Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

European Law

2011

Privacy

Articles 1 - 2 of 2

Full-Text Articles in Law

Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas May 2011

Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

It is widely aknowledged that we are entering in an era of revolutionary changes in the field of Information and Communication Technologies . The spread of broadband internet connections has led internet to function not only as a communications network but also as a platform for new computing applications. The most recent application is the so called "cloud computing", which permits the running of software applications or the storage of data to be performed at remote servers which are connected to our computers through the Internet. Examples of these applications are the web-based email services, online computer back up, data …


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …