lecture notes in computer science 11079978-3-030-02547... · 2018-12-29 · data protection...

15
Lecture Notes in Computer Science 11079 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology Madras, Chennai, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany

Upload: others

Post on 13-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Lecture Notes in Computer Science 11079

Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board

David HutchisonLancaster University, Lancaster, UK

Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA

Josef KittlerUniversity of Surrey, Guildford, UK

Jon M. KleinbergCornell University, Ithaca, NY, USA

Friedemann MatternETH Zurich, Zurich, Switzerland

John C. MitchellStanford University, Stanford, CA, USA

Moni NaorWeizmann Institute of Science, Rehovot, Israel

C. Pandu RanganIndian Institute of Technology Madras, Chennai, India

Bernhard SteffenTU Dortmund University, Dortmund, Germany

Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA

Doug TygarUniversity of California, Berkeley, CA, USA

Gerhard WeikumMax Planck Institute for Informatics, Saarbrücken, Germany

Page 2: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

More information about this series at http://www.springer.com/series/7410

Page 3: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Manel Medina • Andreas MitrakasKai Rannenberg • Erich SchweighoferNikolaos Tsouroulas (Eds.)

Privacy Technologiesand Policy6th Annual Privacy Forum, APF 2018Barcelona, Spain, June 13–14, 2018Revised Selected Papers

123

Page 4: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

EditorsManel MedinaUniversitat Politècnica de CatalunyaBarcelona, Spain

Andreas MitrakasENISAMaroussi, Greece

Kai RannenbergGoethe University FrankfurtFrankfurt am Main, Germany

Erich SchweighoferUniversity of ViennaVienna, Austria

Nikolaos TsouroulasTelefónicaMadrid, Spain

ISSN 0302-9743 ISSN 1611-3349 (electronic)Lecture Notes in Computer ScienceISBN 978-3-030-02546-5 ISBN 978-3-030-02547-2 (eBook)https://doi.org/10.1007/978-3-030-02547-2

Library of Congress Control Number: 2018960436

LNCS Sublibrary: SL4 – Security and Cryptology

© Springer Nature Switzerland AG 2018This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of thematerial is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,broadcasting, reproduction on microfilms or in any other physical way, and transmission or informationstorage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology nowknown or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoes not imply, even in the absence of a specific statement, that such names are exempt from the relevantprotective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in this book arebelieved to be true and accurate at the date of publication. Neither the publisher nor the authors or the editorsgive a warranty, express or implied, with respect to the material contained herein or for any errors oromissions that may have been made. The publisher remains neutral with regard to jurisdictional claims inpublished maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AGThe registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Page 5: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Foreword

As the Annual Privacy Forum (APF) marks its sixth edition, the role that ENISA hasplayed in bringing together the seemingly opposing notions of privacy and informationsecurity is going through a transformation phase. In the aftermath of large-scale attacksthat aimed at disclosing personal data at a massive scale, ENISA has looked into waysto engage with a broader audience and set up a network of like-minded professionals,with a view to promote suitable policies and recommendations. This year’s editionof the APF innovates by seeking to bring along industry, so as to complement thepolicy and research components of this conference and achieve a better outreach.

From May 25, 2018, the protection of personal data and privacy of individualsturned a corner in the EU, as the long-awaited General Data Protection Regulation(GDPR) 2016/6791 came into effect following a long legislative process. In a practicaldemonstration in support of fundamental individual rights and of those who govern, theEU has legislated the GDPR, to paraphrase Dworkin2. This is a robust piece of leg-islation with direct application to all EU Member States. The GDPR is expected to havefar-reaching consequences for service providers established within the EU butimportantly also for those who reside beyond its borders. The GDPR provides acomprehensive framework for the protection of personal data in the EU and beyond.

Compared with the legal framework of the past 20 years in the EU, the GDPRintroduces inter alia an enhanced approach to governance, accountability, the role ofdata protection officers, data breach notifications, a risk-based approach, securitymeasures, consent giving and fines, thereby providing a sound future-proof legalframework to the benefit of data subjects. Notions such as privacy by default anddesign and the right to be forgotten open up new possibilities in the meaningfulprotection of liberties and individual rights in practice.

