Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Cybersecurity, Privacy and Data Protection in EU Law: A Law, Policy and Technology Analysis (eBook)


ISBN13: 9781509939411
Published: March 2023
Publisher: Hart Publishing
Country of Publication: UK
Format: eBook (ePub)
Price: £40.49
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in


Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

Is it possible to achieve cybersecurity while safeguarding the fundamental rights to privacy and data protection? Addressing this question is crucial for European democratic societies, where information technologies have taken centre stage in all areas of communal life.

This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law. The book identifies tensions inherent in the EU cybersecurity policy and its implementation, the reach of cyberspace and its security, the meaning of 'data', as well as the value of privacy and data protection.

The book's novel analysis looks at the interplay between the design of the technology implementing the applicable law, such as the GDPR and the NIS Directive, and the layered configuration of fundamental rights in EU law. This original analysis outlines the possible combinations of the relationship between cybersecurity, privacy and data protection in EU law, from outright clash to complementarity.

An essential read for scholars and practitioners of IT law alike, the book demonstrates that reconciliation between cybersecurity, privacy and data protection relies on explicit and brave political choices, which require deciding what needs to be protected, and how.

Subjects:
Data Protection, EU Law, eBooks, IT, Internet and Artificial Intelligence Law
Contents:
Introduction

Part One – The EU cyber security policy within the EU constitutional architecture
1. The EU cyber security policy
2. The rule of law-based EU ordre public shapes the relationship between cyber security, privacy and data protection

Part Two – Privacy and data protection in EU law, and the role of technology
3. The fundamental right to privacy in EU law
4. The fundamental right to data protection in EU law
5. Technology, cyber security and rights

Part Three – The interplay between cybersecurity, privacy and data protection in EU law
6.Network and Information Security (pillar one)
7.Cybercrime and e-evidence (pillar two)
8.Defence and diplomacy (pillar three)
Conclusion