66
909 Bibliography I. Legislation A. International a. European Union (European (pre)legislation is available and can be searched at http://eur-lex.europa.eu/en/ index.htm) i. Treaties, Conventions and Charters Treaty of Lisbon amending the Treaty on European Union and the Treaty establishing the European Community, 13 December 2007, O. J. C 306, 17.12.2007, pp. 1–229. Charter of Fundamental Rights of the European Union, O. J. C 364, 18.12.2000, pp. 1–22 and Explanations relating to the Charter of Fundamental Rights, O. J. C 303, 14.12.2007, pp. 17–35. Convention determining the State responsible for examining applications for asylum lodged in one of the Member States of the European Communities – Dublin Convention, O. J. C 254, 19.08.1997, pp. 1–12. Convention applying the Schengen Agreement of 14 June 1985 between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the Gradual Abolition of Checks at their Common Borders, 19 June 1990. ii. Regulations, Directives and Decisions General Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and usersrights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, O. J. L 337, 18.12.2009, pp. 11–36. Council Framework Decision 2008/977/JHA of 27 November 2008 on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters, O. J. L 350, 30.12.2008, pp. 60–71. Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available E.J. Kindt, Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis, Law, Governance and Technology Series 12, DOI 10.1007/978-94-007-7522-0, © Springer Science+Business Media Dordrecht 2013

Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

909

Bibliography

I. Legislation

A. International

a. European Union

( European ( pre ) legislation is available and can be searched at http://eur-lex.europa.eu/en/index.htm )

i. Treaties, Conventions and Charters

Treaty of Lisbon amending the Treaty on European Union and the Treaty establishing the European Community, 13 December 2007, O . J . C 306, 17.12.2007, pp. 1–229.

Charter of Fundamental Rights of the European Union, O . J . C 364, 18.12.2000, pp. 1–22 and Explanations relating to the Charter of Fundamental Rights, O . J . C 303, 14.12.2007, pp. 17–35.

Convention determining the State responsible for examining applications for asylum lodged in one of the Member States of the European Communities – Dublin Convention, O . J . C 254, 19.08.1997, pp. 1–12.

Convention applying the Schengen Agreement of 14 June 1985 between the Governments of the States of the Benelux Economic Union, the Federal Republic of Germany and the French Republic on the Gradual Abolition of Checks at their Common Borders, 19 June 1990.

ii. Regulations, Directives and Decisions

General

Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users′ rights relating to electronic communications networks and services, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws, O . J . L 337, 18.12.2009, pp. 11–36.

Council Framework Decision 2008/977/JHA of 27 November 2008 on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters, O . J . L 350, 30.12.2008, pp. 60–71.

Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available

E.J. Kindt, Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis, Law, Governance and Technology Series 12,DOI 10.1007/978-94-007-7522-0, © Springer Science+Business Media Dordrecht 2013

Page 2: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

910

electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54–63.

Directive 2004/23/EC of the European Parliament and of the Council of 31 March 2004 on setting standards of quality and safety for the donation, procurement, testing, processing, preservation, storage and distribution of human tissues and cells, O . J . L 102, 7.04.2004, pp. 48–58.

Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector, O . J . L 201, 31.07.2002, pp. 37–47.

Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market, O . J . L 178, 17.07. 2000, pp. 1–16.

Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, O . J . L 139, 19.1.2000, pp. 12–20.

Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector, O . J . L 024, 30.01.1998, pp. 1–8.

Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases, O . J . L 77, 27.03.1996, pp. 20–28.

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, O . J . L 281, 23.11.1995, pp. 31–50.

Prüm cooperation

Council Decision 2008/615/JHA of 23 June 2008 on the stepping up of cross-border co-operation, particularly in combating terrorism and cross-border crime, O . J . L. 210, 6.08.2008, pp. 1–11.

Council Decision 2008/616/JHA of 23 June 2008 on the implementation of Decision 2008/615/JHA of 23 June 2008 on the stepping up of cross-border co-operation, particularly in combating terrorism and cross-border crime, O . J . L. 210, 6.08.2008, pp. 12–72.

SIS II

Council Decision 2007/533/JHA of 12 June 2007 on the establishment, operation and use of the Second Generation Schengen Information System (SIS II), O . J . L 205, 7.08.2007, pp. 63–84.

Regulation (EC) No 1986/2006 of the European Parliament and of the Council of 20 December 2006 regarding access to the Second Generation Schengen Information System (SIS II) by the services in the Member States responsible for issuing vehicle registration certifi cates, O . J . 2006 L 381, 28.12.2006, pp. 1–3.

Regulation (EC) No 1987/2006 of the European Parliament and of the Council of 20 December 2006 on the establishment, operation and use of the second generation Schengen Information System (SIS II), O . J . 2006 L 381, 28.12.2006, pp. 4–23.

ePassports

Regulation (EC) No 444/2009 of the European Parliament and of the Council of 28 May 2009 amending Council Regulation (EC) No 2252/2004 on standards for security features and biometrics in passports and travel documents issued by Member States, O . J . L 142, 06.06.2009, pp. 1–4.

Commission Decision of 28 June 2006 laying down the technical specifi cations on the standards for security features and biometrics in passports and travel documents issued by Member States [C(2006) 2909 fi nal – not published in the Offi cial Journal].

Council Regulation No 2252/2004 of 13 December 2004 on standards for security features and biometrics in passports and travel documents issued by Member States, O . J . L 385, 29 December 2004, pp.1–6.

Bibliography

Page 3: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

911

Frontex

Council Regulation (EC) No 2007/2004 of 26 October 2004 establishing a European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union, O . J . L 349, 25.11.2004, pp.1–11.

VIS

Regulation (EC) No 81/2009 of the European Parliament and of the Council of 14 January 2009 amending Regulation (EC) No 562/2006 as regards the use of the Visa Information System (VIS) under the Schengen Border Code, O . J . L 35, 4.02.2009, pp. 56–58.

Regulation (EC) No 767/2008 of the European Parliament and of the Council of 9 July 2008 con-cerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas, O . J . L 218, 13.08.2008, pp. 60–81.

Council Decision 2008/633/JHA of 23 June 2008 concerning access for consultation of the Visa Information System (VIS) by designated authorities of Member States and by Europol for the purposes of the prevention, detection and investigation of terrorist offences and of other serious criminal offences, O . J . L. 218, 13.08.2008, p. 129–136.

Council Decision of 8 June 2004 establishing the Visa Information System (VIS), 2004/512/EC, O.J. L. 213, 15.06.2004, pp. 5–7.

Eurodac

Commission Regulation No (EC) 1560/2003 of 2 September 2003 laying down detailed rules for the application of Council Regulation (EC) No 343/2003 establishing the criteria and mechanisms for determining the Member State responsible for examining an asylum appli-cation lodged in one of the Member States by a third-country national, O . J . L 222, 5.09.2003, pp. 3–23.

Council Regulation No (EC) No 407/2002 of 28 February 2002 laying down certain rules to imple-ment Regulation (EC) No 2725/2000 concerning the establishment of “Eurodac” for the com-parison of fi ngerprints for the effective application of the Dublin Convention, O . J . L 62, 5.03.2002, pp. 1–5.

Council Regulation No (EC) No 2725/2000 of 11 December 2000 concerning the establishment of ‘Eurodac’ for the comparison of fi ngerprints for the effective application of the Dublin Convention, O . J . L 316, 15.12.2000, pp. 1–10.

iii. Proposals, Communications, Consultations and Resolutions

Proposals

European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11 fi nal, 25.1.2012, 118 p.

European Commission, Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of crimi-nal offences or the execution of criminal penalties, and the free movement of such data, COM(2012) 10 fi nal, 25.1.2012, 54 p.

European Commission, Proposal for a Regulation of the European Parliament and of the Council Establishing the European Border Surveillance System (EUROSUR), COM(2011) 873 fi nal, 12.12.2011, 44 p.

European Commission, Proposal for a Directive of the European Parliament and of the Council on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime, COM(2011) 32 fi nal, 2.2.2011, 32 p.

Bibliography

Page 4: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

912

European Commission, Proposal for a Council Framework Decision on the Exchange of Information under the Principle of Availability, COM(2005) 490 fi nal, 12.10.2005, 33 p.

European Commission, Proposal for a Regulation of the European Parliament and of the Council amending Council Regulation (EC) No 2252/2004, COM(2007) 619 fi nal, 18.10.2007, 8 p.

European Commission, Amended proposal for a Council Directive on the protection of individuals with regard to the processing of personal data and on the free movement of such data, COM (92) 422 fi nal, 16.10.1992, O . J . C 311, 27.11.1992, pp. 30–61.

European Commission, Proposal for a European Parliament and Council Directive concerning the protection of individuals in relation to the processing of personal data, COM(90) 314 fi nal, 13.9.1990, O . J . C 277, 5.11.1990, p. 3.

Communications

European Commission, ‘Safeguarding Privacy in a Connected World: A European Data Protection Framework for the 21 st Century’, COM(2012) 9 fi nal, 25.1.2012, 13 p.

European Commission, Communication from the Commission to the European Parliament and the Council, Smart borders – options and the way ahead, COM(2011) 680 fi nal, 25.10.2011, 14 p.

European Commission, Management Plan 2011. DG Home, 33 p. European Commission, Communication from the Commission to the European Parliament, the

Council, the Economic and Social Committee and the Committee of the Regions. A compre-hensive approach on personal data protection in the European Union, COM(2010) 609 fi nal, 4.11.2010, 20 p.

European Commission, Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions. A Digital Agenda for Europe, COM(2010) 245 fi nal/2, 26.08.2010, 41 p.

European Commission, Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the regions. Delivering an area of freedom, security and justice for Europe’s citizens. Action Plan Implementing the Stockholm Programme, COM(2010) 171 fi nal, 68 p.

European Council, The Stockholm Programme – An open and secure Europe serving and protecting citizens, O . J . C 115, 4.05.2010, pp. 1–38.

EU Commission, Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM(2007) 228 fi nal, 2.5.2007, 10 p.

European Commission, Communication from the Commission to the Council and the European Parliament. Implementing the Hague Programme: the way Forward, COM(2006) 331 fi nal, 28.06.2006, 15 p.

European Commission, Communication to the Council and the European Parliament. Interoperability for Pan-European e-Government Services, COM(2006) 45, 13.02.006, 12 p.

European Commission, Communication from the Commission to the Council and the European Parliament on improved effectiveness, enhanced operability and synergies among European databases in the area of Justice and Home Affairs, COM (2005)597 fi nal, 25.11.2005, 11 p.

European Commission, Communication from the Commission to the Council and the European Parliament – The Hague Programme: Ten priorities for the next fi ve years The Partnership for European renewal in the fi eld of Freedom, Security and Justice, COM(2005) 184 fi nal, 10.5.2005.

Consultations and Resolutions

European Commission, Consultation on the legal framework for the fundamental right to protec-tion of personal data, July 2009.

Council Resolution 2001/C187/01 of 25 June 2001 on the exchange of DNA analysis results, O . J . C 187, 03.07.2001.

Bibliography

Page 5: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

913

iv. Opinions and documents of the EDPS, the Article 29 Data Protection Working Party and the European Union Agency for Fundamental Rights

European Union Agency for Fundamental Rights, Opinion of the European Union Agency for Fundamental Rights on the proposed data protection reform package , 2/2012, 1.10.2012, 34 p.

European Union Agency for Fundamental Rights, Data Protection in the European Union : the role of National Data Protection Authorities . Strengthening the fundamental rights architecture in the EU II , 2010, 50 p.

EDPS

( All opinions and documents of the EDPS are available and can be searched at https://secure.edps.europa.eu/EDPSWEB/ )

EDPS, Opinion on the amended proposal for a Regulation of the European Parliament and of the Council on the establishment of ‘EURODAC’ for the comparison of fingerprints for the effective application of Regulation (EU) No […/…][…] (Recast version), 5.09.2012, 22 p.

EDPS, Opinion on the data protection reform package, 7.3.2012, 75 p. EDPS, Opinion on a notifi cation for prior checking received from the Data Protection Offi cer

of the European Commission related to the “Fingerprint recognition study of children below the age of 12 years”, 25.7.2011 (Case 2011–0209), 9 p.

EDPS, Opinion on the proposal for a Directive of the European Parliament and of the Council on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime, O . J . C 181, 22.06.2011, pp. 24–30.

EDPS, Opinion on a research project funded by the European Union under the 7 th Framework Programme (FP 7) for Research and Technology Development (Turbine (TrUsted Revocable Biometric IdeNtitiEs), 1.02.2011, 14 p.

EDPS, Opinion on a Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions –“A comprehensive approach on personal data protection in the European Union”, 14.01.2011, 36 p.

EDPS, Opinion on the proposal for a Regulation of the European Parliament and of the Council amending Council Regulation (EC) No 2007/2004 establishing a European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union (FRONTEX), 17.05.2010, 9 p.

EDPS, Opinion on Promoting Trust in the Information Society by Fostering Data Protection and Privacy, 18.03.2010, 21 p.

EDPS, The EDPS Video-surveillance Guidelines, Brussels, March 2010, 64 p. EDPS, Opinion on the Proposal for a Directive of the European Parliament and of the Council on

standards of quality and safety of human organs intended for transplantation, O . J . C 192, 15.08.2009, pp. 6–13.

EDPS, EDPS comments on the Communication COM(2010) 311 fi nal from the Commission to the European Parliament and the Council on the Use of Security Scanners at EU airports, July 2010, 2 p.

EDPS, Opinion of 26 March 2008 on the proposal for a Regulation of the European Parliament and of the Council amending Council Regulation No 2252/2004, O . J . C 200, 6.08. 2008, pp. 1–5.

EDPS, Opinion 20 December 2007 on the communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions on ‘Radio Frequency Identifi cation (RFID) in Europe: steps towards a policy frame-work’ COM(2007) 96, O . J . C 101, 23.4.2008, pp. 1–12.

EDPS, Opinion on the Initiative of the Federal Republic of Germany, with a view to adopting a Council Decision on the implementation of Decision 2007/…/JHA on the stepping up of cross- border cooperation, particularly in combating terrorism and cross-border crime, O . J . C 89/1, 10.4.2008, pp. 1–7.

EDPS, Opinion on the Proposal for a Council Decision concerning access for consultation of the Visa Information System (VIS), O . J . C 97, 25.4.2006, pp. 6–10.

Bibliography

Page 6: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

914

EDPS, Opinion of 19 October 2005 on three Proposals regarding the Second Generation Schengen Information Systems (SIS II) (COM (2005)230 fi nal, COM (2005)236 fi nal and COM(2005)237fi nal, O . J . C 91, 19.04. 2006, pp. 38–56.

EDPS, Opinion of 23 March 2005 on the Proposal for a Regulation of the European Parliament and of the Council concerning the Visa Information System (VIS) and the exchange of data between Member States on short stay-visas COM(2004)835fi nal, O . J . C 181, 23.07. 2005, pp. 13–29.

P. Hustinx, Comments on the Communication of the Commission on interoperability of European databases, 10.03.2006, 5 p.

The Article 29 Data Protection Working Party

(All Article 29 Data Protection Working Party documents are available and can be searched at http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/index_en.htm )

Article 29 Data Protection Working Party, Opinion 08/2012 providing further input on the data protection reform discussions, WP199, 5.10.2012, 45 p.

Article 29 Data Protection Working Party, Opinion 3/2012 on developments in biometric tech-nologies, WP193, 27.04.2012, 34 p.

Article 29 Data Protection Working Party, Opinion 02/2012 on facial recognition in online and mobile services, WP192, 22.03.2012, 9 p.

Article 29 Data Protection Working Party, Opinion 01/2012 on the data protection reform propos-als, WP191, 23.03.2012, 32 p.

Article 29 Data Protection Working Party, Opinion 15/2011 on the defi nition of consent, WP187, 13.07.2011, 38 p.

Article 29 Data Protection Working Party, Opinion 14/2011 on data protection issues related to the prevention of money laundering and terrorist fi nancing, WP186, 13. 06.2011, 4 p., and Annex, 28 p.

Article 29 Data Protection Working Party, Letter to DG Justice, 20.4.2011, 2 p., with three advice papers in attachment.

Article 29 Data Protection Working Party, Advice paper on special categories of data (“sensitive data”), 20.4.2011, 16 p.

Article 29 Data Protection Working Party, Opinion 10/2011 on the proposal for a Directive of the European Parliament and of the Council on the use of passenger name record data for the pre-vention, detection, investigation and prosecution of terrorist offences and serious crime, WP181, 5.04.2011, 9 p.

Article 29 Data Protection Working Party, Opinion 9/2011 on the revised Industry Proposal for a Privacy and Data Protection Impact Assessment Framework for RFID Applications, WP180, 11.02.2011, 7 p. and Annex, 24p.

Article 29 Data Protection Working Party, Opinion 3/2010 on the principle of accountability, WP173, 13.07. 2010, 19 p.

Article 29 Data Protection Working Party, Opinion 2/2010 on online behavioural advertising, WP171, 22.06. 2010, 24 p.

Article 29 Data Protection Working Party, Opinion 1/2010 on the concept of “controller” and “processor”, WP169, 16.02. 2010, 33 p.

Article 29 Data Protection Working Party and the Working Party on Police and Justice, The Future of Privacy. Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of privacy, WP168, 1.12. 2009, 28 p.

Article 29 Data Protection Working Party, Opinion 5/2009 on online social networking, WP163, 12.06.2009, 13 p.

Article 29 Data Protection Working Party, Opinion 2/2009 on the protection of children’s personal data (General Guidelines and the case of schools), WP160, 11.02. 2009, 20 p.

Article 29 Data Protection Working Party, Opinion 1/2008 on data protection issues related to search engines, WP148, 4.04. 2008, 29 p.

Bibliography

Page 7: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

915

Article 29 Data Protection Working Party, Opinion 4/2007 on the concept of personal data, WP136, 20.06.2007, 26 p.

Article 29 Data Protection Working Party, Opinion 3/2007 on the Proposal for a Regulation amend-ing the Common Consular Instructions on visas for diplomatic missions and consular posts in relation to the introduction of biometrics, including provisions on the organisation of the recep-tion and processing of visa applications (COM (2006) 269 fi nal), WP134, 1.03.2007, 12 p.

Article 29 Working Party, Working Document on the processing of personal data relating to health in electronic health records (EHR), WP131, 15.02.2007, 22 p.

Article 29 Data Protection Working Party, Thirteenth Annual Report on the Article 29 Working Party on Data Protection, European Commission, 132 p.

Article 29 Data Protection Working Party, Opinion on Implementing the Council Regulation (EC) No 2252/2004 of 13 December 2004 on standards for security features and biometrics in pass-ports and travel documents issued by Member States, WP112, 30.09. 2005, 12 p.

Article 29 Data Protection Working Party, Opinion 2/2005 on the Proposal for a Regulation con-cerning the Visa Information System (VIS) and the exchange of data between Member States on short stay-visas (COM (2004) 835 fi nal), WP110, 23.06. 2005, 24 p.

Article 29 Data Protection Working Party, Opinion 7/2004 on the inclusion of bio metric elements in residence permits and visas taking account of the establishment of the European information system on visas (VIS), WP96, 11.08.2004, 11 p.

Article 29 Data Protection Working Party, Opinion on More Harmonised Information Provisions, WP100, 25.11.2004, 9 p.

Article 29 Data Protection Working Party, Working Document on Genetic Data, WP91, 17.03. 2004, 14 p.

Article 29 Data Protection Working Party, Working Document on Biometrics, WP80, 1.08.2003, 11 p.

Article 29 Data Protection Working Party, Working document on E-Government, WP73, 8.05. 2003, 18 p.

Article 29 Data Protection Working Party, Working Document on on-line authentication services, WP68, 29.1.2003, 16 p.

Article 29 Data Protection Working Party, Opinion 2/2002 on the use of unique identifi ers in tele-communication terminal equipments: the example of Ipv6, WP58, 30.05.2002, 7 p.

Article 29 Data Protection Working Party, Opinion 6/2002 on transmission of Passenger Manifest Information and other data from Airlines to the United States, WP66, 24.10.2002, 9 p.

Article 29 Data Protection Working Party, Recommendation 1/2001 on Employee Evaluation Data, WP42, 22.3. 2001, 3 p.

Article 29 Data Protection Working Party, Opinion 8/2001 on the processing of personal data in the employment context, WP48, 13.9.2001, 28 p.

Article 29 Data Protection Working Party, Recommendation 4/99 on the inclusion of the funda-mental right to data protection in the European catalogue of fundamental rights, WP26, 7.9.1999, 3 p.

Article 29 Data Protection Working Party, Recommendation 3/97: Anonymity on the Internet, 3.12.1997, 12 p.

b . Council of Europe

(The documents of the Council of Europe are available and can be searched at http://hub.coe.int/)

i. Conventions

Council of Europe, ETS No. 164, Convention for the Protection of Human Rights and Dignity of the Human Being with regard to the Application of Biology and Medicine: Convention on Human Rights and Biomedicine, 4 April 1997.

Council of Europe, ETS No. 108, Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, 28 January 1981.

Bibliography

Page 8: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

916

ii. Recommendations

Council of Europe, The need for a global consideration of the human rights implications of biometrics, Doc. 12522, Parliamentary Assembly, 16.02.2011, 15 p.

Council of Europe, Recommendation CM/Rec(2010)13 of the Committee of Ministers to Member States on the protection of individuals with regard to automatic processing of personal data in the context of profi ling, 23.11.2010.

Council of Europe, Recommendation No. Rec(2006)4 of the Committee of Ministers to Member States on research on biological material of human origin, 15.03.2006.

Council of Europe, Recommendation No. Rec(97)5 of the Committee of Ministers to Member States on the Protection of Medical Data, 17.02.1997, 7 p.

Council of Europe, Recommendation No. R(92)1 of the Committee of Ministers to Member States on the use of analysis of deoxyribonucleic acid (DNA) within the framework of the criminal justice system, 10.10.1992., 3 p.

Council of Europe, Recommendation No. R(92)3 on genetic testing and screening for health care purposes, 10.02.1992, 4 p.

Council of Europe, Recommendation No. R(89) of the Committee of Ministers to Member States on the protection of personal data for employment purposes, 18.01.1989, 5 p.

Council of Europe, Recommendation No. R(87) 15 of the Committee of Ministers to Member States regulating the use of personal data in the police sector, 1987, 4 p.

Council of Europe, Recommendation No. R(81)1 of the Committee of Ministers to Member States on Regulations for Automated Medical Data Banks, 23.1.1981, 4 p.

c . OECD

(The documents of the OECD are available and can be searched at www.oecd.org)

OECD, Ministerial Declaration on the Protection of Privacy on Global Networks, 7–9.10.1998, Ottawa, DSTI/ICCP/REG(98)10/FINAL, 5 p.

Council of the OECD, Recommendation concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal data, 23 September 1980.

B. National

a . Belgium

i. Acts and Regulations

( Acts and regulations are also available and can be searched at http://www.ejustice.just.fgov.be/wet/wet.htm or at http://www.belgielex.be/nl/index.html )

Wet 7 November 2011 houdende wijziging van het Wetboek van strafvordering en van de wet van 22 maart 1999 betreffende de identifi catieprocedure via DNA onderzoek in strafzaken, B . S . 30.11.2011, pp. 70716–70727.

Wet 19 December 2008 inzake het verkrijgen en het gebruik van menselijk lichaamsmateriaal met het oog op de geneeskundige toepassing op de mens of het wetenschappelijk onderzoek, B . S ., 30.12. 2008, pp. 68774–68786.

Wet 15 mei 2007 waarbij de bevoegdheid om toegang te verlenen tot de informatiegegevens van het wachtregister en van het register van de identiteitskaarten toevertrouwd wordt aan het sec-toraal comité van het Rijksregister, B . S ., 8.06.2007, pp. 31211–31214.

Wet 11 maart 2003 betreffende bepaalde juridische aspecten van de diensten van de informa-tiemaatschappij, B . S ., 17.03.2003 pp. 12962–12970.

Wet 9 juli 2001 houdende vaststelling van bepaalde regels in verband met het juridisch kader voor elektronische handtekeningen en certifi catiediensten, B . S ., 29.09.2001, pp. 33070–33078.

Wet 22 maart 1999 betreffende de identifi catieprocedure via DNA analysis in strafzaken, B . S . 20.05.1999, err. B.S. 24.06.1999, pp. 17547–17552.

Bibliography

Page 9: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

917

Wet 11 December 1998 tot omzetting van de richtlijn 95/46/EG van 24 oktober 1995 van het Europees Parlement en de Raad betreffende de bescherming van natuurlijke personen in ver-band met de verwerking van persoonsgegevens en betreffende het vrij verkeer van die gegevens, B . S ., 03.02.1999, pp. 3049–3065.

Wet 8 December 1992 tot bescherming van de persoonlijke levenssfeer ten opzichte van de ver-werking van persoonsgegevens, B . S ., 18.03.1993, pp. 5801–5814.

K.B. 4 februari 2002 ter uitvoering van de wet van 22 maart 1999 betreffende de identifi catiepro-cedure via DNA-onderzoek in strafzaken, B . S . 30.03. 2002, 1ste ed., pp. 13471–13475.

