Direito e Informação na Sociedade em Rede: atas Direito e Informação na Sociedade em Rede: atas | Page 72
Meeting the big data challenges more effectively requires exploring
complementary regulatory approaches focusing on the reuses of personal
information, something that the GDPR does not address unambiguously52. Likewise,
more could be done to strengthen transparency and user control, along the lines of
the recent recommendations of the EDPS. Finally, despite the latest approval of the
GDPR and of the “law enforcement directive” as separate instruments, considering
their merging should not be disregarded definitively. Notwithstanding the former’s
weaknesses, it still provides a stronger framework than the latter, and a more accurate
response to the growing private-public exchange of personal data.
References
Abdo, A.; Toomey, P. (2013), The NSA is turning the internet into a total surveillance
system,
The
Guardian,
11.08.2013.
.
Allemand, L. (2013), Dossier: les promesses du big data, December, La Recherche 482,
p. 27-42.
Andrejevic, M.; Gates, K. (2014), Editorial: big data surveillance: introduction,
Surveillance & Society 12 (2), p. 185-196.
Blas, D. A. (2009), First pillar and third pillar: need for a common approach on data
protection?, in S. Gutwirth, et al., ed., Reinventing Data Protection?, Springer, p.
225-237.
Borghi, M.; Ferretti, F; Karapapa, S. (2013), Online data processing consent under
EU law: a theoretical framework and empirical evidence from the UK,
International Journal of Law and Information Technology 21 (2), p. 109-153.
Colonna, L. (2014), Data mining and its paradoxical relationship to the purpose of
limitation principle. In Gurwitch, S; Leenes, R.; De Hert, P., ed., Reloading Data
protection: multidisciplinary insights and contemporary challenges, Springer, p. 299--321.
Couldry, N.; Powell, A. (2013), Big data from the bottom up, Big Data & Society, JulyDecember, p. 1-5.
Danagher, L. (2012), An Assessment of the draft data protection regulation: does it
effectively protect data?, European Journal of Law and Technology 3 (3),
.
De Hert, P.; Papakonstantinou, V. (2016), The New general data protection
“A privacy doctrine built for the cyber age must address a radical change in the type and scale of violations
that the nation—and the world—face, namely that the greatest threats to privacy come not at the point that
personal information is collected, but rather from the secondary uses of such information” (Etzioni, 2013, p.
641 ff.) Accordingly, and bearing in mind the diversity of big data applications, a distinction should be held on
whether the data processing seeks to simply detect trends and correlations or focuses on individuals.
52
60