SlideShare una empresa de Scribd logo
1 de 17
IV Congresso
                      Crimes electrônicos - Formes de Proteção


                             São Paulo – 23 de Agosto de 2012




Privacidade e proteção aos direitos da personalidade


       Conselho da Europa - Convenção 108



                 Sophie Kwasny
                Data Protection Unit
                 Council of Europe
Habeas data / data protection / privacy

                Habeas data: ‘that you have the data’ :
                 right of
                 access, rectification, update, erasure
                data protection and protection of
                 invididuals: datenschutz or ‘protection of
                 individuals’ with regard to the processing of
                 personal data ?
                Privacy: Article 12 UDHR 1948, Article 17
                 ICCPR 1966 .. Article 8 ECHR ‘private life’
                 (name, image, correspondence, physycal
Convention 108
                 integrity, etc)                         Sophie Kwasny
                                                       Council of Europe
Challenges


                cyberspace: an interconnected world
                 with 2.3 billion users worldwide
                ubiquity of data and profiling
                global online transactions - $10 trillion
                 annually / $24 trillion by 2020
                data protection as a human right:
                 ECtHR, EUCJ, constitutional courts


Convention 108                                         Sophie Kwasny
                                                     Council of Europe
Protection and Security


  Protection of the individuals and data security
      integrity and confidentiality: ‘Appropriate
       security measures shall be taken against accidental
       or unauthorised destruction or accidental loss as
       well as against unauthorised access, alteration or
       dissemination (Article 7 Convention 108)
      increasing role of technologies: PETs :
       technical and organizational concepts also focusing
       on security

Convention 108                                       Sophie Kwasny
                                                   Council of Europe
Seen from Europe…


      ‘direitos da personalidade’ : human
       personality serving both as the
       foundation and aim of human rights
      Early 60ies : rapid progress in the field
       of electronic data processing
      70ies : first pieces of legislation and
       even fundamental right in some
       Constitutions
Convention 108                               Sophie Kwasny
                                           Council of Europe
Convention 108’s key facts


      28 January 1981 – 31st anniversary
      Drafted with the participation of non-
       European countries (Australia,
       Canada, Japan and the USA)
      Soon 44 parties
      Uruguay invited to accede, Marocco
       asked to be invited, next ?
Convention 108                                  Sophie Kwasny
                                              Council of Europe
Its potential


      universal basic principles
      legally binding force
      simple and technologically-neutral
      cross-cutting scope of application
       covering public and private sector
      frame for multilateral cooperation

Convention 108                          Sophie Kwasny
                                      Council of Europe
Snapshot I


      Object and purpose: to secure in
       their territory for every individual,
       whatever his nationality or residence,
       respect for his rights and fundamental
       freedoms, and in particular his right to
       privacy, with regard to the processing
       of personal data (data protection).
      Definitions: personal data, data
       subjects, processing, etc.
Convention 108                              Sophie Kwasny
                                          Council of Europe
Snapshot II


      Scope: horizontal - public and private
       sector.
      Duties of the parties: take
       necessary measures in domestic law to
       give effect to the basic principles for
       data protection set out in the
       Convention.


Convention 108                            Sophie Kwasny
                                        Council of Europe
Snapshot III


  Basic principles:
-fair and lawful collection and processing,
-storage for specified legitimate purposes
   and no longer than is necessary
-compatible use
-data:    adequate,     relevant   and   not
   excessive (proportionality), accurate,
   kept up to date, not name-linked for
   longer than needed secure
Convention 108                          Sophie Kwasny
                                      Council of Europe
Snapshot IV


  Basic principles:
-information,      right    of  access and
   rectification, right to a remedy.
-outlawed : processing of "sensitive" data
   on a person's race, politics, health,
   religion, sexual life, criminal record,
   etc., in the absence of proper legal
   safeguards.