K.B. 13 februari 2001 ter uitvoering van de wet van 8 December tot bescherming van de persoon-lijke levenssfeer ten opzichte van de verwerking van persoonsgegevens, B . S . 13.03.2001, pp. 7908–7919.

K.B. nr. 14 tot vaststelling van de doeleinden, de criteria en de voorwaarden van toegestane ver-werkingen van de gegevens bedoeld in artikel 6 van de wet van 8 December 1992 tot bescherm-ing van de persoonlijke levenssfeer ten opzichte van de verwerking van persoonsgegevens, B . S . 30.05.1996, pp. 14532–14534.

K.B. nr. 7 tot vaststelling van de doeleinden, de criteria en de voorwaarden van toegestane ver-werkingen van de gegevens bedoeld in artikel 6 van de wet van 8 December 1992 tot bescherm-ing van de persoonlijke levenssfeer ten opzichte van de verwerking van persoonsgegevens, B . S . 28.02.1995.

Collectieve arbeidsovereenkomst No. 89 betreffende de diefstalpreventie en de uitgangscon-troles van werknemers bij het verlaten van de onderneming of de werkplaats, 30.01.2007, 9 p., available at http://www.cnt-nar.be/CAO-COORD/cao-089.pdf

ii. Parliamentary documents and reports

(The parliamentary documents are also available at www.senaat.be and www.dekamer.be)

Wetsontwerp tot wijziging 3van de wet van 8 December 1992 betreffende de bescherming van de persoonlijke levenssfeer ten opzichte van de verwerking van de persoonsgegevens wat de administratieve sancties, melding van lekken van gegevens, inzagerecht en informatieveilig-heidsconsulenten betreft, S. Becq et al., 26.5.2011, Parl . St . Kamer 2010–11, n° 1509/1, 18 p.

Wetsontwerp waarbij de bevoegdheid om toegang te verlenen tot de informatiegegevens van het wachtregister en van het register van de identiteitskaarten toevertrouwd wordt aan het sec-toraal comité van het Rijksregister, Amendementen, De Padt et al., Parl . St . Kamer 2006–07, n° 2937/2, 18 p.

Verslag namens de Commissie voor de Binnenlandse zaken en voor de administratieve aangelege-nheden uitgebracht door de heer Noreilde, Cameratoezicht, Parl . St . Kamer 2005–06, n° 3-1413/1, 125 p.

Verslag namens de Commissie voor de Justitie, Wetsontwerp tot omzetting van de Richtlijn 95/46/CE van 24 oktober 1995 van het Europees Parlement en de Raad betreffende de bescherming van natuurlijke personen in verband met de verwerking van persoonsgegevens en betreffende het vrij verkeer van die gegevens, Wetsontwerp tot wijziging van de wet van 8 December 1992 betreffende de bescherming van de persoonlijke levenssfeer ten opzichte van de verwerking van de persoonsgegevens, Parl . St . Kamer 1997–98, n° 1566/10, p. 12.

Vr . & Antw . Senaat 2010–11, 12 July 2011 (Question no 5-2691 of 12 July 2011 of Khattabi). Vr . & Antw . Senaat 2009–10, 7 December 2009 (Question no 4-5675 of 7 December 2009 of Wille). Vr . & Antw . Kamer 2008–09, 16 February 2009, p. 1129 (Question no 229 of 2 February 2009 of

Van Biesen). Vr . & Antw . Kamer 2008–09, 16 February 2009, pp. 629–630 (Question no 301 of 15 January 2009

of Logghe). Vr . & Antw . Senaat 2004–05, 21 March 2005 (Question no 3-2371 of 21 March of Ms. Hermans)

Bibliography

Page 10: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

918

iii. Opinions and documents of the DPA

(The documents are also available at www.privacycommission.be)

CBPL, Aanbeveling nr. 03/2011 uit eigen beweging over het nemen van een kopie van de identit-eitskaart en over het gebruik en de elektronische lezing ervan, 25.05.2011, 9 p.

CBPL, Aanbeveling nr. 01/2009 aan de verhuurders en vastgoedmakelaars betreffende de ver-werking van gegevens van kandidaat-huurders (SE/08/128), 18.03.2009, 19 p.

CBPL, Advies nr. 34/2008 betreffende het wetsvoorstel houdende de omkadering van de negatieve lijsten (A/2008/026), 24.09.2008, 15 p.

CBPL, Advies nr. 23/2008 betreffende voorontwerp van wet houdende oprichting van de authen-tieke bron voertuiggegevens (A/2008/011), 11.06.2008, 43 p.

CBPL, Advies nr. 17/2008 uit eigen beweging over het verwerken van biometrische gegevens in het raam van authenticatie van personen, 9.4.2008, 22 p.

CBPL, Advies nr. 33/2007 inzake de verspreiding van beeldmateriaal, 28.11.2007, 4 p. CBPL, Advies nr. 33/2006 met betrekking tot het ontwerp van koninklijk besluit betreffende het

elektronisch identiteitsdocument voor Belgische kinderen onder de twaalf jaar, 6.9.2006, 6 p. CBPL, Advies nr. 008/2006 van 12 April 2006 betreffende het gebruik van cameratoezicht in een

kinderdagverblijf, 9 p. CBPL, Advies nr. 08/2003 betreffende twee ontwerpen van koninklijk besluit ter uivoering van de

wet van … tot wijziging van de wet van 8 augustus 1983 tot regeling van een Rijksregister van de natuurlijke personen en van de wet van 19 juli 1991 betreffende de bevolkingsregisters en de identiteitskaarten, (10/A/2003/003), 27.02.2003, 7 p.

CBPL, Advies nr. 34/1999 uit eigen beweging betreffende de verwerkingen van beelden, in het bijzonder verricht door middel van systemen van video-toezicht, 13.12.1999, 10 p.

CBPL, Advies 14/1995 betreffende de toepassing van de wet van 1992 op de beeldopnamen, 7.06.1995.

CBPL, Advies nr. 07/93 van 6 augustus 1993 betreffende de verwerking van gevoelige gegevens, in de zin van artikel 6 van de wet van 8 December 1992 tot bescherming van de persoonlijke levenssfeer ten opzichte van de verwerking van persoonsgegevens, B.S. 28.02.1995, p. 4416.

CBPL, Jaarverslag 2010, 124 p. CBPL, Jaarverslag 2008, 105 p.

b . France

i. Acts and Regulations

( Acts and regulations are also available and can be searched at http://www.legifrance.gouv.fr/ )

Loi n° 2012-410 du 27 mars 2012 relative à la protection de l’identité. Loi n° 78-17 du 6 janvier 1978 relative à l’informatique, aux fi chiers et aux libertés, as amended Article L. 111-6 Code de l’entrée et du séjour des étrangers et du droit d’asile.

ii. Parliamentary documents and reports

( The documents and reports are also available and can be searched at http://www.assemblee- nationale.fr )

Offi ce Parlementaire d’évaluation des choix scientifi ques et technologiques, Rapport sur les méthodes scientifi ques d’identifi cation des personnes à partir de données biométriques et les techniques de mise en oeuvre, Cabal, Ch. (ed.), Assemblée National N° 938, Sénat, N° 355, June 2003, 70 p. (part 1), 57 p. (part 2), 105 p. (part 3).

Offi ce Parlementaire d’évaluation des choix scientifi ques et technologiques, Rapport sur la valeur scientifi que de l’utilisation des empreintes génetiques dans le domaine judiciaire, Cabal, Ch. (ed.), Assemblée National N° 3121, Sénat, N° 364, June 2001.

Bibliography

Page 11: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

919

iii. Opinions, decisions and documents of the DPA

(All opinions, decisions, reports and communications of the CNIL are available and can be found at www.cnil.fr)

CNIL, Délibération n°2012-322 du 20 septembre 2012 portant autorisation unique de mise en oeuvre de traitements reposant sur la reconnaissance du contour de la main et ayant pour fi nali-tés le contrôle de l'accès ainsi que la restauration sur les lieux de travail, 20.09.2012 (‘New Unique Authorization n°AU-007 or ‘New n°AU-007’).

CNIL, Délibération n°2011-074 du 10 mars 2011 portant authorisation unique de mise en oeuvre de dispositifs biométriques reposant sur la reconnaissance de l’empreinte digitale et ayant pour fi nalités le contrôle de l'accès aux postes informatiques, 10.03.2011 (‘Unique Authorization n°AU-027’ or ‘N°AU-027’).

CNIL, Délibération n°2009-316 du 7 mai 2009 portant autorisation unique de mise en œuvre de dispositifs biométriques reposant sur la reconnaissance du réseau veineux des doigts de la main et ayant pour fi nalité le contrôle de l’accès aux locaux sur les lieux de travail, 7.05. 2009 (‘Unique Authorization n°AU-019’ or N° AU-019’).

CNIL, Délibération n° 2007-368 du 11 décembre 2007 portant avis sur un projet de décret en Conseil d’Etat modifi ant le décret n° 2005-1726 du 30 décembre 2005 relatif aux passeports électroniques, 11.12.2007.

CNIL, Délibération n°2006-0103 du 27 avril 2006 portant autorisation unique de mise en œuvre de traitements automatisés de données à caractère personnel reposant sur l’utilisation d’un dispositif de reconnaissance du contour de la main et ayant pour fi nalité l’accès au restaurant scolaire, 27.04. 2006 (‘Unique Authorization n°AU-009’ or ‘N°AU-009’).

CNIL, Délibération n°2006-0102 du 27 avril 2006 portant autorisation unique de mise en œuvre de dispositifs biométriques reposant sur la reconnaissance de l’empreinte digitale exclusivement enregistrée sur un support individuel détenu par la personne concernée et ayant pour fi nalité le contrôle de l’accès aux locaux sur les lieux de travail, 27.04. 2006 (‘Unique Authorization n°AU-008’ or N° AU-008’).

CNIL, Délibération n°2006-0101 du 27 avril 2006 portant authorisation unique de mise en oeuvre de dispositifs biométriques reposant sur la reconnaissance du contour de la main et ayant pour fi nalités le contrôle de l’accès ainsi que la gestion des horaires et de la restauration sur les lieux de travail, 27.04.2006 (‘Unique Authorization n°AU-007’ or ‘N°AU-007’).

CNIL, Délibération n°04-017 du 8 avril 2004 relative à une demande d’avis de l’établissement public Aéroports de Paris concernant la mise en œuvre d’une contrôle d’accès biométrique aux zones réservées de sûreté des aéroports d’Orly et de Roissy, 8.04.2004, (‘Consultation n°04-017’)

CNIL, Délibération n°04-018 du 8 April 2004 relative à une demande d'avis présentée par le Centre hospitalier de Hyères concernant la mise en oeuvre d'un dispositif de reconnaissance de l'empreinte digitale ayant pour fi nalité la gestion du temps de travail de ses personnels, 8.04.2004 (‘Consultation n°04-018’)

CNIL, Délibération n°02-001 du 8 janvier 2002 concernant les traitements automatisés d’informations nominatives mis en œuvre sur les lieux de travail pour la gestion des contrôles d’accès aux locaux, des horaires et de la restauration, 8.01.2002, Norme simplifi ée N° 42.

CNIL, Déliberation n°00-57 du 16 novembre 2000 portant avis sur un projet dd’arrêté présenté par le préfet de l’Hérault concernant un traitement automatisé d’informations nominatives ayant pour fi nalité la gestion du temps de travail des agents de la préfecture (‘Consultation n°00- 057’) in CNIL, 21ième rapport d’activité 2000, p. 118.

CNIL, Déliberation n°00-056 du 16 novembre 2000 portant avis sur un projet d’arrêté présenté par le ministre de l’Éducation nationale concernant un traitement automatisé d’informations nomi-natives ayant pour fi nalité le contrôle d’accès, par la reconnaisance des empreintes digitales de certains personnel d’ for access control by fi ngerprint verifi cation of certain personnel de l’Éducation nationale, pour certains locaux de la cité académique de Lille (‘Consultation n°00- 056’), in CNIL, 21ième rapport d’activité 2000, p. 118.

Bibliography

Page 12: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

920

CNIL, Déliberation n°00-015 du 21 mars 2000 portant avis sur le traitement automatisé d’informations nominatives, mis en oeuvre par le collège Jean Rostand de Nice, destiné à gérer l’acces à la cantine scolaire par la reconnaissance des empreintes digitales (‘Consultation n°00- 015’), in CNIL, 21 ième rapport d’activité 2000, p. 110.

CNIL, Biométrie: plusiers condamnations judiciaires contre la société EASYDENTIC, 14.03.2011. CNIL, Biométrie comportementale: la reconnaissance de la frappe au clavier autorisée dans le

cadre de démonstrations, 28.7.2011. CNIL, La CNIL ordonne l’interruption d’un dispositif biométrique illégal, 20.05.2010. CNIL, Guide pour les employeurs et les salaries, Paris, CNIL, 2008, 48 p. CNIL, Communication de la CNIL relative à la mise en œuvre de dispositifs de reconnaissance par

empreinte digitale avec stockage dans une base de données, 28 December 2007, 12 p. CNIL, ‘Homo informaticus en 2005 entre servitude et liberté. L’homo informaticus biomaîtrisé’,

26 ième Rapport d’Activité 2005, p . 49. CNIL, Biométrie: la Cnil encadre l’utiisation de certain dispositifs et simplifi e leur declaration,

18.05. 2006.

CNIL, 32 ième Rapport d’Activité 2011, Paris, La Documentation française, 2011, 106 p. CNIL, 29 ième Rapport d’Activité 2008, Paris, La Documentation française, 2009, 122 p. CNIL, 28 ième Rapport d’Activité 2007, Paris, La Documentation française, 2008, 126 p. CNIL, 27 ième Rapport d’Activité 2006, Paris, La Documentation française, 128 p. CNIL, 26 ième rapport d’activité 2005, Paris, La Documentation française, 2006, 122 p. CNIL, 21 ième rapport d’activité 2000, Paris, La Documentation française, 2001, 328 p.

c . The Netherlands

i. Acts and Regulations

(Acts and documents are also available and can be searched at https://www.offi cielebekend-makingen.nl/ and http://wetten.overheid.nl/ )

Wet van 18 juli 2009 tot wijziging van het Wetboek van Strafvordering, het Wetboek van Strafrecht en enige andere wetten in verband met het verbeteren en versterken van de vaststell-ing van de identiteit van verdachten, veroordeelden en getuigen (Wet identiteitsvaststelling verdachten, veroordeelden en getuigen), Stb . 2009, 317.

Rijkswet van 11 juni 2009 tot wijziging van de Paspoortwet in verband met het hrinrichten van de reisdocumentenadministratie, Stb . 2009, 252.

Wet van 10 April 2008, houdende regels inzake het gebruik van het burgerservicenummer in de zorg (Wet gebruik burgerservicenummer in de zorg), Stb . 2008, 164.

Wet van 21 juli 2007 houdende regels inzake de verwerking van politiegegevens (Wet politiegegevens). Wet van 8 mei 2003 tot wijziging van de regeling van het DNA-onderzoek in strafzaken in verband met

het vaststellen van uiterlijk waarneembare persoonskenmerken uit celmateriaal, Stb . 2003, 201. Wet van 6 juli 2000 houdende regels inzake de bescherming van persoonsgegevens (Wet bes-

cherming persoonsgegevens), Stb . 2000, 302. Wet van 28 December 1988 houdende regels ter bescherming van de persoonlijke levenssfeer in

verband met persoonsregistraties, as modifi ed by the Acts of 9 December 1993 (Wet Persoonsregistraties), Stb . 1988, 665.

ii. Parliamentary and other documents

Kamerstukken II 2011/12, 33 440, nr. 2 Wijziging van de Paspoortwet (…). Kamerstukken I, 2010/11, 31 051, D inzake Evaluatie Wet bescherming persoonsgegevens

(‘Motion Franken’). Kamerstukken I 2008/09, 31324 nr. C, Wijziging van de Paspoortwet in verband met het herinrichten

van de reisdocumentenadministratie, Memorie van Antwoord, 10 p. College van Procureurs-generaal, Aanwijzing Uitbreiding Identifi catieplicht, 2009A024, 14

December 2009, available at http://www.om.nl/organisatie/beleidsregels/overzicht/openbare_orde/@152577/aanwijzing_0/

Bibliography

Page 13: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

921

iii. Opinions, documents and reports published by the DPA

(The documents adopted or published by the Dutch DPA are also available at http://www.cbpweb.nl/Pages/home.aspx or as indicated)

CBP, Bekendmaking ontwerpbesluit voorafgaand onderzoek Protocol Bureau Ongewenste Gasten Registratie, 27.05.2011.

CBP, Advies concept-Wetsvoorstellen tot wijziging van de Vreemdelingenwet 2000 in verband met biometrie, The Hague, CBP, 21.4.2009, 4 p.

CBP, Uitgangspunten voor Privacy by Design, available at the webpages of the theme ‘privacy by design’ of the Dutch DPA.

