Giuseppe Vaciago | Università degli Studi dell'Insubria (original) (raw)

Uploads

Papers by Giuseppe Vaciago

Research paper thumbnail of Internet of Things (IoT)

Research paper thumbnail of Digital evidence: profili tecnico-giuridiche e garanzie dell'imputato

Il principio del libero convincimento del giudice nella valutazione della prova trova i suoi pres... more Il principio del libero convincimento del giudice nella valutazione della prova trova i suoi presupposti nel combinato disposto degli artt. 192 e 546, comma 1, lett. e), c.p.p.; osserva correttamente G. Canzio che le due norme pretendono, da un lato, che ogni passaggio argomentativo sia giustificato dal Giudice, che "valuta l'elemento di prova dando conto nella motivazione dei risultati probatori acquisiti e dei criteri d'inferenza adottati" e dall'altro che "la sentenza contenga, con la concisa esposizione dei motivi di fatto e di diritto su cui essa è fondata, l'indicazione delle prove poste a base della decisione stessa e l'enunciazione delle ragioni per le quali il giudice ritiene non attendibili le prove contrarie". G. Canzio,

Research paper thumbnail of Criminal Liability for Internet Intermediaries in Europe: A First Case Study in Italy

... Abstract: Mr. Giuseppe Vaciago, a former member of the Visiting Scholars and Researchers comm... more ... Abstract: Mr. Giuseppe Vaciago, a former member of the Visiting Scholars and Researchers community, spoke on "Criminal Liability for Internet Intermediaries in Europe: A First Case Study in Italy" based on his experience from the highly publicized trial in which three Google ...

Research paper thumbnail of Fostering cybersecurity in Europe through regulation

Research paper thumbnail of Legal aspects of information science, data science, and Big Data ∗

Frontiers in Data Science, 2017

This chapter investigates the limits and criticisms of the existing legal framework and the possi... more This chapter investigates the limits and criticisms of the existing legal framework and the possible options to provide adequate answers to the new challenges of Big Data processing. In this light, this chapter is divided into three main sections. The first section focuses on the traditional paradigm of data protection and on the provisions, primarily in the new EU General Data Protection Regulation (Regulation (EU) 2016/679, hereafter GDPR), that can be used to safeguard individual rights in Big Data processing. The second section goes beyond the existing legal framework and, in the light of the path opened by the guidelines on Big Data adopted by the Council of Europe, suggests a broader approach that encompasses the collective dimension of data protection. This dimension often characterizes Big Data applications and leads to assess the ethical and social impacts of data uses, which assume an important role in many Big Data contexts. The last section deals with the use of Big Data to anticipate fraud detection and to prevent crime. In this light, the new Directive (EU) 2016/680 † is briefly analyzed. Da

Research paper thumbnail of The “Dark Side” of Big Data: Private and Public Interaction in Social Surveillance

Computer Law Review International, 2013

Research paper thumbnail of The common EU approach to personal data and cybersecurity regulation

International Journal of Law and Information Technology

Several sector-specific studies on EU data protection and cybersecurity frameworks can be found i... more Several sector-specific studies on EU data protection and cybersecurity frameworks can be found in the literature, but their differing legal domains has hindered the development of a common analysis of the different sets of provisions from a business perspective. This article sets out to bridge this gap, providing a systematic review and a cross-cutting operational analysis of the main legal instruments that constitute the common European approach to personal data and cybersecurity regulation for the business sector. We aim to demonstrate the existence of a core of common principles and procedural approaches referring to specific cybersecurity and data security technologies. Analysis reveals a coordinated regulatory model based on five pillars: risk-based approach, by-design approach, reporting obligations, resilience and certification schemes. We also highlight the relationship between the main directives and regulations.

