Data law and policy assume that harms to individuals can result only from personal data processing. Conversely, generation and use of non-personal data supposedly create new value while presenting no risk to individual interests or fundamental rights. Consequently, the law treats these two categories differently, constraining generation, use, and sharing of the former while incentivizing the latter. This article challenges this assumption. It proposes to divide data-related harms into two high-level categories: unwanted disclosure and detrimental use. It demonstrates how personal/non-personal data distinction prevents unwanted disclosure but fails to capture, and unintendedly enables, detrimental use of data. As a remedy, the article propos...
• This article investigates an under-discussed and potentially significant provision in the EU Gener...
The primary scope of application of the General Data Protection Regulation - Regulation (UE) 2016/67...
Everyone holds personal information about others. Each person's privacy thus critically depends on t...
Data law and policy assume that harms to individuals can result only from personal data processing. ...
peer reviewedOn the awareness of the dynamism pertaining to data and its processing, this paper inve...
In this article, we examine the concept of non-personal data from a law and computer science perspec...
This era of big data analytics promises many things. In particular, it offers opportunities to extra...
In the EU processing of personal data is subject to strict regulations that are laid out in the GDPR...
Tiivistelmä - Referat - Abstract In the modern European data economy two central ideals are in te...
Empowered by mobile devices and next-generation web services, such as personal cloud-storage service...
open access articleIn order to frame discussions on data privacy in varied contexts, this paper intr...
In the data analytics society, each individual’s disclosure of personal information imposes costs on...
This thesis is about the protection of individuals against the negative impact that big data may hav...
In this Article, I will review the origins of data protection laws and reestablish the concept of “d...
Means of identification are growing rapidly with new digital and online tracking capabilities, and o...
• This article investigates an under-discussed and potentially significant provision in the EU Gener...
The primary scope of application of the General Data Protection Regulation - Regulation (UE) 2016/67...
Everyone holds personal information about others. Each person's privacy thus critically depends on t...
Data law and policy assume that harms to individuals can result only from personal data processing. ...
peer reviewedOn the awareness of the dynamism pertaining to data and its processing, this paper inve...
In this article, we examine the concept of non-personal data from a law and computer science perspec...
This era of big data analytics promises many things. In particular, it offers opportunities to extra...
In the EU processing of personal data is subject to strict regulations that are laid out in the GDPR...
Tiivistelmä - Referat - Abstract In the modern European data economy two central ideals are in te...
Empowered by mobile devices and next-generation web services, such as personal cloud-storage service...
open access articleIn order to frame discussions on data privacy in varied contexts, this paper intr...
In the data analytics society, each individual’s disclosure of personal information imposes costs on...
This thesis is about the protection of individuals against the negative impact that big data may hav...
In this Article, I will review the origins of data protection laws and reestablish the concept of “d...
Means of identification are growing rapidly with new digital and online tracking capabilities, and o...
• This article investigates an under-discussed and potentially significant provision in the EU Gener...
The primary scope of application of the General Data Protection Regulation - Regulation (UE) 2016/67...
Everyone holds personal information about others. Each person's privacy thus critically depends on t...