Data retention Research Papers - Academia.edu (original) (raw)

There is an ongoing movement towards situated and relational, rather than static and transcendental, understandings of research ethics within Geography. Yet this tendency has not yet succeeded in destabilising a priori judgements of... more

There is an ongoing movement towards situated and relational, rather than static and transcendental, understandings of research ethics within Geography. Yet this tendency has not yet succeeded in destabilising a priori judgements of ethnographic engagements with unlawful spatial practices. As such, many socially and politically important projects are either sidelined or eschewed for fear of liability or complicity. In cases where ethnography is deployed, primarily in the field of participatory action research, the tensions between ethics and legality are not often explicitly engaged with. We want to suggest here, in light of increasing interest amongst geographers in 'subversive' spatial practices, that ethnographies of illegality raise a range of important ethical concerns for research practices that also inform broader understandings of situated ethical frameworks. In this vein, the authors draw on past and ongoing ethnographic experiences into illicit spatial practices (or what criminologists have termed 'edge ethnographies') to think through the entire process of research engagement – from planning to data retention – with consideration to the incommensurable relationship between ethics and law where we take situated ethics seriously.

La disciplina di data retention prevista dall’art. 132 codice privacy è stata oggetto di numerose riformulazioni. Il presente scritto mira ad analizzare le modifiche da ultimo apportate dal d.lgs. 10 agosto 2018 n. 101. Accanto ad... more

La disciplina di data retention prevista dall’art. 132 codice privacy è stata oggetto di numerose riformulazioni. Il presente scritto mira ad analizzare le modifiche da ultimo apportate dal d.lgs. 10 agosto 2018 n. 101. Accanto ad opportune chiarificazioni normative, emergono aspetti più critici. Il tema centrale è rappresentato dalle tempistiche di conservazione dei dati. Al riguardo, l’autrice dimostra come, da una lettura sinottica dell’art. 132 codice privacy e dell’art. 24 cd. legge europea 2017, emerga la tendenziale dilatazione a settantadue mesi di tali tempistiche in rapporto alla repressione di tutte le tipologie di reato.

The material scope of the research problem presented in the text encompasses the issues concerned with operational surveillance that the Polish civilian counter-intelligence service, i.e. the Internal Security Agency (in Polish... more

The material scope of the research problem presented in the text encompasses the issues concerned with operational surveillance that the Polish civilian counter-intelligence service, i.e. the Internal Security Agency (in Polish abbreviated as ABW-Agencja Bezpieczeństwa Wewnętrznego), is authorised to. The main purpose of the analysis is to assess the changes introduced as a result of the passing of the so-called Surveillance Act in 2016. The Act was supposed to introduce new regulations with regard to the powers concerning operational surveillance and obtaining of ICT data, granted to particular secret and police services. The said changes were enforced by the judgment of the Constitutional Tribunal, which in 2014 found numerous violations of the provisions of the Constitutions of the Republic of Poland caused by the existing regulations authorising the services to engage in particular operational and investigative actions. In order to elaborate the material scope of the research problem, and to present the conclusions, the following research questions have been presented in the text: Do the legal regulations concerning the powers vested in the Polish civilian counter-intelligence service within operational surveillance infringe individual rights and freedoms (e.g. the right to privacy, protection of personal information, privacy of correspondence), and if so, then to what extent? Functional and pro-constitutional interpretations have been applied to assess the provisions regulating the powers of the Internal Security Agency with regard to operational surveillance and obtaining of ICT data. The functional interpretation focuses on the function of selected legal solutions, whereas the pro-constitutional interpretation focuses on the assessment of legal solutions in the context of the principles of a democratic state ruled by law, as well as human rights and freedoms. As regards the pro-constitutional interpretation, the tool used for assessment is the test of proportionality, i.e. the rule used for interpreting legal norms according to the degree and legitimacy of the interference in individual rights and freedoms.