It goes without saying that the long-standing contribution of ENISA in terms ofanalysis and recommendations on security measures to support personal data protectionand privacy is likely to expand yet further. ENISA regularly issues actionable rec-ommendations to shaping technology according to data protection and privacy provi-sions, and addressing privacy and personal data protection requirements throughtechnology. More recently, ENISA published suitable reports seeking to translate legalobligations to technical approaches, in particular with regard to the security of personaldata processing3,4, privacy and data protection by design5, privacy-enhancing

1 https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG.2 Ronald Dworkin, Taking Rights Seriously, Harvard University Press, 1977.3 https://www.enisa.europa.eu/publications/handbook-on-security-of-personal-data-processing.4 https://www.enisa.europa.eu/publications/guidelines-for-smes-on-the-security-of-personal-data-processing.5 https://www.enisa.europa.eu/publications/privacy-and-data-protection-by-design.

Page 6: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

technologies (PETs)6, personal data breach notifications7, as well as proposingmechanisms for user empowerment (transparency and control) in digital environ-ments8. The GDPR is likely to give new impetus to the policy work spearheaded byENISA in the area of security measures for personal data protection and privacy. Withthe prospect of a renewed mandate, ENISA is looking forward to better meetingexpectations also among the GDPR stakeholders.

In terms of spearheading the sound output and outreach of APF 2018, the importantcontributions of the Polytechnic University of Catalonia (UPC) and Telefónica asco-organizers along with all organizational contributors, sponsors, speakers, committeemembers, and chairs and participants are hereby acknowledged.

June 2018 Udo HelmbrechtExecutive Director, ENISA

6 https://www.enisa.europa.eu/publications/pets-evolution-and-state-of-the-art,https://www.enisa.europa.eu/publications/pets-maturity-tool.7 https://www.enisa.europa.eu/topics/data-protection/personal-data-breaches/personal-data-breach-notification-tool.8 https://www.enisa.europa.eu/news/enisa-news/taking-rights-seriously-gdpr-starts-applying-today,https://www.enisa.europa.eu/publications/enisa-position-papers-and-opinions/enisa2019s-position-on-the-general-data-protection-regulation-gdpr/view.

VI Foreword

Page 7: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Preface

For professionals in personal data protection and privacy, and well-informed laypeoplealike, 2018 will be conspicuously marked as the year in which the General DataProtection Regulation (GDPR) started applying. Stakeholders in GDPR increasinglycome to realize that to comply with the new regulatory framework an interdisciplinaryapproach is likely to yield better outcomes than any method rooted in any singlediscipline alone. Legal, organizational, technical, and policy experts need to first cometogether and then come to terms with the new framework and the challenges it poses toindividuals as well as, the private and the public sectors alike.

The Annual Privacy Forum (APF) hosts a distinguished set of expertise that seeks toallow for unfettered discussions and exchange of views. This year inevitably the GDPRtook the lion’s share of attention and this trend is likely to continue in the years tocome. Since its launch, the APF has sought to bring together the seemingly comple-mentary interests of privacy and information security with the goal of presenting abalanced view. Individual rights, however, need protection measures that are asimportant on cyberspace as they are in the physical world to remain meaningful andserve their purpose for citizens and society. Information security presents a broadframework of measures to render rights meaningful in the information age. Theinteraction between policy and academic experts has grown and it has currentlyexpanded to include private sector representatives. As policy is giving way to imple-mentation, it is expected that this interaction will grow yet further.

This year the APF benefited from a large number of submitted papers to select.Therefrom, a small number of papers were accepted, those that better address the maindisciplinary drivers in privacy and personal data protection. The areas addressed in thisyear’s APF include:

– Legal aspects, seeking to identify aspects open to interpretation in law– Compliance and assessment of requirements from legislation as it impacts citizens,

businesses, and the public sector– Technical analysis and technical modeling available to meet compliance

requirements– Privacy implementation, describing practical approaches to meet privacy objectives

The papers presented in the proceedings are organized in thematic areas as follows:The first thematic area covers technical analysis and techniques.In the paper presented by Peter Story, Sebastian Zimmeck, and Norman Sadeh,

“Which Apps have Privacy Policies,” an analysis of over one million Google PlayStore apps, smartphone app privacy policies, and practices is carried out. The absenceof privacy policies makes it difficult for users, regulators, and privacy organizations toevaluate apps. Exploratory data analysis of the relationship between app metadatafeatures and app, links to privacy policies was carried out first, and applied to a logisticregression model to predict the probability that individual apps will have policy links.

