungen des EuGH bis zu den ersten Rechtsverfahren von Max Schrems.
Search publication
Bibliographic data
- Edition
- 1/2020
- Copyright Year
- 2020
- ISBN-Print
- 978-3-8487-6909-4
- ISBN-Online
- 978-3-7489-2156-1
- Publisher
- Nomos, Baden-Baden
- Language
- English
- Pages
- 194
- Product Type
- Edited Book
Table of contents
ChapterPages
- Titelei/Inhaltsverzeichnis No access Pages 1 - 10
- Authors:
- 25 April 2018 No accessAuthors:
- Authors:
- 25 April 2018 No accessAuthors:
- Authors:
- Authors:
- 1. A consent shall not be conditional No accessAuthors:
- 2. Consent shall be given in a separate way for any single purpose No accessAuthors:
- 3. Consent shall be given separately for any data processing operation No accessAuthors:
- Authors:
- Authors:
- 1. Facts and legal background No accessAuthors:
- 2. The statement of the German DPAs with pro and contra No accessAuthors:
- Authors:
- Authors:
- 1. Origin and transformation of Accountability No accessAuthors:
- 2. Accountability and liability No accessAuthors:
- 3. How to comply with Accountability? No accessAuthors:
- Authors:
- Authors:
- 1. Facts No accessAuthors:
- 2. The legal arguments of Max Schrems No accessAuthors:
- 3. Are Max Schrems arguments convincing? No accessAuthors:
- 4. Are Facebook and Google wilfully infringing GDPR? No accessAuthors:
- 5. What powers does GDPR provide to the DPAs? No accessAuthors:
- 6. How the DPA of Hamburg would decide the WhatsApp case No accessAuthors:
- 7. Conclusion No accessAuthors:
- Authors:
- Authors:
- 1. Facts and procedure No accessAuthors:
- 2. The decision of ECJ No accessAuthors:
- 3. Joint liability of fan pages with Facebook No accessAuthors:
- 4. Fan pages bearing risk to be fined No accessAuthors:
- 5. Conclusion No accessAuthors:
- Authors:
- Authors:
- 1. Facts and procedure No accessAuthors:
- Authors:
- a. Processing of personal data No accessAuthors:
- b. ‘Data processing on behalf’ or ‘transmission’? No accessAuthors:
- c. Legitimate interest as a legal basis for transmission? No accessAuthors:
- Authors:
- 3. Will the final decision be valid under GDPR? No accessAuthors:
- Authors:
- Authors:
- 1. Requirements of ‘data processing on behalf’ No accessAuthors:
- 2. Parent company as ‘data processor’? No accessAuthors:
- 3. Exemption of GDPR-requirements for data exchange within a group? No accessAuthors:
- 4. Risk of breach No accessAuthors:
- Authors:
- Authors:
- Authors:
- a. Performance of a contract No accessAuthors:
- b. Legitimate interest No accessAuthors:
- c. Consent No accessAuthors:
- d. Intentional infringement by Google No accessAuthors:
- 2. What is the reaction of the data protection watchdog? No accessAuthors:
- Authors:
- Authors:
- 1. Statement of German DPAs No accessAuthors:
- 2. Consequences of the statement No accessAuthors:
- 3. Legal background No accessAuthors:
- 4. Legal opinion No accessAuthors:
- 5. Will the consistency mechanism apply? No accessAuthors:
- Authors:
- Authors:
- 1. Substance of the decision No accessAuthors:
- 2. Assessment No accessAuthors:
- Authors:
- Authors:
- 1. Legal background No accessAuthors:
- 2. Assessment No accessAuthors:
- 3. Conclusion No accessAuthors:
- Authors:
- Authors:
- 1. Notification of data breaches No accessAuthors:
- 2. Powers of the DPA No accessAuthors:
- 3. Appropriate technical and organisational measures No accessAuthors:
- 4. Criteria for the amount of fines No accessAuthors:
- 5. What about class action? No accessAuthors:
- Authors:
- Authors:
- 1. Facts No accessAuthors:
- Authors:
- a) Software maintenance as data processing No accessAuthors:
- b) Microsoft becomes controller No accessAuthors:
- c) No legal basis for data transfer to Microsoft No accessAuthors:
- 3. Dutch Government liable for 'data breach of Microsoft' No accessAuthors:
- 4. Conclusion No accessAuthors:
- Authors: |
- Authors: |
- 1. Introduction No accessAuthors: |
- Authors: |
- 2.1 Controller No accessAuthors: |
- 2.2 Processor No accessAuthors: |
- Authors: |
- 3.1 Term No accessAuthors: |
- 3.2 Intra-Group relationship No accessAuthors: |
- Authors: |
- 4.1 Formal requirements No accessAuthors: |
- Authors: |
- 4.2.1 Allocation of functions within the data processing No accessAuthors: |
- 4.2.2 Regulation of data subjects’ rights No accessAuthors: |
- 4.2.3 Regulation of other duties No accessAuthors: |
- 4.3 Transparent communication of the substance of the agreement No accessAuthors: |
- 5. Practical example for an intra-group joint controllership No accessAuthors: |
- 6. Conclusion No accessAuthors: |
- Authors:
- Authors:
- A faster, better and cheaper way of enforcing consumer rights No accessAuthors:
- How does the “one for all lawsuit” work? No accessAuthors:
- Specific details on the “one for all lawsuit”: No accessAuthors:
- Authors:
- Authors:
- 1. Landmark decision of the German Anti-trust Authority No accessAuthors:
- 2. The decision of Bundeskartellamt (German Anti-trust Authority) No accessAuthors:
- 3. Assessment No accessAuthors:
- 4. Conclusion No accessAuthors:
