Direito e Informação na Sociedade em Rede: atas Direito e Informação na Sociedade em Rede: atas | Page 72

Meeting the big data challenges more effectively requires exploring complementary regulatory approaches focusing on the reuses of personal information, something that the GDPR does not address unambiguously52. Likewise, more could be done to strengthen transparency and user control, along the lines of the recent recommendations of the EDPS. Finally, despite the latest approval of the GDPR and of the “law enforcement directive” as separate instruments, considering their merging should not be disregarded definitively. Notwithstanding the former’s weaknesses, it still provides a stronger framework than the latter, and a more accurate response to the growing private-public exchange of personal data. References Abdo, A.; Toomey, P. (2013), The NSA is turning the internet into a total surveillance system, The Guardian, 11.08.2013. . Allemand, L. (2013), Dossier: les promesses du big data, December, La Recherche 482, p. 27-42. Andrejevic, M.; Gates, K. (2014), Editorial: big data surveillance: introduction, Surveillance & Society 12 (2), p. 185-196. Blas, D. A. (2009), First pillar and third pillar: need for a common approach on data protection?, in S. Gutwirth, et al., ed., Reinventing Data Protection?, Springer, p. 225-237. Borghi, M.; Ferretti, F; Karapapa, S. (2013), Online data processing consent under EU law: a theoretical framework and empirical evidence from the UK, International Journal of Law and Information Technology 21 (2), p. 109-153. Colonna, L. (2014), Data mining and its paradoxical relationship to the purpose of limitation principle. In Gurwitch, S; Leenes, R.; De Hert, P., ed., Reloading Data protection: multidisciplinary insights and contemporary challenges, Springer, p. 299--321. Couldry, N.; Powell, A. (2013), Big data from the bottom up, Big Data & Society, JulyDecember, p. 1-5. Danagher, L. (2012), An Assessment of the draft data protection regulation: does it effectively protect data?, European Journal of Law and Technology 3 (3), . De Hert, P.; Papakonstantinou, V. (2016), The New general data protection “A privacy doctrine built for the cyber age must address a radical change in the type and scale of violations that the nation—and the world—face, namely that the greatest threats to privacy come not at the point that personal information is collected, but rather from the secondary uses of such information” (Etzioni, 2013, p. 641 ff.) Accordingly, and bearing in mind the diversity of big data applications, a distinction should be held on whether the data processing seeks to simply detect trends and correlations or focuses on individuals. 52 60