This article focuses on the balance between public security and the rights to privacy and data protection in the light of the strong restrictions placed on these rights by directive 2006/24/EC (the so called Data Retention Directive). The... more

This article focuses on the balance between public security and the rights to privacy and data protection in the light of the strong restrictions placed on these rights by directive
2006/24/EC (the so called Data Retention Directive). The first part of the article examines the main features of the Data Retention Directive in order to underline the switch from data protection to data retention embraced by the European Union in the post 9-11 era. The second part analyses some of the problematic aspects of the data retention framework both at European and national levels. In particular, focusing on the issue of the indiscriminate monitoring of ordinary citizens due to the generalized collecting of metadata, the article examines the domestic Courts’decisions and the recent judgment of the CJEU. In this regard, the article outlines possible future developments both at European and national levels.

In 2006 the European Union (EU) adopted a directive which imposed on telecommunication operators an obligation to store all the telecommunication data (data retention) and provide access to retained data to state authorities in order to... more

In 2006 the European Union (EU) adopted a directive which imposed on telecommunication operators an obligation to store all the telecommunication data (data retention) and provide access to retained data to state authorities in order to combat serious crime. The new legislation had to been implemented by all EU Member States. Immediately after the directive was issued, it triggered controversy. Substantial reservations against this measure had been confirmed by five European constitutional courts already within the first eight years since its introduction. In 2014 the Court of Justice of the European Union (CJEU) also acknowledged those reservations. Since then, further European constitutional courts invalidated domestic legislation on data retention. This jurisprudence posed a unique research opportunity to verify whether a genuine judicial dialogue within the varied legal systems occurred in the EU. In this article we analyze jurisprudence of constitutional courts, CJEU, and the European Court of Human Rights (ECtHR) on data retention. We identify interactions between domestic and international standards of privacy protection. The main method employed is a comparative study of all the judgments (following their translation) along with a simultaneous analysis of the common EU regulatory framework that all of those judgments challenged. A pivotal finding was an identification of three basic models clearly describing approaches taken by the constitutional courts involved. As the basis for our models, we used the approach of constitutional courts to two pan-European courts: ECtHR and CJEU. We claim that the analyzed jurisprudence constituted an important building block in the construction of a constitutional tradition relating to the protection of privacy based on the European Convention of Human Rights. Existence of this tradition led to the 2014 CJEU judgment (and to subsequent judgments of national constitutional courts).

This article constitutes a short version of my forthcoming Ph.D. thesis. It delivers a human rights-based analysis of anti-terrorism policies in a European context, looking at the cases of the UK, Germany, and the EU. The article claims... more

This article constitutes a short version of my forthcoming Ph.D. thesis. It delivers a human rights-based analysis of anti-terrorism policies in a European context, looking at the cases of the UK, Germany, and the EU. The article claims that all three players have at times breached human rights norms, either in terms of legal standards or in terms of the wider aims of the concept of human rights. The EU, however, provides at the same time as it breaches human rights, safeguards for the protection of the same. Human rights breaches could for the mentioned cases be detected both in terms of a more narrow legal approach to human rights connecting to legally binding rights documents and court rulings (e.g. in terms of data retention), but also in terms of a broader understanding of human rights, connecting to the wider aims of rights, such as the guarantee of dignity, freedom and justice (the ‘spirit of rights’). I further try to give some points on which short and long-term strategies might be alternatives to the rights-infringing policies that often are applied by European states when trying to counter-act the phenomenon of terrorism.

Las medidas de retención de datos y registro de teléfonos móviles constituyen restricciones a los dere-chos fundamentales a la privacidad y a la libertad en las comunicaciones. Como tales, deben cumplir con una serie de requisitos mínimos... more

Las medidas de retención de datos y registro de teléfonos móviles constituyen restricciones a los dere-chos fundamentales a la privacidad y a la libertad en las comunicaciones. Como tales, deben cumplir con una serie de requisitos mínimos que garanticen el respeto a los estándares internacionales en materia de derechos humanos. Frente a la tendencia regional y global que lleva a gobiernos y a pro-veedores de servicio a acumular una cantidad cada vez mayor de información sobre sus usuarios, este estudio intenta una aproximación comparada a la manera en que las legislaciones de México, Brasil, Colombia, Perú, Argentina y Chile abordan la retención de datos y el registro de teléfonos móviles, de cara a sus obligaciones y compromisos internacionales en el marco interamericano, y en particular en relación a los proyectos legislativos que en Chile buscan realizar cambios al actual marco regulatorio de las telecomunicaciones.

The Information and Communication Technology nowadays plays a core role in the execution of crimes of economic criminality. This seems to be due to two factors, that can be defined as the structural factor and the instrumental factor.... more

The Information and Communication Technology nowadays plays a core role in the execution of crimes of economic criminality. This seems to be due to two factors, that can be defined as the structural factor and the instrumental factor. Moreover, every time we use the new technologies we leave behind us some sorts of “traces”, i.e. the traffic and location data on both legal entities and natural persons and to the related data necessary to identify the subscriber or registered user. Such data can be extremely useful in the context of criminal investigations. The regulation on the obligation of the States to require the retention of such data by service providers for investigative purposes, for the discovery and repression of crimes is called “data retention”. Data retention has some general features that are valid at global level.
Within the European Union the respective regulation set out by the Directive 2006/24/EC has been declared invalid by the Court of Justice of the European Union.
Therefore it seems necessary to adopt a new European regulation on data retention, regarding to which the article traces in its conclusions the possible reference points.

The Data Retention Directive is one of the most controversial acts adopted by the eu. The storage of an indeterminate amount of data – concerning every citizen of the eu – requires finding a balance between the need to fight terrorism and... more

The Data Retention Directive is one of the most controversial acts adopted by the eu. The storage of an indeterminate amount of data – concerning every citizen of the eu – requires finding a balance between the need to fight terrorism and the rights to privacy and data protection, as declared in the Charter of Fundamental Rights of the eu, the echr, and by the common constitutional values shared by Member States.
According to the cjeu (joined cases C-293/12 and C-594/12), the Directive ‘treats everyone as a suspect’, ‘monitors everyone’ and ‘puts everyone under surveillance’ and represents a ‘serious interference’ to citizens’ rights to privacy. The aim of this paper is to define – through a comparative analysis – the main features of the cjeu balancing process, trying to assess possible future scenarios for data retention in the European and domestic legal frameworks. The challenge remains the same: how to prevent serious crime and terrorism while preserving our fundamental rights?

La normativa sulla protezione dei dati personali è particolarmente complessa e stratificata, composta da leggi europee, generali e speciali, e nazionali, completate e interpretate dalle indicazioni delle competenti Autorità, anch’esse sia... more

La normativa sulla protezione dei dati personali è particolarmente complessa e stratificata, composta da leggi europee, generali e speciali, e nazionali, completate
e interpretate dalle indicazioni delle competenti Autorità, anch’esse sia unioniste sia nazionali, che costituiscono un vero e proprio “diritto vivente”.
Dubbi e le incertezze sulla corretta applicazione delle norme possono condurre ad effetti deleteri per il rischio di non individuare correttamente il perimetro di tutela e, come ha evidenziato la recente pandemia, quale sia la normativa applicabile nelle varie situazioni da parte dei vari soggetti coinvolti.
Molti sono ancora i dubbi interpretativi o le errate convinzioni, derivanti molto spesso dall’assenza di una reale conoscenza della normativa e delle sue implicazioni pratiche e giuridiche da parte di chi è tenuto ad attuarla: che differenza c’è fra analisi del rischio e DPIA, o fra diritto di accesso e portabilità dei dati? Come si fa a determinare correttamente i tempi di conservazione dei dati personali? Come si fa a dimostrare la conformità? In quali responsabilità può
incorrere il DPO? Quali sono i soggetti tutelati dal GDPR e quali quelli tutelati dalla complessiva normativa privacy?
Il libro cerca di rispondere a questi e altri quesiti fondamentali in modo semplice ma completo, accompagnando il lettore nella soluzione delle diverse
problematiche con un costante riferimento ai testi normativi, a metodologie e modulistica “ufficiale” e a buone pratiche. Chiudono il testo un paio di casi che illustrano nella pratica la complessità di una normativa nella quale ogni scelta implementativa si ripercuote su molteplici adempimenti.

