General Data Protection Regulation and the Italian Data Protection Law. A lecture in Tokyo’s Keio University

NEAR Project(Jean Monnet Networks)共催

<NEAR: A New Dimension in Asia-Europe Relations: Exploring EU’s Global Actorness and Strategic Partnership in Asia (China, India, Japan and South Korea)>

116th Keio Jean Monnet Workshop for EU Studies

第116回 慶應EU研究会のお知らせ 日頃よりお世話になっております。

各位

以下の通り第116回慶應EU研究会のご案内をお送り致しますので、よろしければ是非ご参加下さい。

日時: 2019年 7月19日(金)17:00~18:00
Date: 19 July 2019 17:00-18:00

 ?

研究報告 (EU研究ワークショップ・EU法セミナー):

場所: 慶應義塾大学三田キャンパス南館地下1階2B15教室

Venue: B1st Floor, Room 2B15, South Building, Mita campus, Keio University

「一般データ保護規則とイタリアデータ保護法」

(英語)

アンドレア・モンティ弁護士(イタリア)

(イタリア・キエーティ=ぺスカラ大学非常勤講師)

“General Data Protection Regulation and the Italian Data Protection Law”

(English)

Sig. Avvocato Andrea Monti
Adjunct Professor, Università di Chieti-Pescara

庄司克宏(Katsuhiro SHOJI)
慶應義塾大学大学院法務研究科(法科大学院)教授
Professor, Law School, Keio University
ジャン・モネ・チェア(Jean Monnet Chair ad personam)
ジャン・モネEU 研究センター(慶應義塾大学)所長
Director, Jean Monnet Centre of Excellence for EU Studies at Keio University
問合せ(Queries):
fumifigo@keio.jp(事務局長:東史彦(Dr. AZUMA))
yhosoi@ner.takushoku-u.ac.jp(事務次長:細井優子(Dr. HOSOI) Continue reading “General Data Protection Regulation and the Italian Data Protection Law. A lecture in Tokyo’s Keio University”

De (GDPR) Minimis Non Curat Praetor or:Not All GDPR Infringements Can Be Fined…

On the basis that minor damages are not covered by the Data Protection Legislation, the decision 4 U 760/19 issued by the Dresden Oberlandesgericht rejected a data-protection tort action filed against and individual against a content-sharing platform, charged by the plaintiff of having provoked “distress” by allowing the publication of a video .

This contemporary enforcement in the GDPR realm of the old Roman Law adage “de minimis non curat praetor” is very important, as it has a strong “stopping power” against the myriad of claims grounded on alleged “unbearable pain” and “reputation offenses” that actually resolve in naught damages.

Furthermore, this decision questions the possibility, for a Data Protection Authority, to fine a Data Controller if the infringement of the GDPR doesn’t cause any actual harm. Continue reading “De (GDPR) Minimis Non Curat Praetor or:Not All GDPR Infringements Can Be Fined…”

Prevention and Repression of Computer Crime against the EU: the problem is clear, the solution doesn’t

On May 17, 2019 the Council of the European Union has established

a framework which allows the EU to impose targeted restrictive measures to deter and respond to cyber-attacks which constitute an external threat to the EU or its member states, including cyber-attacks against third States or international organisations where restricted measures are considered necessary to achieve the objectives of the Common Foreign and Security Policy (CFSP).

In other words, this framework allows the EU to enforce a series of sanctions – including the prohibition of entry into the EU – to  those who attack the computer resources located in the Union from other countries. At first glance, everything would look normal and – all in all – acceptable. But since the devil is in the details, a more in-depth look at the matter reveals a few problems.

Firstly, the violation of the principles of due process: a computer attack is a crime and for sanctions to be applied to the culprits,  a proper trial is necessary. In the outline envisaged by the Council of European Union, this is not foreseen.  A blatant violation of the fundamental rights of the individual (also) recognized by the Nice Charter.

Secondly, even if the first condition is met, it must be remembered that in criminal matters the jurisdiction belongs strictly and solely to the national legislator. What cases and which penal codes or similar rules will be applied in order to decide whether we are dealing with an event which falls within the scope of the ‘framework’ laid down by the Council?

Thirdly, are we talking about public policy, state security or the defense of the interests of the Union? The question is not trivial because in the first case the “domain” is that of a hypothetical “EU Ministry of the Interior”, in the second of the hypothetical “European secret services” and in the third case of the “Ministry of Defense”. Ambiguously, however, the Council speaks of “discouraging” (i.e. “preventing”) and “opposing” (i.e. “reacting”) in order to achieve the objectives of the foreign policy “And” those of the common security. This means that “prevention” and “reaction” to the cyber attacks are instruments of “enforcement” of the foreign policy of the EU also independently of security issues.

Let’s get ready to face very interesting issues…

Apple, Facial Recognition and the Right of Defense (plus, a sting at the GDPR)

The news is gaining momentum: Osumane Bah, a student that has been charged of multiple ? theft in ? Apple stores located in several cities of the United States, filed a suit against the Cupertino-based company seeking for a compensation of one billion USD for having been wrongly identified by Apple as the author of these crimes. The decisive evidence that lead to his involvement in the investigations, this is Mr. Bah’s basis of the claim, is that he has been ? wrongly identified by a facial recognition system operated either by Apple or a security company hired for the job. Continue reading “Apple, Facial Recognition and the Right of Defense (plus, a sting at the GDPR)”

Public security, powers of the public security authority and information technology

Master of Science in Cybersecurity – Prof. Luigi V. Mancini

CYBERSURE
CYBERsecurity at Sapienza University of Rome Events

Public security, powers of the public security authority and information technology

Andrea Monti – Lawyer

 ?Affiliation: Adjunct Professor of Public Policy and Public Security Law at the University of Chieti-Pescara.

 ?May 13, 2019, from 16:15 to 18:30

 ?Aula II, ground floor of the building “ex-Facoltà di Scienze Statistiche” in “Città Universitaria”, Piazzale Aldo Moro, 5 (Rome).

 ?

Part 1. Technological public order and information security

Part 2. Public security and information technology

 ?

The pervasiveness of information technologies has repercussions not solely in terms of judicial activity, but also affects the management of public order – and therefore the exercise of powers attributed to the Ministry of the Interior in different areas and before the Judiciary intervention.

A modern notion of public order must necessarily take into account the issue of information security as its own constitutive element.

This seminar describes, starting from the analysis of the Consolidated Law on public security, the structure of the public security authority, and defines roles and powers and analyses the way in which this structure deals with the subjects of the information society. ? ? ? ? ? ? ? ? ? ? ? ? ? ?

In particular, it highlights the possible interactions between the State Police, Internet providers and platform operators Over the top.

Participation is free, however registration is required on Eventbrite by searching “Public security, powers of the public security authority and information technology”.

Upcoming Seminars at https://cybersecurity.uniroma1.it/cybersecurity-seminars

For any questions or further info, please visit https://cybersecurity.uniroma1.it or write to cybersecurity_info@uniroma1.it

LinkedIn:  ? ? ? ? ? ? ? ? ?Master of Science Cybersecurity Sapienza

Instagram: ? ? ? ? ? ?  ? ? @cybersecurity_sapienza