The growing impact of information and communication technologies has resulted in the establishment of data protection authorities across Europe. Despite the role of these bodies as enforcers of privacy and data protection legislation, Surveillance Studies has so far offered little attention to their role in resistance. Based on a critical socio-legal examination of the Norwegian Data Inspectorate, the focus of this article is on the role of data protection authorities in resisting surveillance and threats to privacy and data protection. More specifically, the article asks what power the Norwegian Data Inspectorate has to achieve genuine resistance, and how its institutional structure affects this capability. Through a three-pronged analysis...
Among the wide variety of national and multinational legal regimes for protecting privacy, two domin...
Legal frameworks exist within democracies to prevent the misuse and abuse of personal data that law ...
This article analyses government deployment of information security sensor systems from primarily a ...
This Article examines a recent twist in European Union ( EU ) data protection law. In the 1990s, the...
Governments around the world are encouraging social science research using administrative data to su...
The processing of personal data has been one of the most widespread uses of computers ever since the...
Governments around the world are encouraging social science research using administrative data to su...
Data protection is a recurrent topic in European Union (EU) policy debates, but it is largely ignore...
EU data protection law has, to date, been monitored and enforced in a decentralised way by independe...
Abstract. Data privacy is a fundamental human right, not only accord-ing to the EU perspective. Each...
The introduction of bulk interception (in Norwegian: “tilrettelagt innhenting”) into the Norwegian i...
This study asks: how has European Union (EU) law protected privacy in the context of data surveillan...
Laws protecting a European\u27s right to control the flow of their own personal data (also known as ...
This chapter investigates the role of EU institutions in the process of developing and changing EU d...
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was s...
Among the wide variety of national and multinational legal regimes for protecting privacy, two domin...
Legal frameworks exist within democracies to prevent the misuse and abuse of personal data that law ...
This article analyses government deployment of information security sensor systems from primarily a ...
This Article examines a recent twist in European Union ( EU ) data protection law. In the 1990s, the...
Governments around the world are encouraging social science research using administrative data to su...
The processing of personal data has been one of the most widespread uses of computers ever since the...
Governments around the world are encouraging social science research using administrative data to su...
Data protection is a recurrent topic in European Union (EU) policy debates, but it is largely ignore...
EU data protection law has, to date, been monitored and enforced in a decentralised way by independe...
Abstract. Data privacy is a fundamental human right, not only accord-ing to the EU perspective. Each...
The introduction of bulk interception (in Norwegian: “tilrettelagt innhenting”) into the Norwegian i...
This study asks: how has European Union (EU) law protected privacy in the context of data surveillan...
Laws protecting a European\u27s right to control the flow of their own personal data (also known as ...
This chapter investigates the role of EU institutions in the process of developing and changing EU d...
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was s...
Among the wide variety of national and multinational legal regimes for protecting privacy, two domin...
Legal frameworks exist within democracies to prevent the misuse and abuse of personal data that law ...
This article analyses government deployment of information security sensor systems from primarily a ...