Page 8: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Another view is presented in the paper by Stefan Schiffner, Bettina Berendt, TriinSill, Florian Schaub, Kim Wuyts, Robert Riemann, Seda Guerses, Achim Klabunde,Norman Sadeh-Koniecpol, Jules Polonetsky, Massimo Attoresi, GabrielaZanfir-Fortuna, and Martin Degeling, entitled: “Towards a Roadmap for PrivacyTechnologies and the General Data Protection Regulation: A Transatlantic Initiative.”This paper reports on a workshop regarding the deployment, content, and design of theGDPR that brought together diverse EU- and US-based stakeholders. Five themes arediscussed: the state of the art, consent, de-identification, transparency, and developmentand deployment practices.

Privacy as an innovation opportunity is tackled by Marc van Lieshout and SophieEmmert in RESPECT4U — privacy as innovation opportunity. The rights to privacyand to personal data protection seemingly focus on a defensive and protective approachwhile giving way to constructive interpretation. The proposed model offers a frame-work of seven privacy principles that help organizations in promoting positive attitudestoward the reconciliation of privacy and innovation: responsible processing, empow-ering data subjects, secure data handling, proactive risk management, ethical aware-ness, cost–benefit assessment, transparent data processing.

The next thematic area addresses privacy implementation.In the paper by Pietro Ferrara, Luca Olivieri, and Fausto Spoto, “Tailoring Taint

Analysis to GDPR,” a static software analysis is brought under the spotlight. Aspersonal data controllers of sensitive data need to enforce privacy by design and bydefault, static program analysis can be applied to track how sensitive data are auto-matically managed by means of software, and if such software could leak some of thesedata.

Co-authors Maurizio Naldi, Alessandro Mazzoccoli, and Giuseppe D’Acquistopresent a paper entitled “Hiding Alice in Wonderland: A Case for the Use of SignalProcessing Techniques in Differential Privacy.” The transformation of data in statisticaldatabases can be leveraged to hide the presence of an individual. By using recoloringthat preserves statistical properties of true data, the presence of the individual can behidden as it enlarges the range of attribute values for which the presence of the indi-vidual of interest cannot be reliably inferred.

In the paper by Severin Engelmann, Jens Grossklags, and Orestis Papakyri-akopoulos, “A Democracy Called Facebook? Participation as a Privacy Strategy onSocial Media,” the issues of notice and consent are debated. This paper carries out anempirical assessment of the participatory privacy strategy designed to democratizesocial media policy-making and it describes the various components of Facebook’sparticipatory governance system.

The thematic part entitled “Compliance,” comprises the following papers.The paper by Diana Dimitrova and Paul De Hert, “The Right of Access Under the

Police Directive: Small Steps Forward,” sets out to examine the right of access underDirective 2016/680, which regulates the processing of personal data by EU MemberStates’ law enforcement authorities. The right of access is analyzed in terms oftransparency provided to data subjects to allow for harmonized data protection acrossEU law enforcement agencies.

Co-authors Sushant Agarwal, Simon Steyskal, Franjo Antunovic, and SabrinaKirrane in their paper “Legislative Compliance Assessment: Framework, Model, and

VIII Preface

Page 9: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

GDPR Instantiation,” discuss compliance assessment tools. In this paper, a modularcompliance assessment framework is presented that can support multiple legislations.

The last thematic area presented in the proceedings is on legal aspects.The paper by Wouter Seinen, Andre Walter, and Sari van Grondelle, entitled,

“‘Compatibility’ as a Mechanism for Responsible Further Processing of PersonalData,” addresses the area of further processing of article 6(4) of the GDPR. Data to beprocessed involves data that have been collected at an earlier stage. This paper dis-cusses consent and the compatibility option that allows data controllers to motivatefurther processing.

Co-authors Jules Sarrat and Raphael Brun present “DPIA: How to Carry Out Oneof the Key Principles of Accountability.” The authors address the important topic ofimpact assessments prioritization and ecosystems.

Maria Grazia Porcedda, in her paper entitled “‘Privacy by design’ in EU Law,”tackles the question of how to reconcile the technical understanding of “privacy bydesign” with the nature of “privacy” in EU law. As privacy concerns two discreetconstitutionally protected rights– respect for private and family life, and protection ofpersonal data– the author proposes an approach to identify the essence of the tworights, which rests on identifying first the rights’ attributes.

Experts view the application of the GDPR as the starting point of the effort towardaffording a better level of protection of the rights to privacy and the protection ofpersonal data. It will be equally important to observe the guidance of Data ProtectionAuthorities (DPAs) and the European Data Protection Board (EDPB), in general aswell as when they seek to mitigate the consequences of personal data breaches that arecurrently on the rise.

So far, each year personal data breaches have been growing in volume and impacton data subjects. Data controllers and data subjects need to be guided in order tomeaningfully bring down the adverse consequences experienced so far by all partiesinvolved, except the perpetrators, of course. It is still to soon in the implementationof the GDPR to be able to fully come to terms with the influence that this sweepingpiece of legislation is likely to have on the processing of personal data across the EUand beyond. The GDPR will face challenges in the future, with far-reaching conse-quences for the meaningful protection of rights across the EU. Looking into the future,artificial intelligence is likely to pose questions that will be difficult for present-daylegislation to respond to, without resorting to broad interpretations thereof. ENISA hasbuilt a track record in making available advice and recommendations on securitymeasures for privacy and personal data protection; it will continue remaining com-mitted to the goal of providing a forum to experts involved and retaining a thoughtleadership role in this field.

June 2018 Manel MedinaAndreas MitrakasKai Rannenberg

Erich SchweighoferNikolaos Tsouroulas

Preface IX

Page 10: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Organization

General Co-chairs

Manel Medina Universitat Politècnica de Catalunya, SpainAndreas Mitrakas ENISA, European UnionKai Rannenberg Goethe University Frankfurt, GermanyErich Schweighofer University of Vienna, AustriaNikolaos Tsouroulas 11Paths Telefonica Cybersecurity Unit, Spain

Program Committee

Luis Antunes University of Porto, PortugalAthena Bourka ENISA, European UnionPompeu Casanovas UAB, SpainValentina Casola University of Naples Federico II, ItalyClaude Castelluccia Inria, FranceFanny Coudert EDPS, European UnionMalcolm Crompton IIS, AustraliaJosé María De Fuentes Universidad Carlos III de Madrid, SpainJosé-Maria Del-Alamo Universidad Politécnica de Madrid, SpainRoberto Di Pietro Hamad Bin Khalifa University, QatarJosep Domingo-Ferrer Universitat Rovira i Virgili, SpainProkopios Drogkaris ENISA, European UnionAlberto

Escudero-PascualIT+46, Spain

Hannes Federrath University of Hamburg, GermanyMathias Fischer University of Hamburg, GermanySimone Fischer-Hübner Karlstad University, SwedenLorena González

ManzanoUniversidad Carlos III de Madrid, Spain

Antonio Guzmán 11Paths, SpainMarit Hansen Unabhängiges Landeszentrum für Datenschutz

Schleswig-Holstein, GermanyDominik Herrmann University of Bamberg, GermanyMarko Hölbl University of Maribor, SloveniaWalter Hötzendorfer Research Institute AG & Co KG, AustriaKristina Irion University of Amsterdam, The NetherlandsGiuseppe Italiano University of Rome Tor Vergata, ItalyChristos Kalloniatis University of the Aegean, GreeceIrene Kamara VUB/TILT, BelgiumSokratis Katsikas Center for Cyber and Information Security, NTNU,

Norway

Page 11: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Stefan Katzenbeisser TU Darmstadt, GermanyDogan Kesdogan Universität Regensburg, GermanyPeter Kieseberg Kibosec GmbH, AustriaDariusz Kloza Vrije Universitet Brussel, BelgiumAndrea Kolberger University of Applied Sciences Upper Austria, AustriaStefan Köpsell TU Dresden, GermanyDaniel Le Métayer Inria, FranceHerbert Leitold A-SIT, AustriaFabio Martinelli IIT-CNR, ItalyAlexandra Michota ENISA, European UnionChris Mitchell Royal Holloway, University of London, UKMaurizio Naldi University of Rome Tor Vergata, ItalySebastian Pape Goethe University Frankfurt, GermanyAljosa Pasic Atos Origin, SpainJoachim Posegga University of Passau, GermanyVincent Rijmen Katholieke Universiteit Leuven, BelgiumHeiko Roßnagel Fraunhofer Institut, GermanyKazue Sako NEC, JapanPeter Schartner Klagenfurt University, GermanyStefan Schiffner Uni.lu, LuxembourgJetzabel M. Serna