CBP, Richtsnoeren. Publicatie van persoonsgegevens op internet, Den Haag, CBP, 2007, 68 p. CBP, Contouren voor Compliance. Overzicht van de Zelfreguleringsproducten, 24 May 2005, 6 p. CBP, Vragen over inzet gezichtsherkenning, 3.02.2004, z2003-1529, 12 p. CBP, Wijziging Paspoortwet (invoering biometrie), 16.10.2001, z2001-1368, 4 p. Registratiekamer, Biometrisch toegangscontrolesysteem VIS 2000, 19.03.2001, z2000-0080, 21 p. Registratiekamer, Ontwerpbesluit DNA-onderzoek in strafzaken, 17.02.2000, z1999-1201, 7 p. Registratiekamer, In Beeld gebracht. Privacyregels voor het gebruik van videocamera’s voor toezicht

en beveiliging, 1997, 28 p. Registratiekamer, ‘Advies inzake DNA-Onderzoek in strafzaken’, Computerrecht 2000, pp. 110–113. Hes, R., Hooghiemstra, T. and Borking, J., At Face Value. On Biometrical Identifi cation and Privacy,

Achtergrond Studies en Verkenningen 15, The Hague, Registratiekamer, September 1999, 74 p. Hes, R. and J. Borking, J. (eds.), Privacy - Enhancing Technologies : The Path to Anonymity , Information

and Privacy commissioner Ontario and Registratiekamer, 62 p., 1995, revised edition. Ippel, P., Gegeven: de genen. Morele en juridische aspecten van het gebruik van genetische

gegevens, The Hague, Registratiekamer, 1996, 61 p.

CBP, Jaarverslag 2009, 72 p. CBP, Jaarverslag 2007, 84 p. CBP, Jaarverslag 2006, 104 p.

d . Other countries

i. Acts and Regulations

Act 617/2009 on Strong Electronic Identifi cation and Electronic Signatures, in force since 1.09.2009, of which an English translation is available at http://www.fi nlex.fi /en/laki/kaannokset/2009/en20090617 (Finland)

Gendiagnostikgesetz, 31.07.2009, BGBl. I S. 2529, p. 3672 (Germany) Federal Act on Provisions Facilitating Electronic Communications with Public Bodies, Austrian

Federal Law Gazette, part I, Nr. 10/2004 (Austrian E-Government Act), also available at http://www.digitales.oesterreich. gv.at/DocView.axd?CobId=19380

Personal Data Protection Act of 12 February 2003, as amended, available at http://www.legaltext.ee/et/andmebaas/tekst.asp?loc=text&dok=XXXX041&keel=en&pg=1&ptyyp=RT&tyyp=X&query=isikuandmete+kaitse (Estonia)

Act N° 428/2002 Coll. on Protection of Personal Data of 3 July 2002, as amended by the Act No. 602/2003 Coll., Act No. 576/2004 Coll and the Act No. 90/2005 Coll., of which an unoffi cial translation in English is available at http://ec.europa.eu/justice_home/fsj/privacy/docs/imple-mentation/slovakia_428_02_en.pdf (Slovak Republic)

Personal Data Protection Act N° 101/2000 of 4 April 2000 on the Protection of Personal Data and on Amendment to Some Acts, 4 April 2000, available at http://ec.europa.eu/justice/policies/privacy/docs/implementation/czech_republic_act_101_en.pdf (Czech Republic)

Personal Data Protection Act (ZVOP-1), adopted on 15 July 2004, as amended, of which an unof-fi cial translation in English is available at http://www.ip-rs.si/index.php?id=339 (Republic of Slovenia Personal Data Protection Act).

Biometric Privacy Information Act, 740 ILCS 14/1 of 2008, available at http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&ChapterID=57 (State of Illinois, U.S.A.)

Bibliography

Page 14: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

922

Ontario Works Act, 1997, O. Reg. 134/98 (Ontario, Canada), also available at http://www.e-laws.gov.on.ca/html/regs/english/elaws_regs_980134_e.htm

ii. Parliamentary documents, discussions and reports

House of Lords, Schengen Information System II (SIS II). Report with evidence, London, House of Lord, HL Paper 49, 2.03.2007, 141 p. (United Kingdom)

House of Lords, Prüm: an effective weapon against terrorism and crime ?, London, HL Paper 90, 9.05.2007, 98 p. also available at http://www.publications.parliament.uk/pa/ld200607/ldselect/ldeucom/90/90.pdf (United Kingdom)

U.S. House of Representatives, Subcommittee on Domestic and International Monetary Policy, Committee on Banking and Financial Services, Biometrics and the future of money, 20.05.1998, 106 p., available at http://commdocs.house.gov/committees/bank/hba48784.000/hba48784_0f.htm (United States of America)

iii. Opinions, documents and reports published by DPAs

Ireland

Data Protection Commissioner, Facebook Ireland Ltd . Report of Re - Audit , 21.9.2012, 55 p. FTR, Report on Facebook Ireland (FB-I) Audit 2–3 May & 10–13 July 2012, 21.9.2012, 57 p.

Ontario, Canada

(Reports and documents are available and can be searched at http://www.ipc.on.ca/ )

Cavoukian, A. and Prosch, M., Privacy by ReDesign: Building a Better Legacy, Information and Privacy Commissioner Ontario, May 2011, 8 p.

Cavoukian, A. and Marinelli, T., Privacy-Protective Facial Recognition: Biometric Encryption. Proof of Concept, Information and Privacy Commissioner Ontario, Ontario Lottery and Gaming Corporation, November 2010, 16 p.

Cavoukian, A. and Prosch, M., The Roadmap for Privacy by Design in Mobile Communications: A Practical Tool for Developers, Service Providers, and Users, Information and Privacy Commissioner Ontario, Ontario, December 2010, 2009, 27 p.

Cavoukian, A., Moving Forward From PETs to PETs Plus: The Time for Change is Now, Information and Privacy Commissioner Ontario, 2009, 4 p.

Cavoukian, A. and Snijder, M., Discussion of Biometrics for Authentication Purposes: The Relevance of Untraceable Biometrics and Biometric Encryption, July 2009, 7 p.

Cavoukian, A. and Stoianov, A., Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy, Information and Privacy Commissioner Ontario, 2007, 48 p.

Cavoukian, A., 7 Laws of Identity. The case for privacy-embedded laws of identity in the digital age, Ontario, IPC, 2006, 18 p.

Cavoukian, A., Biometrics and Policing: Comments from a Privacy Perspective, Information and Privacy Commissioner, Ontario, Canada, 1999, 25 p.

Cavoukian, A., Consumer Biometric Applications: A Discussion Paper, Information and Privacy Commissioner, Ontario, Canada, 1999, 65 p.

Cavoukian, A., Privacy and Biometrics, Information and Privacy Commissioner, Ontario, Canada, 1999, 14 p., available at http://www.ipc.on.ca/images/Resources/pri-biom.pdf

United Kingdom

Wood, D., A report on the Surveillance Society, 2006, Surveillance studies Network, 102 p., avail-able at http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf

Bibliography

Page 15: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

923

II . Standardization

Biometric Evaluation Methodology Working Group, Common Methodology for Information Technology Security Evaluation. Biometric Evaluation Methodology Supplement [BEM], August 2002, 45 p., available at http://www.cesg.gov.uk/

ISO/IEC 2382-37:2012 Information technology – Vocabulary – Part 37: Biometrics, 13.12.2012, 28 p. ISO/IEC 24745:2011 Information technology – Security techniques – Biometric Information

Protection, 15.6.2011, 50 p. ISO/IEC JTC 1/SC 27, 2nd CD 24745. Information technology – Security techniques – Biometric

template protection, Committee Draft – version 2, N8158, Berlin, DIN, 8 January 2010, work-ing draft, 53 p.

ISO/IEC JTC 1/SC 37, Standing Document 14-3, WG 3 Roadmap, 28 February 2009, a working draft text at http://isotc.iso.org/livelink/livelink/fetch/2000/2122/327993/2262372/2263033/2299739/JTC001-SC37-N-3070_SD_14-3_Janaury_2009.pdf?nodeid=7951115&vernum=0

ISO/IEC JTC 1/SC 37, Standing Document 2 – Harmonized Biometric Vocabulary, version 12, N 3385, New York, ANSI, 16 September 2009, working draft text, 203 p., previously available at http://isotc.iso.org/livelink/livelink?func=ll&objid=2299802&objaction=browse

ISO/IEC JTC 1/SC 37, Text of Working Draft 24779-1, Cross-jurisdictional and societal aspects of implementation of biometric technologies – Pictograms, icons and symbols for use with biometric systems – Part 1: Overview, N 3363, New York, ANSI, 18 August 2009, working draft text, 15 p.