SOMMARIO: 1. Introduzione -2. Titolarità e ragionevolezza dei nuovi poteri emergenziali: il principio di precauzione -3. La funzione di indirizzo nell'intelligence privatizzata: la data retention in Europa -3.1 La Direttiva Data Retention... more

SOMMARIO: 1. Introduzione -2. Titolarità e ragionevolezza dei nuovi poteri emergenziali: il principio di precauzione -3. La funzione di indirizzo nell'intelligence privatizzata: la data retention in Europa -3.1 La Direttiva Data Retention -3.2 Il futuro dell'esternalizzazione dopo la sentenza della Corte di Giustizia Digital Rights Ireland v. Ireland -4. Le falle dell'outsourcing nell'attuazione della Data Retention: il caso del Regno Unito -4.1 Le occasioni mancate dopo l'annullamento della Data Retention -5. Conclusioni.

Within the context of the SURVEILLE project, which offers a legal and ethical analysis of issues surrounding the use of surveillance technologies in the three phases of countering serious crime (prevention, investigation and prosecution)... more

Within the context of the SURVEILLE project, which offers a legal and ethical analysis of issues surrounding the use of surveillance technologies in the three phases of countering serious crime (prevention, investigation and prosecution) at the national as
well as at the EU level, this deliverable focuses on the use of
retained data in the fight against serious crime.
This research aims at conducting a comparative study of the use of retained data within selected national jurisdictions for the purpose of investigating and prosecuting serious crime.
The authors are testing in this paper a hypothesis, which is
used to describe a trend underlying a current evolution in
this domain. The hypothesis relates to the so-called catalysing effect of serious crime on the increasing use of data retention for the purpose of investigating and prosecuting serious crime.
The catalysing effect of serious crime on the use of such a measure
is amplified by the fact that the Data Retention Directive leaves a wide discretion to Member States and that the implementing legislation broadens the scope of application of data retention both regarding offences and authorities involved. T
hus, the access of data retained by the private sector for investigation purposes and the subsequent use for prosecution
purposes has been studied in nine EU Member States, namely Belgium, France, Germany, Italy, the Netherlands, Poland, Romania, Spain and the United Kingdom.
The comparative analysis of these case studies allow us to highlight potential differences in those legal provisions that
regulate the retention and subsequent use of information between European Member States with an authoritarian past and Member States without such a past.
The human rights dimension is the normative background of the
project as a whole, and thus of the present work.

Privacy is a condition that serves various ends, valuable it is said, because it: is a pre-requisite for human flourishing and well-being; 1 enables one to exercise dominion over a realm of intimate decisions; 2 is a pre-condition of... more

Privacy is a condition that serves various ends, valuable it is said, because it: is a pre-requisite for human flourishing and well-being; 1 enables one to exercise dominion over a realm of intimate decisions; 2 is a pre-condition of autonomous agency; 3 protects individuals against the misuse of personal information; 4 is integral to the proper functioning of a democracy; 5 enables subjects to develop and determine for themselves the nature of their social relationships; 6 is essential for securing respect for human dignity, 7 and so on. Notwithstanding differing emphasis when it comes to explaining the value of privacy, most of these accounts are developed -to greater and lesser degrees and in more and less explicit ways -within a framework of liberal values.

Abstract: The fundamental issues of social media are the ways that people relay something of themselves to others and how this shapes society. Plus, increasingly, there is the breadth of social media reach, and the depth of what is kept... more

Abstract: The fundamental issues of social media are the ways that people relay something of themselves to others and how this shapes society. Plus, increasingly, there is the breadth of social media reach, and the depth of what is kept in terms of related history of a person, captured constantly by postings and connections. As a consequence, much can be gleaned about people, especially as to their networks, actions and opinions. This leads to an additional matter of the concern generated when the massive amount of personal and socialised data is accessible, not only by befriended users of social media applications, but by government agencies, as is done for the purpose of pursuing political objectives. This gives social media a rather less than fresh and innocent appearance to any who see past the vast popularity of seemingly innocuous interchanges between old friends and new acquaintances met online.