Convention 108                        Sophie Kwasny
                                    Council of Europe
Snapshot V


      Restrictions on the rights laid down
       in the Convention are only possible
       when overriding interests (e.g. State
       security, defence, etc.) are at stake
      Flow of data: free between Parties
       and restrictions on transborder flows
       of data to States where legal
       regulation does not provide adequate
       protection (additional protocol - 2001)
Convention 108                             Sophie Kwasny
                                         Council of Europe
Snapshot V


      Mutual assistance

      Consultative committee

      Supervisory authorities




Convention 108                     Sophie Kwasny
                                 Council of Europe
Modernisation – trends I


      promote as a universal standard, with
       an open and multistakeholder
       approach
      preserve general, simple, flexible and
       pragmatic character- while addressing
       new ICT challenges


Convention 108                                Sophie Kwasny
                                            Council of Europe
Modernisation – trends II


      ensure coherence with other relevant
       frameworks (EU, OECD, APEC)

      strengthen follow-up mechanism




Convention 108                                 Sophie Kwasny
                                             Council of Europe
Complements and interconnection


   Recommendations
   Declaration on Internet
    governance principles
   Cybercrime convention
Conclusion

                Convention 108 –
        – robust, while at the same time
            flexible, resilient, enduring,
                      evergreen




Convention 108                           Sophie Kwasny
                                       Council of Europe

Más contenido relacionado

Destacado

Flg apresentacao 15 ago 2014 eg ibr
Flg   apresentacao 15 ago 2014 eg ibrFlg   apresentacao 15 ago 2014 eg ibr
Flg apresentacao 15 ago 2014 eg ibrFlávia Lefèvre
 
Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo
Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo
Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo Thoughtworks
 
Políticas de internacionalização de universidades - Ministério das Relações E...
Políticas de internacionalização de universidades - Ministério das Relações E...Políticas de internacionalização de universidades - Ministério das Relações E...
Políticas de internacionalização de universidades - Ministério das Relações E...Luciano Sathler
 
Pesquisa marco civil brasileiro
Pesquisa   marco civil brasileiroPesquisa   marco civil brasileiro
Pesquisa marco civil brasileiroFecomercioSP
 
Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...
Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...
Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...Luciano Sathler
 
youPIX Festival SP 2012 - SALVEM A INTERNET!
youPIX Festival SP 2012 - SALVEM A INTERNET!youPIX Festival SP 2012 - SALVEM A INTERNET!
youPIX Festival SP 2012 - SALVEM A INTERNET!you PIX
 
Andreas presentation
Andreas presentationAndreas presentation
Andreas presentationpitsilos
 
Identifying Genre
Identifying GenreIdentifying Genre
Identifying GenreChallies
 
Povezanost poštanskog tržišta i elektronske trgovine
Povezanost poštanskog tržišta i elektronske trgovinePovezanost poštanskog tržišta i elektronske trgovine
Povezanost poštanskog tržišta i elektronske trgovineLidija Gligoric
 
Medjuzavisnost elektronskih komunikacija i postanskih usluga
Medjuzavisnost elektronskih komunikacija i postanskih uslugaMedjuzavisnost elektronskih komunikacija i postanskih usluga
Medjuzavisnost elektronskih komunikacija i postanskih uslugaLidija Gligoric
 
Fraturas - Tipos e Conceitos by Victor Souza
Fraturas - Tipos e Conceitos by Victor SouzaFraturas - Tipos e Conceitos by Victor Souza
Fraturas - Tipos e Conceitos by Victor SouzaJosé Willamy Silva
 
Povezanost tržišta poštanskih usluga i elektronske trgovine
Povezanost tržišta poštanskih usluga i elektronske trgovinePovezanost tržišta poštanskih usluga i elektronske trgovine
Povezanost tržišta poštanskih usluga i elektronske trgovineLidija Gligoric
 

Destacado (20)

Flg apresentacao 15 ago 2014 eg ibr
Flg   apresentacao 15 ago 2014 eg ibrFlg   apresentacao 15 ago 2014 eg ibr
Flg apresentacao 15 ago 2014 eg ibr
 
Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo
Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo
Vigilância em massa, Marco Civil e o papel do tecnologista, por Claudia Melo
 
Políticas de internacionalização de universidades - Ministério das Relações E...
Políticas de internacionalização de universidades - Ministério das Relações E...Políticas de internacionalização de universidades - Ministério das Relações E...
Políticas de internacionalização de universidades - Ministério das Relações E...
 