Research paper thumbnail of Reconciling Data Protection and Cybersecurity: An Operational Approach for Business Sector

Services and Business Process Reengineering

Research paper thumbnail of Prevention and Fight Against Cybercrime the Illbuster Project

Mucchi editore, 2015

in “Ciberspazio e Diritto”, Rivista Internazionale di Informatica Giuridica, vol. 16 n. 52 (1-2015)

Research paper thumbnail of Legal aspects of information science, data science, and Big Data ∗

Frontiers in Data Science, 2017

This chapter investigates the limits and criticisms of the existing legal framework and the possi... more This chapter investigates the limits and criticisms of the existing legal framework and the possible options to provide adequate answers to the new challenges of Big Data processing. In this light, this chapter is divided into three main sections. The first section focuses on the traditional paradigm of data protection and on the provisions, primarily in the new EU General Data Protection Regulation (Regulation (EU) 2016/679, hereafter GDPR), that can be used to safeguard individual rights in Big Data processing. The second section goes beyond the existing legal framework and, in the light of the path opened by the guidelines on Big Data adopted by the Council of Europe, suggests a broader approach that encompasses the collective dimension of data protection. This dimension often characterizes Big Data applications and leads to assess the ethical and social impacts of data uses, which assume an important role in many Big Data contexts. The last section deals with the use of Big Data to anticipate fraud detection and to prevent crime. In this light, the new Directive (EU) 2016/680 † is briefly analyzed. Da

Research paper thumbnail of Opportunities and Challenges in the Legal Tech Services in the Italian and European Framework

Research paper thumbnail of New Challenges in Robotics. Cyber Security and Digital Forensics

The coming years are certain to be critical for the robotics industry, as it refines the capacity... more The coming years are certain to be critical for the robotics industry, as it refines the capacity to massively produce robots. As this shift takes place, these robots will increasingly become integrated into our everyday lives. The use of Unmanned Aerial Vehicles (UAVs), also known as drones, is increasing in both the military and civilian sectors. Although we are used to the concept of military drones, commercial and civilian use of the technology is still evolving. Small drones are compact, easy to carry, and can be concealed in a bag or a backpack. In the transportation sector, the development of Google’s Driverless Car, an autonomous motor vehicle, and of Android Auto and Apple CarPlay, provide insight into the future of personal transportation, and alludes to the possibility of greatly reducing accidents and providing vital transport to individuals who could not operate a motor vehicle otherwise. If there is no doubt about the usefulness of robotics in terms of development of i...

Research paper thumbnail of The Law of Service Robots Ricognizione dell'assetto normativo rilevante nell'ambito della robotica di servizio: stato dell'arte e prime raccomandazioni di policy in una prospettiva multidisciplinare

Research paper thumbnail of Privacy e tutela dell’ordine pubblico in Europa e negli Stati Uniti: un differente approccio per raggiungere un difficile compromesso

I dati digitali che vengono generalmente richiesti in ambito investigativo possono generalmente d... more I dati digitali che vengono generalmente richiesti in ambito investigativo possono generalmente dividersi fra quelli che consentono l’identificazione di un potenziale criminale (indirizzo IP), quelli che ne determinano l’attivita on line (log files) e quelli che consentono di conoscere le sue conversazioni (intercettazioni telematiche). Si ritiene, generalmente, che questo tipo di informazioni possa essere ottenuta solo attraverso una precisa richiesta da parte dell’autorita ai fornitori di connettivita o ai provider che offrono servizi di posta elettronica e/o ospitano contenuti generati dagli utenti; tuttavia una gran parte di queste informazioni puo essere anche indirettamente reperita semplicemente navigando in Rete. Sono rimasto davvero sorpreso dell’efficacia del servizio offerto dalla societa statunitense Intelius Inc. che fornisce, per un importo variabile da 1 a 10 dollari, le seguenti informazioni relative ad ogni cittadino americano: indirizzi in cui ha abitato, numero di...

Research paper thumbnail of The “Dark Side” of Big Data: Private and Public Interaction in Social Surveillance

Computer Law Review International, 2013

bria, is author of paragraphs III. and IV. (par. 5), V. Further information about the authors on ... more bria, is author of paragraphs III. and IV. (par. 5), V. Further information about the authors on p. 192. The revolution in social analysis due to Big Data and their predictive capacities poses different questions related to risks of asymmetries in the control over information. In order to have access to this technology and to exploit its power, it is necessary to have the availability of large data sets and to invest heavily in equipment and research. Only governments and big companies have these resources and, consequently, are able to exercise such control over digital information both to enhance their performances and to enhance their control over individuals. Considering the role of government agencies and their increasing requests of information to the private sector for public security purposes, it appears necessary to adopt specific rules in order to regulate the information flow, to define the rights over data and to ensure adequate enforcement. If it is true that information is often publicly available, it is also true that the line between the public and private sphere will become even more blurred in the Big Data era. After a brief introduction (I.) this article first outlines the new scenario of Big Data (II.) before analyzing the governments' interplay with private entities which crucially enhances their social control (III.). Finally, the currently envisaged changes by the EU reform on data protection are scrutinized in their potential effects on the future of social control (IV.