Caspar Bowden, Director of the Foundation for Information Policy Research (FIPR), explains the technical and legal context of unprecedented new surveillance capabilities, with particular reference to the UK's Regulation of Investigatory... more

Caspar Bowden, Director of the Foundation for Information Policy Research (FIPR), explains the technical and legal context of unprecedented new surveillance capabilities, with particular reference to the UK's Regulation of Investigatory Powers (RIP) Act 2000. He discusses why these powers are unlikely to be effective in detecting or disrupting the communications of terrorist cells or organized crime, but present significant new threats to the security, privacy, and freedom of expression of the law-abiding.

At the end of 2013, Russia further intensified its state electronic surveillance regime with an order placing new technical requirements on telecom companies. Unusually, there has been some push back from one of the largest telcos in the... more

At the end of 2013, Russia further intensified its state electronic surveillance regime with an order placing new technical requirements on telecom companies. Unusually, there has been some push back from one of the largest telcos in the country, Vympelcom. Their objections are clearly on the grounds of cost, nonetheless the angle being taken by Vympelcom is that the measure violates citizens' constitutional rights. However, despite the recent NSA controversy and heightened public awareness around privacy and rights online, this argument has sparked little interest among the general public.

This article presents an analysis of public debate about a pressing political issue on a novel Web arena in a small linguistic community: the debate on Twitter about the implementation of the European Union’s Data Retention Directive in... more

This article presents an analysis of public debate about a pressing political issue on a novel Web arena in a small linguistic community: the debate on Twitter about the implementation of the European Union’s Data Retention Directive in Norway. Who participates in this communication, and how can we characterize different forms of use? The analysis is based on data gathered from more than 12,000 tweets over a 16–week period. Findings reveal a heavily skewed distribution of activity among users, favoring a tiny core, which consists of five groups with different patterns of use. Discussing Twitter as an arena for public debate, I argue that, although its impact comes across as minuscule, Twitter does seem to facilitate direct engagement among adversaries. These adversaries do, however, still belong to groups that share characteristics with offline elites.

To reduce the substantial leakage current, the supply voltage of SRAM cells has being scaled down towards its lower limit, which is called the data Retention Voltage (DRV). Although the power consumption is largely reduced, this... more

To reduce the substantial leakage current, the supply voltage of SRAM cells has being scaled down towards its lower limit, which is called the data Retention Voltage (DRV). Although the power consumption is largely reduced, this down-scaling trend, however, impacts the stability of the SRAM cell due to the unpredictable process or device parameter variations. In this work, we propose a novel method to evaluate the DRV of SRAM cells at the presence of variations. The DRV issue is first formulated as a time domain worst performance bound problem. To accurately and efficiently evaluate the DRV, a multi-start point (MSP) optimization strategy is then studied and developed with the use of practical circuit simulator. One feature of the proposed method is that it can efficiently evaluate the DRV without suffering from any process/model accuracy. Experiment results show that it achieves a speedup of 3 and 5-7 order over the Importance Sampling (IS) and Monte Carlo (MC) method respectively under the context of the DRV evaluation in this paper. The proposed method can serve as an efficient DRV evaluation tool on any specific technology process or in-house circuit simulator. In this work, the DRVs at the technology node from 130 nm to 45 nm under the influence of different variation sources are also presented and analyzed.