Pesquisa marco civil brasileiro
Pesquisa   marco civil brasileiroPesquisa   marco civil brasileiro
Pesquisa marco civil brasileiro
 
Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...
Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...
Educação Básica e Ensino Médio - Coleção Mundo Afora - Ministério das Relaçõe...
 
youPIX Festival SP 2012 - SALVEM A INTERNET!
youPIX Festival SP 2012 - SALVEM A INTERNET!youPIX Festival SP 2012 - SALVEM A INTERNET!
youPIX Festival SP 2012 - SALVEM A INTERNET!
 
FINALFINALMROSC
FINALFINALMROSCFINALFINALMROSC
FINALFINALMROSC
 
Andreas presentation
Andreas presentationAndreas presentation
Andreas presentation
 
Rx
RxRx
Rx
 
A divina comedia
A divina comediaA divina comedia
A divina comedia
 
Identifying Genre
Identifying GenreIdentifying Genre
Identifying Genre
 
Correlação entre pressão intra abdominal elevada e a reexpansão pulmonar
Correlação entre pressão intra abdominal elevada e a reexpansão pulmonarCorrelação entre pressão intra abdominal elevada e a reexpansão pulmonar
Correlação entre pressão intra abdominal elevada e a reexpansão pulmonar
 
Why Do Companies Choose Newman?
Why Do Companies Choose Newman?Why Do Companies Choose Newman?
Why Do Companies Choose Newman?
 
Povezanost poštanskog tržišta i elektronske trgovine
Povezanost poštanskog tržišta i elektronske trgovinePovezanost poštanskog tržišta i elektronske trgovine
Povezanost poštanskog tržišta i elektronske trgovine
 
Prone Positioning in Severe Acute Distress Syndrome - Posição Prona em Indiv...
Prone Positioning in Severe Acute  Distress Syndrome - Posição Prona em Indiv...Prone Positioning in Severe Acute  Distress Syndrome - Posição Prona em Indiv...
Prone Positioning in Severe Acute Distress Syndrome - Posição Prona em Indiv...
 
Medjuzavisnost elektronskih komunikacija i postanskih usluga
Medjuzavisnost elektronskih komunikacija i postanskih uslugaMedjuzavisnost elektronskih komunikacija i postanskih usluga
Medjuzavisnost elektronskih komunikacija i postanskih usluga
 
Fraturas - Tipos e Conceitos by Victor Souza
Fraturas - Tipos e Conceitos by Victor SouzaFraturas - Tipos e Conceitos by Victor Souza
Fraturas - Tipos e Conceitos by Victor Souza
 
Rx
RxRx
Rx
 
Povezanost tržišta poštanskih usluga i elektronske trgovine
Povezanost tržišta poštanskih usluga i elektronske trgovinePovezanost tržišta poštanskih usluga i elektronske trgovine
Povezanost tržišta poštanskih usluga i elektronske trgovine
 
COACH
COACHCOACH
COACH
 

Similar a Privacidade e Proteção aos Direitos da Personalidade

Guardian Masterclass Investigative Journalism FOI Training 10 Tips
Guardian Masterclass Investigative Journalism FOI Training 10 TipsGuardian Masterclass Investigative Journalism FOI Training 10 Tips
Guardian Masterclass Investigative Journalism FOI Training 10 TipsHelenDarbishire
 
Freedom in European System
Freedom in European SystemFreedom in European System
Freedom in European SystemFermila Yousaf
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...NikoYanev
 
The Tradeoff of Connectivity: The problem of privacy
The Tradeoff of Connectivity: The problem of privacyThe Tradeoff of Connectivity: The problem of privacy
The Tradeoff of Connectivity: The problem of privacyOpen & Agile Smart Cities
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...Terry O'Brien
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessmentSpringer
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...i_scienceEU
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The global protection of intellectual property: in whose interests?
The global protection of intellectual property: in whose interests?The global protection of intellectual property: in whose interests?
The global protection of intellectual property: in whose interests?blogzilla
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
When Legal Worlds Overlap Human Rights, State and Non-State Law
When Legal Worlds Overlap Human Rights, State and Non-State Law When Legal Worlds Overlap Human Rights, State and Non-State Law
When Legal Worlds Overlap Human Rights, State and Non-State Law Dr Lendy Spires
 