OlveraUniversitat Politècnica de Catalunya, Spain

Florian Skopik AIT Austrian Institute of Technology, AustriaMorton Swimmer Trend Micro, Inc., GermanyJozef Vyskoc VaF, SlovakiaNathalie Weiler ETZ, SwitzerlandStefan Weiss Swiss Re, GermanyDiane Whitehouse IFIP WG 9.2 on social accountability and ICTBernhard C. Witt it.sec GmbH & Co. KG, GermanySven Wohlgemuth Hitachi, Ltd. Research & Development Group, GermanyHarald Zwingelberg ULD, Germany

Additional Reviewers

Nicolas Fähnrich Fraunhofer, GermanyAkos Grosz Goethe University Frankfurt, GermanyMajid Hatamian Goethe University Frankfurt, GermanyNikolaos Tantouris ENISA, European UnionStephanie Weinhardt Fraunhofer, Germany

XII Organization

Page 12: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Organization and Sponsors

Organizers

European Union Agency for Network and Information Security (ENISA) (EU)European Commission Directorate for Communications, Networks, Content andTechnology (DG CONNECT) (EU)Universitat Politècnica de Catalunya (UPC‐BarcelonaTECH) (ES)Telefónica (ES)

Gold Sponsors

Silver Sponsor Bronze Sponsor

Organization XIII

Page 13: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Partners

XIV Organization

Page 14: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Contents

Technical Analysis and Techniques

Which Apps Have Privacy Policies? An Analysis of Over One MillionGoogle Play Store Apps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Peter Story, Sebastian Zimmeck, and Norman Sadeh

Towards a Roadmap for Privacy Technologies and the General DataProtection Regulation: A Transatlantic Initiative . . . . . . . . . . . . . . . . . . . . . 24

Stefan Schiffner, Bettina Berendt, Triin Siil, Martin Degeling,Robert Riemann, Florian Schaub, Kim Wuyts, Massimo Attoresi,Seda Gürses, Achim Klabunde, Jules Polonetsky, Norman Sadeh,and Gabriela Zanfir-Fortuna

RESPECT4U – Privacy as Innovation Opportunity . . . . . . . . . . . . . . . . . . . 43Marc van Lieshout and Sophie Emmert

Privacy Implementation

Tailoring Taint Analysis to GDPR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63Pietro Ferrara, Luca Olivieri, and Fausto Spoto

Hiding Alice in Wonderland: A Case for the Use of Signal ProcessingTechniques in Differential Privacy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Maurizio Naldi, Alessandro Mazzoccoli, and Giuseppe D’Acquisto

A Democracy Called Facebook? Participation as a Privacy Strategyon Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Severin Engelmann, Jens Grossklags, and Orestis Papakyriakopoulos

Compliance

The Right of Access Under the Police Directive: Small Steps Forward . . . . . 111Diana Dimitrova and Paul De Hert

Legislative Compliance Assessment: Framework, Modeland GDPR Instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

Sushant Agarwal, Simon Steyskal, Franjo Antunovic,and Sabrina Kirrane

Page 15: Lecture Notes in Computer Science 11079978-3-030-02547... · 2018-12-29 · data protection officers, data breach notifications, a risk-based approach, security measures, consent

Legal Aspects

Compatibility as a Mechanism for Responsible Further Processingof Personal Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

Wouter Seinen, Andre Walter, and Sari van Grondelle

DPIA: How to Carry Out One of the Key Principles of Accountability . . . . . 172Jules Sarrat and Raphael Brun

‘Privacy by Design’ in EU Law: Matching Privacy Protection Goalswith the Essence of the Rights to Private Life and Data Protection . . . . . . . . 183

Maria Grazia Porcedda

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

XVI Contents