This article constitutes a short version of my forthcoming Ph.D. thesis. It delivers a human rights-based analysis of anti-terrorism policies in a European context, looking at the cases of the UK, Germany, and the EU. The article claims... more

This article constitutes a short version of my forthcoming Ph.D. thesis. It delivers a human rights-based analysis of anti-terrorism policies in a European context, looking at the cases of the UK, Germany, and the EU. The article claims that all three players have at times breached human rights norms, either in terms of legal standards or in terms of the wider aims of the concept of human rights. The EU, however, provides at the same time as it breaches human rights, safeguards for the protection of the same. Human rights breaches could for the mentioned cases be detected both in terms of a more narrow legal approach to human rights connecting to legally binding rights documents and court rulings (e.g. in terms of data retention), but also in terms of a broader understanding of human rights, connecting to the wider aims of rights, such as the guarantee of dignity, freedom and justice (the ‘spirit of rights’). I further try to give some points on which short and long-term strategies might be alternatives to the rights-infringing policies that often are applied by European states when trying to counter-act the phenomenon of terrorism.

The article analyses the legitimacy of citizens telecommunications data retention usage in the fight against terrorism. Data retention, that is the preventive storage of information on the source, data, hour and duration of a connection,... more

The article analyses the legitimacy of citizens telecommunications data retention usage in the fight against terrorism. Data retention, that is the preventive storage of information on the source, data, hour and duration of a connection, type of the connection, communication tool and location of a recipient, is a powerful source of knowledge about citizens and their use should be soundly justified. However, both the European Union and Polish practices show that behind this interference in privacy there is neither a guarantee that the data stored would be used exclusively to fight terrorism and severe crimes, nor a sufficient access control mechanism. The efficiency of data use in the fight against organized crimes, including terrorism, is also dubious.
In her work the author analyses Polish studies concerning information disclosure issues, Internet publications of the European Union and American reports on retention programmes, as well as Polish and foreign positions of non-governmental organizations engaged in the civil rights protection in this respect.

“There was, of course, no way of knowing whether you were being watched at any given moment... it was even conceivable that [the Thought Police] watched everybody all the time... They could plug in your wire whenever they wanted to. You... more

“There was, of course, no way of knowing whether you were being watched at any given moment... it was even conceivable that [the Thought Police] watched everybody all the time... They could plug in your wire whenever they wanted to. You had to live... in the assumption that... every movement was scrutinized."- George Orwell 1947, in 1984
The Attorney General’s Department has defined ‘metadata’ in a parliamentary submission as; “information about an electronic communication, a footprint left after accessing the Internet, sending an email, or making a phone call” (Agent, The 2014). The content of any communication form is not collected, but metadata can include, but is not limited to; date, time, durations of contact, locational information, phone numbers, IP addresses, and individual party information (Brew, 2012). Immediately, in the definition of metadata, arises an issue. The ambiguity of the definition, aside from stating what it is not, is disconcerting in any event.

Esse artigo analisa o contexto de aprovação da Lei de Retenção de Dados e Poderes Investigatórios (Data Retention and Investigatory Powers Act 2014) no Reino Unido e as críticas feitas por ativistas e acadêmicos à pressa pela qual os... more

Esse artigo analisa o contexto de aprovação da Lei de Retenção de Dados e Poderes Investigatórios (Data Retention and Investigatory Powers Act 2014) no Reino Unido e as críticas feitas por ativistas e acadêmicos à pressa pela qual os parlamentares ampliaram as capacidades institucionais do Estado de vigilância inglês sem maiores debates públicos.

Lo scorso 8 aprile 2014, la Grande Sezione della Corte di Giustizia dell'Unione Europea ha emesso la sentenza relativa alle cause riunite C-293/12 e C-594/12, presentate rispettivamente dall'Alta Corte d'Irlanda e dalla Corte... more