Ethical and Regulatory Challenges to Science and Research Policy at the Globa...
Ethical and Regulatory Challenges to Science and Research Policy at the Globa...Ethical and Regulatory Challenges to Science and Research Policy at the Globa...
Ethical and Regulatory Challenges to Science and Research Policy at the Globa...Emilio Mordini
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet Emily Allbon
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor societyConsiderati
 

Similar a Privacidade e Proteção aos Direitos da Personalidade (20)

Data protection
Data protectionData protection
Data protection
 
Guardian Masterclass Investigative Journalism FOI Training 10 Tips
Guardian Masterclass Investigative Journalism FOI Training 10 TipsGuardian Masterclass Investigative Journalism FOI Training 10 Tips
Guardian Masterclass Investigative Journalism FOI Training 10 Tips
 
Freedom in European System
Freedom in European SystemFreedom in European System
Freedom in European System
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...
 
The Tradeoff of Connectivity: The problem of privacy
The Tradeoff of Connectivity: The problem of privacyThe Tradeoff of Connectivity: The problem of privacy
The Tradeoff of Connectivity: The problem of privacy
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
 
Privacy impact assessment
Privacy impact assessmentPrivacy impact assessment
Privacy impact assessment
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Eiba 16.12.2017
Eiba 16.12.2017Eiba 16.12.2017
Eiba 16.12.2017
 
The global protection of intellectual property: in whose interests?
The global protection of intellectual property: in whose interests?The global protection of intellectual property: in whose interests?
The global protection of intellectual property: in whose interests?
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
When Legal Worlds Overlap Human Rights, State and Non-State Law
When Legal Worlds Overlap Human Rights, State and Non-State Law When Legal Worlds Overlap Human Rights, State and Non-State Law
When Legal Worlds Overlap Human Rights, State and Non-State Law
 
135 report en
135 report en135 report en
135 report en
 
Ethical and Regulatory Challenges to Science and Research Policy at the Globa...
Ethical and Regulatory Challenges to Science and Research Policy at the Globa...Ethical and Regulatory Challenges to Science and Research Policy at the Globa...
Ethical and Regulatory Challenges to Science and Research Policy at the Globa...
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet IALS Freedom of Expression and the Internet
IALS Freedom of Expression and the Internet
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
 

Más de FecomercioSP

Evolução da Internet e os cuidados necessários
Evolução da Internet e os cuidados necessáriosEvolução da Internet e os cuidados necessários
Evolução da Internet e os cuidados necessáriosFecomercioSP
 
Segurança em e commerce - bruno zani
Segurança em e commerce - bruno zaniSegurança em e commerce - bruno zani
Segurança em e commerce - bruno zaniFecomercioSP
 
Marco civil ii dr. rony vainzof
Marco civil ii   dr. rony vainzofMarco civil ii   dr. rony vainzof
Marco civil ii dr. rony vainzofFecomercioSP
 
As tendências do e commerce no brasil - marco antonio ribeiro
As tendências do e commerce no brasil - marco antonio ribeiroAs tendências do e commerce no brasil - marco antonio ribeiro
As tendências do e commerce no brasil - marco antonio ribeiroFecomercioSP
 
A evolução da internet e os cuidados necessários - Edu Agni
A evolução da internet e os cuidados necessários - Edu AgniA evolução da internet e os cuidados necessários - Edu Agni
A evolução da internet e os cuidados necessários - Edu AgniFecomercioSP
 
Privacidade + Social Networking - Omar Kaminski
Privacidade + Social Networking - Omar KaminskiPrivacidade + Social Networking - Omar Kaminski
Privacidade + Social Networking - Omar KaminskiFecomercioSP
 
Privacidade + Social Networking - Carlos Cabral
Privacidade + Social Networking - Carlos CabralPrivacidade + Social Networking - Carlos Cabral
Privacidade + Social Networking - Carlos CabralFecomercioSP
 
Privacidade x Social Networking - Jorilson Rodrigues
Privacidade x Social Networking - Jorilson RodriguesPrivacidade x Social Networking - Jorilson Rodrigues
Privacidade x Social Networking - Jorilson RodriguesFecomercioSP
 
