Protecting Privacy in Surveillance Societies : The Federal Republic of Germany, Sweden, France, Canada, and the United States
, by Flaherty, David H.Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780807843529 | 0807843520
- Cover: Paperback
- Copyright: 2/1/1992
Flaherty examines the passage, revision, and implementation of privacy and data protection laws at the national and state levels in Sweden, Canada, France, Germany, and the United States. He offers a comparative and critical analysis of the challenges data protectors face int their attempt to preserve individual rights.
David H. Flaherly is professor of history and law at the University of Western Ontario
Preface | p. xiii |
Acknowledgments | p. xvii |
Abbreviations | p. xxi |
Introduction | p. 1 |
The Emergence of Surveillance Societies | p. 1 |
Protecting Privacy in Surveillance Societies | p. 6 |
The Role of Data Protection Agencies | p. 11 |
The Structure of the Case Studies | p. 16 |
The Federal Republic of Germany | |
The West German Model | p. 21 |
Introduction | p. 21 |
The Development of Legislation | p. 22 |
Formative Influences | p. 24 |
The Organization of Data Protection | p. 26 |
The Goals of Data Protection | p. 30 |
Statutory Objectives | p. 30 |
Philosophical Objectives | p. 33 |
Information Management Objectives | p. 35 |
The Power of Data Protection Commissioners | p. 40 |
Independence | p. 40 |
Powers of Intervention | p. 43 |
The Use of Power | p. 44 |
The Decision of the Federal Constitutional Court | p. 46 |
The Implementation of Data Protection | p. 48 |
Data Protection Commissioners and Their Staffs | p. 48 |
Data Protection Activities | p. 56 |
Data Protection in Practice | p. 65 |
The Regulation of Surveillance Systems | p. 69 |
Social Security | p. 69 |
The Police and Criminal Information Systems | p. 71 |
The Security Agencies | p. 74 |
Population Registration, PINs, and Identity Cards | p. 77 |
Census and Statistics | p. 79 |
Responding to Privacy and Surveillance Problems | p. 84 |
The Adequacies of Implementation | p. 84 |
Revision of the Data Protection Laws | p. 86 |
Sweden | |
The Swedish Model | p. 93 |
Introduction | p. 93 |
The Development of Legislation | p. 94 |
Formative Influences | p. 96 |
The Organization of the Data Inspection Board | p. 101 |
The Goals of Data Protection | p. 104 |
Data Processing | p. 104 |
Privacy Considerations | p. 104 |
Information Management Objectives | p. 107 |
Conflicts Inherent in the Data Act | p. 108 |
The Power of the Data Inspection Board | p. 112 |
Independence | p. 112 |
Powers of Intervention | p. 115 |
The Control of Record Linkages | p. 120 |
The Political Climate and the Use of Power | p. 122 |
The Implementation of Data Protection | p. 126 |
The Staff of the Data Inspection Board | p. 126 |
The DIB's Operational Tools | p. 131 |
Data Protection in Practice | p. 139 |
The Regulation of Surveillance Systems | p. 143 |
The Police and Criminal Information Systems | p. 143 |
The National Tax Board | p. 145 |
Personal Identification Numbers | p. 147 |
The National Register of Names and Addresses (SPAR) | p. 149 |
Statistics and Research | p. 151 |
Responding to Privacy and Surveillance Problems | p. 156 |
The Achievements and Adequacies of Implementation | p. 156 |
Meeting the Challenge of Revision | p. 159 |
France | |
The French Model | p. 165 |
Introduction | p. 165 |
The Development of Legislation | p. 166 |
Formative Influences | p. 169 |
The Organization of the CNIL | p. 172 |
The Goals of Data Protection | p. 175 |
Statutory Objectives | p. 175 |
Philosophical Objectives | p. 178 |
Information Management Objectives | p. 179 |
The Power of the Commission | p. 182 |
Independence | p. 182 |
Powers of Intervention | p. 186 |
The Political Climate and the Use of Power | p. 188 |
The Implementation of Data Protection | p. 192 |
The Members and Staff of the CNIL | p. 192 |