Lo scorso 8 aprile 2014, la Grande Sezione della Corte di Giustizia dell'Unione Europea ha emesso la sentenza relativa alle cause riunite C-293/12 e C-594/12, presentate rispettivamente dall'Alta Corte d'Irlanda e dalla Corte Costituzionale austriaca in sede di rinvio pregiudiziale ex art. 267 TFUE per accertare la validità della direttiva in materia di conservazione dei dati (cd. Data retention directive, dir. 2006/24/CE del Parlamento Europeo e del Consiglio del 15 marzo 2006, che modifica la dir. 2002/58/CE). Obiettivo principale della direttiva era l'armonizzazione della disciplina normativa degli Stati membri in tema di conservazione dei dati generati o trattati dai fornitori di servizi di comunicazione elettronica accessibili al pubblico o di una rete pubblica di comunicazione, al fine di consentire alle autorità di pubblica sicurezza l'accesso a tali dati nell'ambito di attività di indagine, accertamento e perseguimento di reati di particolare gravità, come ad esempio quelli connessi al terrorismo e alla criminalità organizzata. A tale scopo, la direttiva prevedeva che i citati operatori dovessero conservare per un periodo non inferiore a sei mesi e non superiore a due anni i dati relativi al traffico telefonico e internet, quelli relativi alla localizzazione geografica delle comunicazioni e quelli relativi all'identità di tutti gli utenti dei servizi di telecomunicazione. Le corti irlandese ed austriaca, rispettivamente nel giugno e nel novembre del 2012, ritenendo di non potersi pronunciare sulla costituzionalità della normativa interna di attuazione della direttiva prima che sulla conformità della stessa al diritto dell'Unione si fosse espressa la Corte di Lussemburgo, si sono ad essa rivolte per la verifica della validità della direttiva alla luce degli articoli 7, 8 e 11 della Carta dei diritti fondamentali dell'Unione europea. In attesa della pronuncia della Corte di Giustizia, peraltro, era anche la Corte Costituzionale slovena che, con ordinanza del settembre 2013, aveva sospeso il giudizio su di un ricorso per incostituzionalità della legge nazionale in materia di conservazione dei dati, ritenendo di dover necessariamente considerare l'opinione del giudice di Lussemburgo sulla direttiva. Nel dichiararne infine l'invalidità, la Corte di Giustizia argomenta anzitutto che l'obbligo posto in capo agli operatori dei servizi di telecomunicazione (art. 3 e 6) di conservare i dati cui si è fatto cenno costituisce una grave interferenza con il diritto al rispetto per la vita privata e familiare garantito dall'articolo 7 della Carta dei diritti fondamentali, in quanto l'accesso a tale complesso di dati consente di ottenere informazioni estremamente precise sulla sfera personale degli individui coinvolti. La Corte ricorda inoltre che, come da consolidata giurisprudenza della Corte europea dei Diritti dell'Uomo (Leander c. accesso ai dati da parte delle autorità nazionali competenti rappresenta un'ulteriore interferenza con i diritti garanti dall'articolo 7 della Carta. Similmente, a giudizio della Corte, la direttiva determina una grave ingerenza nel diritto alla protezione dei dati personali garantito dall'articolo 8 della Carta, nella misura in cui dispone il trattamento di dati direttamente inerenti gli individui. Inoltre, è da ritenersi probabile che la consapevolezza da parte degli utenti dell'esistenza di tale attività di conservazione determini conseguenze dirette sull'uso da parte di questi ultimi dei mezzi di comunicazione che ricadono nel disposto della direttiva; d'altro canto, poi, la conservazione e l'uso dei dati senza necessità di previo consenso da parte degli utenti possono secondo il giudice europeo ingenerare in questi ultimi la sensazione di essere costantemente sotto controllo. Ferma restando l'importanza dell'interesse generale al contrasto delle attività terroristiche e, più in generale, alla tutela della sicurezza collettiva, riconosciuto dalla Corte come fine ultimo cui la direttiva è preposta in conformità all'art. 52 della Carta dei diritti, non è tuttavia possibile secondo il giudice di Lussemburgo ritenere compatibile con i principi di proporzionalità e necessità ivi richiamati il contenuto della direttiva. Sebbene a titolo generale la conservazione dei dati risponda senz'altro in

The Authors present changes in the latest European Union legislation in the field of privacy protection. They clearly outline the background and context in which this comprehensive regulation is made, emphasizing the importance of... more

