Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Table Of Content
- Executive Summary
- Description of Ambient intelligence (AmI)
- Prologue
- Ambient intelligence Space example: The Smart Home
- Introduction
- The Smart Home: Elements and Services
- Profiling activity
- Multi-user environment
- Security and privacy concerns
- Feasibility
- Conflict with user control
- Profiling for online life
- AmI: science fiction or unfolding reality?
- Key concepts of AmI
- Ambience: Ubiquitous computing and ubiquitous communication
- Intelligence
- Example of intelligent showers
- Personalisation
- Possible applications of AmI
- Description of Profiling in relation to AmI
- Personalised and group profiling
- Profiling in AmI design
- Profiles: predefined, automated and other types of profiles
- The context of the human person
- Technological aspects of profiling for AmI
- Introduction
- The essence of AmI
- AmI Infrastructure
- Technical aspects of Profiling in AmI
- Impact of Profiling and AmI
- Risks and opportunities
- Privacy aspects
- Security aspects
- End user Control: Privacy and Mobility
- Two reasons for end user control
- Privacy Enhanced Ambient Intelligence Profiling
- Context
- Anonymous credentials
- Dynamic user-generated profiles
- The tension between end user control and an intelligent environment
- Two types of end user control
- Case study of end user control: Ronny goes to Tokyo
- Legal issues
- Introduction
- The first step: collection of personal data and other information
- The collection of information, other than personal data
- The collection of personal data
- The principles, rights and obligations of data protection law
- .A. The obligations of the data controller
- .A.1. The fairness principle
- .A.2. The obligation to inform
- .A.3. The purpose specification principle (finality principle)
- .A.4. The proportionality principle
- .A.5. The consent principle
- .
- Confidentiality and Security
- .A.7. Notification to the supervisory authority (article 18)
- .
- Sensitive Data
- .B. Rights conferred to individuals
- .B.1. The right to be informed
- .B.2. The right to consult the data (right to access and individual participation)
- .B.3. The right to request corrections
- .B.4. The right to object to the processing in certain circumstances
- Privacy and Electronic Communications Directive 2002/58
- .A. Traffic data
- .B. Location data
- .C. Cookies and related programs
- E-commerce and Consumer Protection Law
- .A. Directive 93/13 on unfair terms in consumer contracts
- .B. Directive 97/7 on consumer protection in respect of distance contracts
- .C. E-Commerce Directive 2000/31
- Standards and interoperability
- The second step: the construction of (group) profiles, including making personal data anonymous
- The third step: the application of (group) profiles
- The Data Protection Directive
- Three examples before looking at article 15 of the directive
- .A. Rock concert
- .B. Music in a restaurant
- .C. Interactive television at home
- Privacy and Electronic Communications Directive 2002/58
- Conclusions
- Abbreviations and Glossary
- Bibliography