Research paper thumbnail of Cloud Computing and Data Jurisdiction: A New Challenge for Digital Forensics

… 2012, The Third International Conference on Technical …, 2012

Abstract: Although it has become clear that digital forensics–the practical analysis of digital d... more Abstract: Although it has become clear that digital forensics–the practical analysis of digital data following the acquisition of a bit-stream image of a suspect's hard disk–suffered a setback with the wide adoption of mobile devices and the increasing use of flash memory ...

Research paper thumbnail of Security of the Digital Natives

SSRN Electronic Journal, 2014

Research paper thumbnail of The Law of Service Robots

Research paper thumbnail of Legal Aspects of Information Science, Data Science and Big Data

1. Introduction. The legal challenges of the use of data. – 1.1 Data collection and data processi... more 1. Introduction. The legal challenges of the use of data. – 1.1 Data collection and data processing. The fundamentals of data protection regulations. – 1.1.1 The EU model. From Data Protection Directive to GDPR – 1.1.2 Use of data and risk-analysis. – 2. Use of data for decision-making purposes. From individual to collective dimension of data processing. – 2.1 Data-centered approach and socio-ethical impacts. – 2.2 Multiple-risk assessment and collective interests. – 2.3 The guidelines adopted by the Council of Europe on the protection of individuals with regard to the processing of personal data in a world of Big Data. – 3. Data prediction: social control and social surveillance. – 3.1 Use of data during the investigation: reasonable doubt vs reasonable suspicion. – 3.2 Big Data and social surveillance: Public and Private Interplay in Social Control – 3.3 The E.U. reform on data protection.

Research paper thumbnail of Privacy vs. security? A dliemma of the digital era

Research paper thumbnail of Internet of Things (IoT)

Research paper thumbnail of Digital evidence: profili tecnico-giuridiche e garanzie dell'imputato

Il principio del libero convincimento del giudice nella valutazione della prova trova i suoi pres... more Il principio del libero convincimento del giudice nella valutazione della prova trova i suoi presupposti nel combinato disposto degli artt. 192 e 546, comma 1, lett. e), c.p.p.; osserva correttamente G. Canzio che le due norme pretendono, da un lato, che ogni passaggio argomentativo sia giustificato dal Giudice, che "valuta l'elemento di prova dando conto nella motivazione dei risultati probatori acquisiti e dei criteri d'inferenza adottati" e dall'altro che "la sentenza contenga, con la concisa esposizione dei motivi di fatto e di diritto su cui essa è fondata, l'indicazione delle prove poste a base della decisione stessa e l'enunciazione delle ragioni per le quali il giudice ritiene non attendibili le prove contrarie". G. Canzio,

Research paper thumbnail of Criminal Liability for Internet Intermediaries in Europe: A First Case Study in Italy

... Abstract: Mr. Giuseppe Vaciago, a former member of the Visiting Scholars and Researchers comm... more ... Abstract: Mr. Giuseppe Vaciago, a former member of the Visiting Scholars and Researchers community, spoke on "Criminal Liability for Internet Intermediaries in Europe: A First Case Study in Italy" based on his experience from the highly publicized trial in which three Google ...

