000 03123nam a22004935i 4500
001 978-1-4471-5586-7
003 DE-He213
005 20200421112224.0
007 cr nn 008mamaa
008 131015s2013 xxk| s |||| 0|eng d
020 _a9781447155867
_9978-1-4471-5586-7
024 7 _a10.1007/978-1-4471-5586-7
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
082 0 4 _a004
_223
100 1 _aWong, Rebecca.
_eauthor.
245 1 0 _aData Security Breaches and Privacy in Europe
_h[electronic resource] /
_cby Rebecca Wong.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2013.
300 _aVII, 54 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Cybersecurity,
_x2193-973X
505 0 _aForeword -- Introduction -- Data Protection Directive 95/46/EC -- The Amended Directive on Privacy and Electronic Communications -- Art. 29 Working Party: Future of Privacy -- European Commission Communication Opinion 2010 -- Proposed Data Protection Regulation 2012: Data Security Breach Notifications -- Framework Decision 2005/222/JHA and the Directive against Information Systems -- European Data Protection Supervisor's Opinion on Cybersecurity -- Cybersecurity Directive 2013 -- Criticism of the Cybersecurity Directive -- Concluding Remarks. .
520 _aData Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
650 0 _aComputer science.
650 0 _aComputers and civilization.
650 0 _aInternational law.
650 0 _aIntellectual property
_xLaw and legislation.
650 1 4 _aComputer Science.
650 2 4 _aComputers and Society.
650 2 4 _aInternational IT and Media Law, Intellectual Property Law.
650 2 4 _aCriminology and Criminal Justice, general.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781447155850
830 0 _aSpringerBriefs in Cybersecurity,
_x2193-973X
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4471-5586-7
912 _aZDB-2-SCS
942 _cEBK
999 _c57598
_d57598