The Activities of the CNIL | p. 200 |
Data Protection Principles in Practice | p. 209 |
The Regulation of Surveillance Systems | p. 215 |
The Police and Criminal Information Systems | p. 215 |
The National Security Agencies | p. 218 |
Project AUDASS-ENFANCE: Social Assistance to Children | p. 220 |
Project GAMIN: The Surveillance of Newborn Children | p. 221 |
Automated Identity Cards | p. 226 |
The National Identification Register (NIR) | p. 229 |
Responding to Privacy and Surveillance Problems | p. 233 |
The Status of Implementation | p. 233 |
Revising the 1978 Law | p. 237 |
Canada | |
The Canadian Model | p. 243 |
Introduction | p. 243 |
The Development of Federal Legislation | p. 243 |
Formative Influences | p. 245 |
Significant Provisions | p. 246 |
The Organization of Data Protection | p. 248 |
The Goals of Data Protection | p. 253 |
Conflicts over Data Protection | p. 256 |
The Power of the Privacy Commissioner | p. 259 |
The Issue of Independence | p. 259 |
The Exercise of Power | p. 260 |
The Implementation of Data Protection | p. 263 |
The Office of the Privacy Commissioner | p. 263 |
Activities of the Privacy Commissioner and the Treasury Board | p. 265 |
Data Protection Principles in Practice | p. 278 |
The Regulation of Surveillance Systems | p. 281 |
The Social Insurance Number | p. 281 |
Police Information Systems: The RCMP and CPIC | p. 284 |
The Security Services | p. 291 |
Revenue Canada Taxation | p. 294 |
Responding to Privacy and Surveillance Problems | p. 297 |
The Achievements and Adequacies of Implementation | p. 297 |
Revising the Privacy Act | p. 298 |
The United States | |
The United States Model | p. 305 |
Introduction | p. 305 |
The Development of Federal Legislation | p. 306 |
The Rejected Models | p. 310 |
Formative Influences | p. 314 |
The Organization of Data Protection | p. 315 |
The Goals of Data Protection | p. 321 |
The Power of Data Protection Agents | p. 325 |
Independence | p. 325 |
The Exercise of Intervention | p. 325 |
The Implementation of Data Protection | p. 328 |
Supervision, Advising, and Training | p. 328 |
Shaping New Laws and Regulations | p. 341 |
The Privacy Act in the Courts | p. 342 |
The Regulation of Computer Matching | p. 344 |
The OMB Guidelines on Matching Programs | p. 346 |
Conclusions about the Guidelines on Matching Programs | p. 349 |
The Monitoring of Matching Programs | p. 350 |
The Challenge of Matching Programs to Personal Privacy | p. 352 |
The Computer Matching and Privacy Protection Act | p. 356 |
Responding to Privacy and Surveillance Problems | p. 359 |
The Adequacies of Implementation | p. 359 |
The Need for a Privacy Protection Commission | p. 361 |
Revising the Privacy Act | p. 367 |
Conclusion: Controlling Surveillance | p. 371 |
The Necessity of Data Protection Laws | p. 371 |
Defining Privacy Interests to Limit Surveillance | p. 377 |
The Need for Data Protection Agencies | p. 381 |
The Effective Conduct of Data Protection | p. 385 |
Independence and the Exercise of Power | p. 391 |
The Adequacy of Advisory Powers | p. 394 |
The Primacy of Data Protection Concerns | p. 397 |
Complaints, Audits, and Access Rights | p. 400 |
Monitoring Surveillance Technology | p. 402 |
Strengthening Data Protection Legislation | p. 404 |
Notes | p. 409 |
Index | p. 467 |
Tables | |
Privacy Interests of Individuals in Information about Themselves | p. 8 |
Chronology of West German Data Protection Legislation | p. 23 |
Chronology of Swedish Data Protection Legislation | p. 97 |
Chronology of French Data Protection Legislation | p. 167 |
Chronology of Canadian Federal Data Protection Legislation | p. 244 |
Chronology of United States Federal Data Protection Legislation | p. 307 |
Data Protection Principles and Practices for Government Personal Information Systems | p. 380 |
Table of Contents provided by Syndetics. All Rights Reserved. |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.