Evolução Tecnológica e a (Falta de) Educação dos Usuários Finais
Evolução Tecnológica e a (Falta de) Educação dos Usuários FinaisEvolução Tecnológica e a (Falta de) Educação dos Usuários Finais
Evolução Tecnológica e a (Falta de) Educação dos Usuários FinaisFecomercioSP
 
Pesquisa: Comportamento dos usuários da internet
Pesquisa: Comportamento dos usuários da internetPesquisa: Comportamento dos usuários da internet
Pesquisa: Comportamento dos usuários da internetFecomercioSP
 
Marco Civil I - Dr. Rony Vainzof
Marco Civil I - Dr. Rony VainzofMarco Civil I - Dr. Rony Vainzof
Marco Civil I - Dr. Rony VainzofFecomercioSP
 
4° Pesquisa sobre o Comportamento dos Usuários da Internet
4° Pesquisa sobre o Comportamento dos Usuários da Internet4° Pesquisa sobre o Comportamento dos Usuários da Internet
4° Pesquisa sobre o Comportamento dos Usuários da InternetFecomercioSP
 

Más de FecomercioSP (12)

Evolução da Internet e os cuidados necessários
Evolução da Internet e os cuidados necessáriosEvolução da Internet e os cuidados necessários
Evolução da Internet e os cuidados necessários
 
Segurança em e commerce - bruno zani
Segurança em e commerce - bruno zaniSegurança em e commerce - bruno zani
Segurança em e commerce - bruno zani
 
Marco civil ii dr. rony vainzof
Marco civil ii   dr. rony vainzofMarco civil ii   dr. rony vainzof
Marco civil ii dr. rony vainzof
 
As tendências do e commerce no brasil - marco antonio ribeiro
As tendências do e commerce no brasil - marco antonio ribeiroAs tendências do e commerce no brasil - marco antonio ribeiro
As tendências do e commerce no brasil - marco antonio ribeiro
 
A evolução da internet e os cuidados necessários - Edu Agni
A evolução da internet e os cuidados necessários - Edu AgniA evolução da internet e os cuidados necessários - Edu Agni
A evolução da internet e os cuidados necessários - Edu Agni
 
Privacidade + Social Networking - Omar Kaminski
Privacidade + Social Networking - Omar KaminskiPrivacidade + Social Networking - Omar Kaminski
Privacidade + Social Networking - Omar Kaminski
 
Privacidade + Social Networking - Carlos Cabral
Privacidade + Social Networking - Carlos CabralPrivacidade + Social Networking - Carlos Cabral
Privacidade + Social Networking - Carlos Cabral
 
Privacidade x Social Networking - Jorilson Rodrigues
Privacidade x Social Networking - Jorilson RodriguesPrivacidade x Social Networking - Jorilson Rodrigues
Privacidade x Social Networking - Jorilson Rodrigues
 
Evolução Tecnológica e a (Falta de) Educação dos Usuários Finais
Evolução Tecnológica e a (Falta de) Educação dos Usuários FinaisEvolução Tecnológica e a (Falta de) Educação dos Usuários Finais
Evolução Tecnológica e a (Falta de) Educação dos Usuários Finais
 
Pesquisa: Comportamento dos usuários da internet
Pesquisa: Comportamento dos usuários da internetPesquisa: Comportamento dos usuários da internet
Pesquisa: Comportamento dos usuários da internet
 
Marco Civil I - Dr. Rony Vainzof
Marco Civil I - Dr. Rony VainzofMarco Civil I - Dr. Rony Vainzof
Marco Civil I - Dr. Rony Vainzof
 
4° Pesquisa sobre o Comportamento dos Usuários da Internet
4° Pesquisa sobre o Comportamento dos Usuários da Internet4° Pesquisa sobre o Comportamento dos Usuários da Internet
4° Pesquisa sobre o Comportamento dos Usuários da Internet
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Privacidade e Proteção aos Direitos da Personalidade

