Public order disturbances may occur during international events such as football tournaments which attract football supporters from across the borders or summits organized by international organizations targeted by protestors. In order to enhance co-operation between law enforcement authorities, the Council of the European Union in the third pillar (Justice and Home Affairs, JHA) calls on the Member States to exchange information, including that on (groups of) persons who (may) form a threat to the public order. Apart from a few exceptions, the JHA-Council uses for this purpose soft law instruments, such as legally non-binding resolutions, recommendations and conclusions, including some very detailed handbooks. This study describes those ac...
It has been well argued that cross-border cooperation among supervisory authorities in data privacy ...
This chapter investigates the role of EU institutions in the process of developing and changing EU d...
This paper aims at investigating the growing relevance of security measures based on data access in ...
Public order disturbances may occur during international events such as football tournaments which a...
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was s...
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was ...
In this chapter, we focus on the role of supervisory authorities monitoring police and criminal just...
This study examines a key aspect of regulatory policy in the field of data protection, namely the fr...
Abstract. Data privacy is a fundamental human right, not only accord-ing to the EU perspective. Each...
As a result of society’s increasing digitisation, the police have ever more opportunities to collect...
International audienceFrom the European Union legal point of view, sensitive data are not issued fro...
The activity which States undertake when conducting extensive non-directed surveillance programmes i...
This study asks: how has European Union (EU) law protected privacy in the context of data surveillan...
Defence date: 11 June 2014Examining Board: Professor Giovanni Sartor, EUI (Supervisor); Professor Al...
It has been well argued that cross-border cooperation among supervisory authorities in data privacy ...
It has been well argued that cross-border cooperation among supervisory authorities in data privacy ...
This chapter investigates the role of EU institutions in the process of developing and changing EU d...
This paper aims at investigating the growing relevance of security measures based on data access in ...
Public order disturbances may occur during international events such as football tournaments which a...
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was s...
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was ...
In this chapter, we focus on the role of supervisory authorities monitoring police and criminal just...
This study examines a key aspect of regulatory policy in the field of data protection, namely the fr...
Abstract. Data privacy is a fundamental human right, not only accord-ing to the EU perspective. Each...
As a result of society’s increasing digitisation, the police have ever more opportunities to collect...
International audienceFrom the European Union legal point of view, sensitive data are not issued fro...
The activity which States undertake when conducting extensive non-directed surveillance programmes i...
This study asks: how has European Union (EU) law protected privacy in the context of data surveillan...
Defence date: 11 June 2014Examining Board: Professor Giovanni Sartor, EUI (Supervisor); Professor Al...
It has been well argued that cross-border cooperation among supervisory authorities in data privacy ...
It has been well argued that cross-border cooperation among supervisory authorities in data privacy ...
This chapter investigates the role of EU institutions in the process of developing and changing EU d...
This paper aims at investigating the growing relevance of security measures based on data access in ...