ISO/IEC JTC 1/SC 37, Text of Working Draft 24779-2, Cross-jurisdictional and societal aspects of implementation of biometric technologies – Pictograms, icons and symbols for use with bio-metric systems – Part 2: Fingerprint applications, N 3363, New York, ANSI, 25 August 2009, working draft text, 24 p.

ISO/IEC JTC 1/SC 37, Text of ISO/IEC 6 th WD 24714-2, Jurisdictional and societal considerations for commercial applications – Part 2: Specifi c technological and practical applications, N 3048, New York, ANSI, 25 February 2009, working draft text, 20 p.

III. Case Law

A. International

European Court of Human Rights

(Decisions can also be searched and accessed online at http://cmiskp.echr.coe.int/tkp197/search.asp?skin=hudoc-en )

ECtHR, RTBF v . Belgium , no. 50084/06, 29 March 2011. ECtHR, MGN Limited v . United Kingdom , no.39401/04, 18 January 2011. ECtHR, Kennedy v . United Kingdom , no. 26839/05, 18 May 2010. ECtHR, Gillan and Quinton v . United Kingdom , no. 4158/05, 12 January 2010. ECtHR, Kervanci v . France , no.31645/04, 4 March 2009. ECtHR, Reklos and Davourlis v . Greece , no 1234/05, 15 January 2009. ECtHR, S . and Marper v . United Kingdom , nos. 30562/04 and 30566/04, 4 December 2008. ECtHR, K . U . v . Finland , no. 2872/2002, 2 December 2008. ECtHR, Mann Singh v . France , no. 24479/07, 27 November 2008. ECtHR, I . v . Finland , no. 20511/03, 17 July 2008. ECtHR, Evans v . United Kingdom , no. 6339/05, 10 April 2007. ECtHR, Van der Velden v . the Netherlands , no 29514/05, 7 December 2006. ECtHR, Phull v . France , no. 35753/03, 11 January 2005. ECtHR, Storck v . Germany , no. 61603/00, 16 June 2005.

Bibliography

Page 16: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

924

ECtHR, Sciacca v . Italy , no. 50774/99, 11 January 2005. ECtHR, Von Hannover v . Germany , no. 59320/00, 24 June 2004. ECtHR, Vasileva v . Denmark , no. 52792/99, 25 December 2003. ECtHR, Perry v . the United Kingdom , no. 63737/00, 17 July 2003. ECtHR, Peck v . U . K ., no. 44647/98, 28 January 2003. ECtHR, Allan v . U . K ., no. 48539/99, 5 November 2002. ECtHR, Armstrong v . U . K ., no. 48521/99, 16 October 2002. ECtHR, Pretty v . the United Kingdom , no.2346/02, 29 April 2002. ECtHR, Goodwin v . United Kingdom , no. 28957/95, 11 July 2002. ECtHR, Al - Nashif and others v . Bulgaria , no. 50963/99, 20 June 2002. ECtHR, P . G . and J . H . v . U . K ., no. 44787/98, 25 September 2001. ECtHR, Rotaru v . Romania , no. 28341/95, 4 May 2000. ECtHR, Amman v . Switzerland , no. 27798/95, 16 February 2000. ECtHR, Z . v . Finland , no. 22009/93, 25 February 1997. ECtHR, Ahmet Sadik v . Greece , no. 18877/91, 15 November 1996. ECtHR, Loizidou v . Turkey , no. 15318/89, 23 March 1995, Series A no. 305, 18 December 1996

and 28 July 1998. ECtHR, Friedl v . Austria , no. 15225/89 (28/1994/475/556), 31 January 1995, Series A no. 305-B. ECtHR, Murray v . the United Kingdom , no. 14310/88 (13/1993/408/487), 28 October 1994, Series

A no. 300-A. ECtHR, Costello - Roberts v . the United Kingdom , no. 13134/87, 25 March 1993, Series A no. 305-B. ECtHR, Campbell v . United Kingdom , no.13590/88, 25 March 1992. ECtHR, Kruslin v . France , no. 11801/85, 24 April 1990, Series A no.176-A. ECtHR, Rees v . United Kingdom , no.9532/81, 17 October 1986, Series A no. 106. and no. 9697/82,

Series A no. 112. ECtHR, Gaskin v . the United Kingdom , no. 10454/83, 7 July 1989, Series A no. 160. ECtHR, Leander v . Sweden , no. 9248/81, 26 March 1987, Series A no. 116. ECtHR, Malone v . the United Kingdom , no. 8691/79, 2 August 1984 and 26 April 1985, Series A

no. 82 and no. 95. ECtHR, X and Y . v . the Netherlands , no. 8978/80, 26 March 1985, Series A no. 91. ECtHR, Sunday Times v . the United Kingdom , no. 6538/74, 26 April 1979, Series A no. 38. ECtHR, Handyside v . United Kingdom , no. 5493/72, 7 December 1976, Series A no. 24. ECtHR, De Becker v . Belgium , no. 214/56, 27 March 1962, Series A , no. 4, and Series B , 1962

(Pleadings, Oral Arguments, Documents).

European Commission of Human Rights:

ECmHR, Pierre Herbecq and Ligue des droits de l’homme v. Belgium, nos. 32200/96 and 32201/96, 14 January 1998.

ECmHR, Kinnunen v . Finland , no. 24950/94, 15 May 1996. ECmHR, Friedl v . Austria , no. 28/1994/475/556, 30 November 1992 and 1994. ECmHR, F . Reyntjens v . Belgium , no. 16810/90, 9 September 1992, D . R . 73, p. 136. ECmHR, McVeigh , O ’ Neill and Evans v . the United Kingdom , no. 8022/77, 8025/77, 8027/77, 18

March 1981, D . R . 25, pp. 15–104. ECmHR, X . v . Federal Republic of Germany , no. 1307/61, 4 October 1962, Yearbook V , p. 230.

European Court of Justice

(The decisions are also available and can be searched at http://eur-lex.europa.eu/ or at http://curia.europa. eu/jurisp/ )

ECJ, C-70/10, Société belge des auteurs, compositeurs et éditeurs SCRL (SABAM) v. Netlog NV, 16.02.2012.

ECJ, C-468/10 and C-469/10, ASNEF and FECEMD v. Administración del Estado, 24.11.2011. ECJ, C-70/10, Scarlet Extended v. Société belge des auteurs, compositeurs et éditeurs SCRL

(SABAM), 24.11.2011.

Bibliography

Page 17: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

925

ECJ, C-92/09 and C-93/09, Volker und Markus Schecke and Hartmut Eifert, 09.11.2010, ECR 2010.

ECJ, C-28/08, Commission v. Bavarian Lager, 29.06.2010, ECR 2010. ECJ, C-188/10 Azis Melki and C-189/10 Sélim Abdeli, 22.06.2010, ECR 2010, p. I 5667. ECJ, C-518/07, European Commission v. Federal Republic of Germany, 9.3.2010, ECR 2010, p.

I-01885 ECJ, C-42/07, Liga Portuguesa de Futebol Profi ssional v. Departamento de Jogos da Santa Casa da

Misericórdia de Lisboa, 8.09.2009, ECR 2009, p. I-07633. ECJ, joined cases C-171/07 and C-172/07, Apothekerkammer des Saarlandes and Others v.

Saarland and Ministerium für Justiz, Gesundheit und Soziales, 19.05. 2009, ECR 2009, p. I-04171.

ECJ, C-169/07, Hartlauer Handelsgesellschaft mbH v. Wiener Landesregierung and Oberösterreichische Landesregierung, 10.03. 2009, ECR 2009, p. I-0000.

ECJ, C-524/06, Huber v. Germany, 16.12.2008, ECR 2008, p. I-09705. ECJ, C-73/07, Tietosuojavaltuutettu v. Satakunnan Markkinapörssi Oy and Satamedia Oy,

16.12.2008, ECR 2008, p. I-09831. ECJ, C-275/06, Promusicae v. Telefonica de Espanã, 29.01. 2008, ECR 2008,

p. I-0027 ECJ, C-338/04, C-359/04 and C-360/04, Placanica and others, 6.03.2007, ECR 2007, p. I-1891 ECJ, C-317/04 and C-318/04, European Parliament v. Council of the European Union and

Commission of the European Communities, 30.05.2006, ECR 2006, p. I-4721 ECJ, C-101/01, Bodil Lindqvist, 6.11.2003, ECR 2003, p. I-12971 ECJ, Joint Cases C-465/00, C-138/01 and C-139/01, Rechnungshof v. Österreichischer Rundfunk,

20.05.2003, ECR 2003, p. I-04989. ECJ, C-353/99, P Council of the European Union v. Hautala, 10.07.2001, ECR 2001, p. I – 9565 ECJ, C-292/97, Karlsson and others, 13 .04.2000, ECR 2000, p. I-02737 ECJ, C-124/97, Läärä and others v. District Prosecutor and Finnish State, 21.09.1999, ECR 1999,

p. I – 6067 ECJ, C-222/84, Johnston v. Chief Constable of the Royal Ulster Constabulary, 15.05.1986, ECR

1986, p. 1651 ECJ, C 294/83, Les Verts v. European Parliament, 23.04.1986, ECR 1986, p. 1339. ECJ, C 29/69, Erich Stauder v. City of Ulm, 12.11.1969, ECR 1969, p. 419.