  • 1. IV Congresso Crimes electrônicos - Formes de Proteção São Paulo – 23 de Agosto de 2012 Privacidade e proteção aos direitos da personalidade Conselho da Europa - Convenção 108 Sophie Kwasny Data Protection Unit Council of Europe
  • 2. Habeas data / data protection / privacy  Habeas data: ‘that you have the data’ : right of access, rectification, update, erasure  data protection and protection of invididuals: datenschutz or ‘protection of individuals’ with regard to the processing of personal data ?  Privacy: Article 12 UDHR 1948, Article 17 ICCPR 1966 .. Article 8 ECHR ‘private life’ (name, image, correspondence, physycal Convention 108 integrity, etc) Sophie Kwasny Council of Europe
  • 3. Challenges  cyberspace: an interconnected world with 2.3 billion users worldwide  ubiquity of data and profiling  global online transactions - $10 trillion annually / $24 trillion by 2020  data protection as a human right: ECtHR, EUCJ, constitutional courts Convention 108 Sophie Kwasny Council of Europe
  • 4. Protection and Security Protection of the individuals and data security  integrity and confidentiality: ‘Appropriate security measures shall be taken against accidental or unauthorised destruction or accidental loss as well as against unauthorised access, alteration or dissemination (Article 7 Convention 108)  increasing role of technologies: PETs : technical and organizational concepts also focusing on security Convention 108 Sophie Kwasny Council of Europe
  • 5. Seen from Europe…  ‘direitos da personalidade’ : human personality serving both as the foundation and aim of human rights  Early 60ies : rapid progress in the field of electronic data processing  70ies : first pieces of legislation and even fundamental right in some Constitutions Convention 108 Sophie Kwasny Council of Europe
  • 6. Convention 108’s key facts  28 January 1981 – 31st anniversary  Drafted with the participation of non- European countries (Australia, Canada, Japan and the USA)  Soon 44 parties  Uruguay invited to accede, Marocco asked to be invited, next ? Convention 108 Sophie Kwasny Council of Europe
  • 7. Its potential  universal basic principles  legally binding force  simple and technologically-neutral  cross-cutting scope of application covering public and private sector  frame for multilateral cooperation Convention 108 Sophie Kwasny Council of Europe
  • 8. Snapshot I  Object and purpose: to secure in their territory for every individual, whatever his nationality or residence, respect for his rights and fundamental freedoms, and in particular his right to privacy, with regard to the processing of personal data (data protection).  Definitions: personal data, data subjects, processing, etc. Convention 108 Sophie Kwasny Council of Europe
  • 9. Snapshot II  Scope: horizontal - public and private sector.  Duties of the parties: take necessary measures in domestic law to give effect to the basic principles for data protection set out in the Convention. Convention 108 Sophie Kwasny Council of Europe
  • 10. Snapshot III  Basic principles: -fair and lawful collection and processing, -storage for specified legitimate purposes and no longer than is necessary -compatible use -data: adequate, relevant and not excessive (proportionality), accurate, kept up to date, not name-linked for longer than needed secure Convention 108 Sophie Kwasny Council of Europe
  • 11. Snapshot IV  Basic principles: -information, right of access and rectification, right to a remedy. -outlawed : processing of "sensitive" data on a person's race, politics, health, religion, sexual life, criminal record, etc., in the absence of proper legal safeguards. Convention 108 Sophie Kwasny Council of Europe
  • 12. Snapshot V  Restrictions on the rights laid down in the Convention are only possible when overriding interests (e.g. State security, defence, etc.) are at stake  Flow of data: free between Parties and restrictions on transborder flows of data to States where legal regulation does not provide adequate protection (additional protocol - 2001) Convention 108 Sophie Kwasny Council of Europe
  • 13. Snapshot V  Mutual assistance  Consultative committee  Supervisory authorities Convention 108 Sophie Kwasny Council of Europe
  • 14. Modernisation – trends I  promote as a universal standard, with an open and multistakeholder approach  preserve general, simple, flexible and pragmatic character- while addressing new ICT challenges Convention 108 Sophie Kwasny Council of Europe
  • 15. Modernisation – trends II  ensure coherence with other relevant frameworks (EU, OECD, APEC)  strengthen follow-up mechanism Convention 108 Sophie Kwasny Council of Europe
  • 16. Complements and interconnection  Recommendations  Declaration on Internet governance principles  Cybercrime convention
  • 17. Conclusion Convention 108 – – robust, while at the same time flexible, resilient, enduring, evergreen Convention 108 Sophie Kwasny Council of Europe