Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
The security obligations require that appropriate technical and organisational measures are taken both at the time of the design of the system and at the time of the processing of the personal data itself (article 17 D95/46 EU).
Also, an appropriate level of confidentiality and security must be implemented, taking into account the state of the art and the costs of the implementation of the measures in relation to the risks represented by the processing and the nature of the data to be protected (see article 16 & 17). AmI environments require interconnectivity and interoperability through different networks and different controllers, located in different countries. It will be difficult to find out who is responsible in case of a technical or organisational failure. It is very difficult to trace back at what point data are stolen of illegally disseminated to third parties, and so far it is in fact rather difficult to even know at all that there has been a security or confidentiality breach. The provisions may again seem vague or abstract, as they refer to circumstances that will vary depending on the context and can only be defined on a case-by-case basis. The reference to the state of the art in combination with the costs of implementation could make this type of protection dependent on the accepted standards in the relevant sector.
36 / 62 |