Research paper thumbnail of Fostering cybersecurity in Europe through regulation

Research paper thumbnail of Legal aspects of information science, data science, and Big Data ∗

Frontiers in Data Science, 2017

This chapter investigates the limits and criticisms of the existing legal framework and the possi... more This chapter investigates the limits and criticisms of the existing legal framework and the possible options to provide adequate answers to the new challenges of Big Data processing. In this light, this chapter is divided into three main sections. The first section focuses on the traditional paradigm of data protection and on the provisions, primarily in the new EU General Data Protection Regulation (Regulation (EU) 2016/679, hereafter GDPR), that can be used to safeguard individual rights in Big Data processing. The second section goes beyond the existing legal framework and, in the light of the path opened by the guidelines on Big Data adopted by the Council of Europe, suggests a broader approach that encompasses the collective dimension of data protection. This dimension often characterizes Big Data applications and leads to assess the ethical and social impacts of data uses, which assume an important role in many Big Data contexts. The last section deals with the use of Big Data to anticipate fraud detection and to prevent crime. In this light, the new Directive (EU) 2016/680 † is briefly analyzed. Da

Research paper thumbnail of The “Dark Side” of Big Data: Private and Public Interaction in Social Surveillance

Computer Law Review International, 2013

Research paper thumbnail of The common EU approach to personal data and cybersecurity regulation

International Journal of Law and Information Technology

Several sector-specific studies on EU data protection and cybersecurity frameworks can be found i... more Several sector-specific studies on EU data protection and cybersecurity frameworks can be found in the literature, but their differing legal domains has hindered the development of a common analysis of the different sets of provisions from a business perspective. This article sets out to bridge this gap, providing a systematic review and a cross-cutting operational analysis of the main legal instruments that constitute the common European approach to personal data and cybersecurity regulation for the business sector. We aim to demonstrate the existence of a core of common principles and procedural approaches referring to specific cybersecurity and data security technologies. Analysis reveals a coordinated regulatory model based on five pillars: risk-based approach, by-design approach, reporting obligations, resilience and certification schemes. We also highlight the relationship between the main directives and regulations.

Research paper thumbnail of Reconciling Data Protection and Cybersecurity: An Operational Approach for Business Sector

Services and Business Process Reengineering

Research paper thumbnail of Prevention and Fight Against Cybercrime the Illbuster Project

Mucchi editore, 2015

in “Ciberspazio e Diritto”, Rivista Internazionale di Informatica Giuridica, vol. 16 n. 52 (1-2015)

Research paper thumbnail of Legal aspects of information science, data science, and Big Data ∗

Frontiers in Data Science, 2017

This chapter investigates the limits and criticisms of the existing legal framework and the possi... more This chapter investigates the limits and criticisms of the existing legal framework and the possible options to provide adequate answers to the new challenges of Big Data processing. In this light, this chapter is divided into three main sections. The first section focuses on the traditional paradigm of data protection and on the provisions, primarily in the new EU General Data Protection Regulation (Regulation (EU) 2016/679, hereafter GDPR), that can be used to safeguard individual rights in Big Data processing. The second section goes beyond the existing legal framework and, in the light of the path opened by the guidelines on Big Data adopted by the Council of Europe, suggests a broader approach that encompasses the collective dimension of data protection. This dimension often characterizes Big Data applications and leads to assess the ethical and social impacts of data uses, which assume an important role in many Big Data contexts. The last section deals with the use of Big Data to anticipate fraud detection and to prevent crime. In this light, the new Directive (EU) 2016/680 † is briefly analyzed. Da

Research paper thumbnail of Opportunities and Challenges in the Legal Tech Services in the Italian and European Framework

Research paper thumbnail of New Challenges in Robotics. Cyber Security and Digital Forensics

The coming years are certain to be critical for the robotics industry, as it refines the capacity... more The coming years are certain to be critical for the robotics industry, as it refines the capacity to massively produce robots. As this shift takes place, these robots will increasingly become integrated into our everyday lives. The use of Unmanned Aerial Vehicles (UAVs), also known as drones, is increasing in both the military and civilian sectors. Although we are used to the concept of military drones, commercial and civilian use of the technology is still evolving. Small drones are compact, easy to carry, and can be concealed in a bag or a backpack. In the transportation sector, the development of Google’s Driverless Car, an autonomous motor vehicle, and of Android Auto and Apple CarPlay, provide insight into the future of personal transportation, and alludes to the possibility of greatly reducing accidents and providing vital transport to individuals who could not operate a motor vehicle otherwise. If there is no doubt about the usefulness of robotics in terms of development of i...

