In Ligue des droits humains, the CJEU declared the EU Directive on Passenger Name Record (PNR) data to be compatible with Articles 7 and 8 CFR. The Court therefore declined to invalidate the PNR Directive, but significantly curtailed almost all of its central tenets. This contribution analyzes what the decision entails for the PNR system. It argues that the German transposition law, the Fluggastdatengesetz, can no longer function as a suitable legal basis for the German PNR system since it is in flagrant violation of EU law, as interpreted by the Court. Hence, the German PNR system must be stopped until the Fluggastdatengesetz has undergone parliamentary reform.Since Ligues des droits humains also represents a landmark decision on predictiv...
peer reviewedAfter 9/11 the United States of America as well as other countries discovered the colle...
The longstanding debate concerning the transfer, processing and retention by national law enforceme...
Privacy should become a key component in the IT system. It is not something to be considered at last...
In Ligue des droits humains, the CJEU declared the EU Directive on Passenger Name Record (PNR) data ...
In February 2011, the European Commission published a proposal for a new Directive on the use of pas...
The European Commission presented the ‘EU Passenger Name Record (PNR) system’ in 2007 as a tool in t...
The paper analyses the PNR Directive as pre-emptive data surveillance practice. The 2016/681 Directi...
In 2016 the European Union (EU) introduced a Passenger Name Record Data (PNR) Directive. There has b...
The European Commission presented the ‘EU Passenger Name Record (PNR) system ’ in 2007 as a tool in ...
In 2016 the EU introduced a Passenger Name Record data (PNR) Directive. In the EU there has been con...
In this study we have examined (sometimes critically) the provisions of Directive (EU) 2016/681 of t...
In the present paper, the Author deals with the problematic interaction between, on the one hand, th...
The subject of this thesis is the sanctioning of illegal personal data transfers between the EU and ...
A history of totalitarian governments and state surveillance appear to have made Germans sensitive t...
The Framework of a Security Law guided by Human Rights The discussion on the security architecture i...
peer reviewedAfter 9/11 the United States of America as well as other countries discovered the colle...
The longstanding debate concerning the transfer, processing and retention by national law enforceme...
Privacy should become a key component in the IT system. It is not something to be considered at last...
In Ligue des droits humains, the CJEU declared the EU Directive on Passenger Name Record (PNR) data ...
In February 2011, the European Commission published a proposal for a new Directive on the use of pas...
The European Commission presented the ‘EU Passenger Name Record (PNR) system’ in 2007 as a tool in t...
The paper analyses the PNR Directive as pre-emptive data surveillance practice. The 2016/681 Directi...
In 2016 the European Union (EU) introduced a Passenger Name Record Data (PNR) Directive. There has b...
The European Commission presented the ‘EU Passenger Name Record (PNR) system ’ in 2007 as a tool in ...
In 2016 the EU introduced a Passenger Name Record data (PNR) Directive. In the EU there has been con...
In this study we have examined (sometimes critically) the provisions of Directive (EU) 2016/681 of t...
In the present paper, the Author deals with the problematic interaction between, on the one hand, th...
The subject of this thesis is the sanctioning of illegal personal data transfers between the EU and ...
A history of totalitarian governments and state surveillance appear to have made Germans sensitive t...
The Framework of a Security Law guided by Human Rights The discussion on the security architecture i...
peer reviewedAfter 9/11 the United States of America as well as other countries discovered the colle...
The longstanding debate concerning the transfer, processing and retention by national law enforceme...
Privacy should become a key component in the IT system. It is not something to be considered at last...