The Authors present changes in the latest European Union legislation in the field of privacy protection. They clearly outline the background and context in which this comprehensive regulation is made, emphasizing the importance of technological and social changes. They report the most important assumptions of new normative act but also present reservations that were formulated while working on these documents. Conducting their considerations, the Authors assume that privacy is a legally protected freedom. They point to new social, technological and cultural phenomena and the threads resulting from them to the privacy of people as well as public safety. They focus mainly on issues of privacy protection in electonic communication. They present main theses from the judgments of international judicial bodies, primarily the ECHR and the CJEU. Finally, they broadly present the findings of the Constitutional Tribunal that were made on the ground of the case under the reference number K 23/11 and a specific test for the evaluation of the constitutionality of the statutory regulation relating to the retention, collection and processing of personal data in modern electonic communication.

The discourse about so-called Social Networks, let alone Social Media, often ignores the ideological implications of these terms. Social as well as Network and of course Media are concepts that are very controversial in their respective... more

The discourse about so-called Social Networks, let alone Social Media, often ignores the ideological implications of these terms. Social as well as Network and of course Media are concepts that are very controversial in their respective scientific disciplines, such as sociology, anthropology or philosophy. One can not claim a clear and stable definition, but rather has to acknowledge their specific operational objectives when applying these terms to phenomena such as web based services, user generated content, ubiquitous computing, viral marketing (which is another euphemistic wording) and other topics of economic interest.

Artykuł poświęcony jest problemowi wykonania wyroku Trybunału Konstytucyjnego o sygn. K 23/11 oraz wyroku Trybunału Sprawiedliwości UE o sygn. C-293/12 w sprawie przepisów regulujących retencję danych telekomunikacyjnych i warunki ich... more

Artykuł poświęcony jest problemowi wykonania wyroku Trybunału Konstytucyjnego o sygn. K 23/11 oraz wyroku Trybunału Sprawiedliwości UE o sygn. C-293/12 w sprawie przepisów regulujących retencję danych telekomunikacyjnych i warunki ich udostępniania służbom policyjnym i specjalnym. Autor stawia tezę, że warunkiem poprawnego wykonania tych orzeczeń jest wprowadzenie co do zasady mechanizmu uprzedniej zgody sądu lub niezależnego organu państwa.

La revelación de distintos programas de vigilancia estatal a nivel mundial ha puesto en el ojo público las políticas públicas de retención de metadatos. Durante el 2017, el gobierno de Michelle Bachelet se propuso extender el período de... more

La revelación de distintos programas de vigilancia estatal a nivel mundial ha puesto en el ojo público las políticas públicas de retención de metadatos. Durante el 2017, el gobierno de Michelle Bachelet se propuso extender el período de retención de los mismos, a través del apodado “Decreto Espía” que modificaba el reglamento de interceptación de comunicaciones. La declaración de ilegalidad de este Decreto por parte de la Contraloría se presenta como una oportunidad para discutir cómo compatibilizar la retención de metadatos, como forma de generar evidencia criminal, con el derecho fundamental a la privacidad y la inviolabilidad de las comunicaciones.

On 30 July 2014, the Constitutional Tribunal delivered a long-awaited judgment in which it assessed the compatibility of particular provisions of domestic law on covert electronic surveillance with the Constitution and the Convention for... more

On 30 July 2014, the Constitutional Tribunal delivered a long-awaited judgment in which it assessed the compatibility of particular provisions of domestic law on covert electronic surveillance with the Constitution and the Convention for the Protection of Human Rights and Fundamental Freedoms. The case was heard after seven joint motions were filed in 2011 and 2012 by the Human Rights Defender (Ombudsman) and the Attorney General. The Tribunal did not deal with the provisions imposing on telecommunication providers the obligation to retain traffic and localisation data. It assessed only the statutory provisions on police and secret services’ access to retained data. The chapter discusses the roots of data retention in Poland, previous case law as well as legal effects of the Tribunal’s judgment of 2014 and its implementation by the legislator.