Research paper thumbnail of The Law of Service Robots Ricognizione dell'assetto normativo rilevante nell'ambito della robotica di servizio: stato dell'arte e prime raccomandazioni di policy in una prospettiva multidisciplinare

Research paper thumbnail of Privacy e tutela dell’ordine pubblico in Europa e negli Stati Uniti: un differente approccio per raggiungere un difficile compromesso

I dati digitali che vengono generalmente richiesti in ambito investigativo possono generalmente d... more I dati digitali che vengono generalmente richiesti in ambito investigativo possono generalmente dividersi fra quelli che consentono l’identificazione di un potenziale criminale (indirizzo IP), quelli che ne determinano l’attivita on line (log files) e quelli che consentono di conoscere le sue conversazioni (intercettazioni telematiche). Si ritiene, generalmente, che questo tipo di informazioni possa essere ottenuta solo attraverso una precisa richiesta da parte dell’autorita ai fornitori di connettivita o ai provider che offrono servizi di posta elettronica e/o ospitano contenuti generati dagli utenti; tuttavia una gran parte di queste informazioni puo essere anche indirettamente reperita semplicemente navigando in Rete. Sono rimasto davvero sorpreso dell’efficacia del servizio offerto dalla societa statunitense Intelius Inc. che fornisce, per un importo variabile da 1 a 10 dollari, le seguenti informazioni relative ad ogni cittadino americano: indirizzi in cui ha abitato, numero di...

Research paper thumbnail of The “Dark Side” of Big Data: Private and Public Interaction in Social Surveillance

Computer Law Review International, 2013

bria, is author of paragraphs III. and IV. (par. 5), V. Further information about the authors on ... more bria, is author of paragraphs III. and IV. (par. 5), V. Further information about the authors on p. 192. The revolution in social analysis due to Big Data and their predictive capacities poses different questions related to risks of asymmetries in the control over information. In order to have access to this technology and to exploit its power, it is necessary to have the availability of large data sets and to invest heavily in equipment and research. Only governments and big companies have these resources and, consequently, are able to exercise such control over digital information both to enhance their performances and to enhance their control over individuals. Considering the role of government agencies and their increasing requests of information to the private sector for public security purposes, it appears necessary to adopt specific rules in order to regulate the information flow, to define the rights over data and to ensure adequate enforcement. If it is true that information is often publicly available, it is also true that the line between the public and private sphere will become even more blurred in the Big Data era. After a brief introduction (I.) this article first outlines the new scenario of Big Data (II.) before analyzing the governments' interplay with private entities which crucially enhances their social control (III.). Finally, the currently envisaged changes by the EU reform on data protection are scrutinized in their potential effects on the future of social control (IV.

Research paper thumbnail of Cloud Computing and Data Jurisdiction: A New Challenge for Digital Forensics

… 2012, The Third International Conference on Technical …, 2012

Abstract: Although it has become clear that digital forensics–the practical analysis of digital d... more Abstract: Although it has become clear that digital forensics–the practical analysis of digital data following the acquisition of a bit-stream image of a suspect's hard disk–suffered a setback with the wide adoption of mobile devices and the increasing use of flash memory ...

Research paper thumbnail of Security of the Digital Natives

SSRN Electronic Journal, 2014

Research paper thumbnail of The Law of Service Robots

Research paper thumbnail of Legal Aspects of Information Science, Data Science and Big Data

1. Introduction. The legal challenges of the use of data. – 1.1 Data collection and data processi... more 1. Introduction. The legal challenges of the use of data. – 1.1 Data collection and data processing. The fundamentals of data protection regulations. – 1.1.1 The EU model. From Data Protection Directive to GDPR – 1.1.2 Use of data and risk-analysis. – 2. Use of data for decision-making purposes. From individual to collective dimension of data processing. – 2.1 Data-centered approach and socio-ethical impacts. – 2.2 Multiple-risk assessment and collective interests. – 2.3 The guidelines adopted by the Council of Europe on the protection of individuals with regard to the processing of personal data in a world of Big Data. – 3. Data prediction: social control and social surveillance. – 3.1 Use of data during the investigation: reasonable doubt vs reasonable suspicion. – 3.2 Big Data and social surveillance: Public and Private Interplay in Social Control – 3.3 The E.U. reform on data protection.

Research paper thumbnail of Privacy vs. security? A dliemma of the digital era