- Authors:
- Authors:
- Norms for the hardware No accessAuthors:
- The normative order of the internet and national legal orders No accessAuthors:
- There is order No accessAuthors:
- Authors:
- Authors:
- 1. No consent without choice No accessAuthors:
- 2. Consent shall be specific for different purposes No accessAuthors:
- 3. Assesment No accessAuthors:
- Authors:
- 13 April 2019 No accessAuthors:
- Authors:
- Authors:
- 1. Does national law or EU-law apply? No accessAuthors:
- 2. Regulation (EEC, EURATOM) No 1182/71 No accessAuthors:
- Authors:
- 3.1. Start and end of 72 hours period No accessAuthors:
- 3.2. Notice period on weekend No accessAuthors:
- 4. Assessment No accessAuthors:
- Authors:
- Authors:
- I. Regulatory mechanisms are only complementary No accessAuthors:
- Authors:
- Authors:
- a) Material damage No accessAuthors:
- Authors:
- aa) Missing assessment criteria in data protection law No accessAuthors:
- bb) Violation of data protection = unauthorised commercialisation of personal data? No accessAuthors:
- cc) Assessment criteria for violations of privacy resulting from data protection violations No accessAuthors:
- III. Conclusion No accessAuthors:
- Authors:
- Authors:
- 1. Legal basis for personalised advertising No accessAuthors:
- 2. The Concept of “Paid Alternative Access” No accessAuthors:
- 3. Pricing the “Paid Alternative Access” No accessAuthors:
- 4. Conclusion No accessAuthors:
- Authors:
- Authors:
- 1. Proceeding: joint controller and consent No accessAuthors:
- 2. Class action: new option for consumer agencies No accessAuthors:
- 3. Assessment No accessAuthors:
- Authors:
- Authors:
- 1. Role of DPO according to GDPR No accessAuthors:
- 2. Limits of DPOs independence No accessAuthors:
- 3. DPO at risk No accessAuthors:
- 4. How to empower the DPO No accessAuthors:
- 5. DPO as a messenger of bad news No accessAuthors:
- Authors:
- Authors:
- Authors:
- 1.1 'Clickbox No 1' No accessAuthors:
- 1.2 'Clickbox No 2' No accessAuthors:
- 2. Legal framework No accessAuthors:
- 3. The rationale of the ECJ No accessAuthors:
- 4. Assessment No accessAuthors:
- Authors:
- Authors:
- Background No accessAuthors:
- The Importance of the Whitelist No accessAuthors:
- Conclusion No accessAuthors:
- Authors:
- Authors:
- 1. Sensitivity of Japanese to the data protection No accessAuthors:
- Authors:
- Authors:
- 2.1.1 Three Acts on the Protection of Personal Information No accessAuthors:
- 2.1.2 Special data protection laws and guidelines No accessAuthors:
- 2.2 Data protection in local authorities No accessAuthors:
- Authors:
- 3.1 Basic principle of the APPI No accessAuthors:
- 3.2 OECD Privacy Guidelines No accessAuthors:
- 4. Resume No accessAuthors:
- Authors:
- Authors:
- Dresden Regional Court on Google Analytics No accessAuthors:
- 1. The facts of the case No accessAuthors:
- 2. The reasons No accessAuthors:
- Authors:
- 3.1 Data protection law does not end with the GDPR No accessAuthors:
- 3.2 “AnonymizeIp” is not all it’s cracked up to be No accessAuthors:
- 3.3 Indispensability of informed consent when using Google Analytics No accessAuthors:
- 3.4 Possible damages No accessAuthors:
- 4. Practical implications No accessAuthors:
- Authors:
- Authors:
- 1. Liability pursuant to European public liability law No accessAuthors:
- a) Infringement of rights of individuals No accessAuthors:
- b) The breach must be sufficiently serious No accessAuthors:
- c) Direct causal link between the breach and the damage No accessAuthors:
- d) Application of European public liability law No accessAuthors:
- Authors:
- 2. Assessment No accessAuthors:
- Authors:
- Authors:
- 1. Internal Audit and DPO No accessAuthors:
- 2. Seperation of tasks between controller and DPO No accessAuthors:
- 3. Independent role of DPO and T-LoD No accessAuthors:
- 4. Internal Audit and the Accountability Principle No accessAuthors:
- 5. Assessment No accessAuthors:
- Authors: |
- Authors: |
- Double opt-in No accessAuthors: |
- Facts of the case No accessAuthors: |
- Legal framework No accessAuthors: |
- Decision of the DPA No accessAuthors: |
- Authors:
- Authors:
- 1. Does GDPR provide any adequate legal basis? No accessAuthors:
- 2. GDPR was not designed for a 'state of pandemic' No accessAuthors:
- 3. Law for the ‘state of pandemic' No accessAuthors:
- 4. Assessment No accessAuthors:
- Authors: |
- Authors: |
- The supervisory authorities on lawfulness of video surveillance No accessAuthors: |
- ECJ ruling on private video surveillance No accessAuthors: |
- Video surveillance to detect and prevent criminal offences No accessAuthors: |
- Sensitive data and information obligations No accessAuthors: |
- Impact on practice No accessAuthors: |
- Authors:
- Authors:
- Risk Assessments under the GDPR No accessAuthors:
- The usage of location data No accessAuthors:
- Decentralized Privacy-Preserving Proximity Tracing No accessAuthors:
- Anonymization vs. pseudonymization No accessAuthors:
- Conclusio No accessAuthors:
- Author directory No access Pages 187 - 194