B. National

a . Belgium

Constitutional Court

(The decisions of the Constitutional Court, presently since May 2007, the ‘Grondwettelijk Hof or GwH’, previously the ‘Arbitragehof or AH’, are also available at http://www.const-court.be/ )

GwH (Belgium), N° 145/2011, 22.09.2011. GwH (Belgium), N° 59/2010, 27.05.2010. AH (Belgium), N° 15/2008, 14.02.2008. AH (Belgium), N° 131/2005, 19.07.2005. AH (Belgium), N ° 16/2005, 19.01.2005. AH (Belgium), N° 202/2004, 24.12.2004 AH (Belgium), N° 50/2003, 30.04.2003 AH (Belgium), N° 51/2003, 30.04.2003.

Supreme Court and other court decisions

(The decisions of the Belgian Supreme Court are also available at www.juridat.be)

Cass., P.D.W. v. Bourgmestre de la ville de Gand et Ville De Gand, N° P.10.0703.N, 5.10.2010. Cass., D.B.G. v. Optimal Parking Control, Genkpark, C.080.0129.N, 29.05.2009.

Bibliography

Page 18: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

926

Cass., D.B.G. v. Optimal Parking Control, Genkpark, C.08.0130.N, 29.05.2009. Cass., C.J.,A.,M./Le Chocolatier Manon, N° P.04.1644.F, 2.03.2005. Cass., N° P.03.1664.N, 18.05.2004. Cass., N° P.00.1402.F, 24.01.2001. Cass., N° 8168, 2.05.1990, J . T . T . 1990, p. 469. Cass., 27.05.1971, Pas . 1971, I, pp. 886–920, Arr . Cass . 1971, p. 959.

Rb. Gent, 22.01.2001, Computerrecht 2001. Pres. Rb. Brussel, 19.12. 2000, Computerrecht 2002, p. 30. Brussel, 14.09.1999, AM 2000, p. 92. Corr. Bruxelles, 14.08.1991, Rev . Dr . Pén . 1992, p. 133.

b . France

( The decisions of the Constitutional Council are available at http://www.conseil-constitutionnel.fr/conseil-constitutionnel/francais/les-decisions/acces-par-date/decisions-depuis-1959/2011/sommaire-2011.52159.html )

Cons. const. n°2012-652, 22 March 2012 ( Loi protection de l ’ identité ). Cons. const. n°2010-25, 16 September 2010 ( Fichier empreintes génétiques ). Cons. const. n°2007-557, 15 November 2007 (Loi relative à la maîtrise de l’immigration, à

l’intégration et à l’asile). Cons. const. n°2004-505 DC, 19 November 2004 (Traité établissant une Constitution pour l’Europe) Cons.const., n°94-352 DC, 18 January 1995 ( Vidéosurveillance ). Cons.const., n°94-343-344 DC, 27 July 1994 ( Respect du corps humain ).

( The decisions of the French Conseil d’Etat are also available at http://www.conseil-etat.fr/ )

Conseil d’Etat, N° 317827, 317952, 318013, 318051, 26 October 2011. Conseil d’Etat, App. N° 312051, 30 December 2009. Cons. d’Etat, App. N° 297888, 297896, 298085, 13 March 2007. Cons. d’Etat, 20 October 1989, D., 1990, 135.

(The decisions of the French Supreme Court are also available at http://www.courdecassation.fr/ )

Cass. Fr., 24.05.1975, D., 1975, 497. CA Paris, 23.02.2011, Smina / KBC Lease France , Easydentic , Expertises 2011, no 359, pp. 226–228. Paris, Anthony G. v. SCPP, 27 April 2007, available at http://www.legalis.net/spip.

php?page=jurisprudence-decision&id_article=1954 TGI Paris, 1 ère ch. Soc., Comité d'entreprise d'Effi a Services, Fédération des Syndicats SUD Rail

c/Société Effi a Services, 19 April 2005, available http://www.juriscom.net/jpt/visu.php?ID=700

c . The Netherlands

( The decisions of the Dutch courts mentioned are also available at www.rechtspraak.nl)

Hoge Raad, 9.09.2011, LJN BQ8097. Hoge Raad, 9.09.2011, LJN BQ4105. Hoge Raad, 23.03.2010, LJN BK6331. Hoge Raad, 3.03.2009, LJN BG9218. Hoge Raad, 18.01.2005, LJN AR 2932, 01439/03. Raad Van State, 28.9.2012, 201205423/1/A3

Gerechtshof ‘s-Hertogenbosch, 7.10.2010, LJN BN9659 Hof Arnhem, 8.06.2010, nr 200.047.158, LJN BM7160. Rb. Utrecht, 25.5.2012, LJN BW6545 Vzr. Rechtbank Utrecht, 15.07.2011, LJN BR2009. Rechtbank’s-Gravenhage, 23.03.2011, LJN BP8841. Rechtbank’s-Hertogenbosch, 25.03.2010, LJN BL8763.

Bibliography

Page 19: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

927

d . Other countries

Germany

( The Federal Constitutional Court ’ s decisions issued since 1 January 1998 are also available at http://www.bundesverfassungsgericht.de/ )

BVerfG, 1 BvR 256/08, 1 BvR 263/08, 1 BvR 586/08, 2.03.2010 (‘ Speicherung Telekommuni kationsverkehrsdaten ’)

BVerfG, 1 BvR 2074/05; 1 BvR 1254/07, 11.03.2008 (‘ automatisierte Erfassung von Kraftfahrzeugkennzeichen ’)

BVerfG, 1 BvR 370/07, 1 BvR 595/07, 27.02.2008 (‘ Online Durchsuchung ’) BVerfG, 1 BvR 518/02, 4.04.2006 (‘ polizeiliche Rasterfahndung ’) BVerfG, 1 BvR 2378/98, 1 BvR 1084/99, 3.03.2004 (‘ Grosser Lauschangriff ’). BVerfG, 2 BvR 1741/99, 14.12.2000 (‘Zur Speicherung des “genetischen Fingerabdrucks”

verurteilter Personen’) BVerfG, 26.04.1997, BVerfGE 90, 255, 260, 1 BvR 1689/88 (‘ Briefüberwachung ’) BVerfG, 15.12.1983, BVerfGE 65, 1 (‘ Volkszählung ’) BverfG, 5.06.1973, BverfGE 35, 202, 1 BvR 536/72 (‘ Lebach ’) BVerfG, 15.01.1970, BVerfGE 27, 344, 1 BvR 13/68 (‘ Ehescheidungsakten ’)

United Kingdom

Murray v. Express Newspapers & Big Pictures (UK) Ltd, [2007] EWHC 1908 Wood v. Commissioner of Police for the Metropolis, [2009] EWCA Civ 414 Durant v. Financial Services Authority, [2003] EWCA Civ 1746 R (Gillan) v. Commissioner of Police for the Metropolis [2006] 2AC 307

United States of America

Hiibel v . Sixth Judicial District Court , 542 U.S. 177, 124 S.Ct. 2451, 159 L. Ed.2d.292 (2004) Daubert v. Merrell Dow Pharmaceuticals, Inc. , 509 U.S. 579, (1993) Kolender v . Lawson , 461 U.S.352, 103 S.Ct. 1855, 75 L.Ed.2d 903 (1983) Brown v . Texas , 443 U.S. 47, 99 S.Ct.2637, 61 L.Ed.2d 357 (1979 McIntyre v. Ohio Elections Commissions , 115 S. Ct. 1511, 1516 (1995) Olmstead v. United States, 277 U.S. 438 (1928)

Taiwan

Constitutional Court, Decision 603, 28.9.2005, of which a free English translation is available at http://www.judicial.gov.tw/constitutionalcourt/EN/p03_01.asp?expno=603

IV . Doctrine

A. Books

Legal

a . International – Europe

Addo, M., The Legal Nature of International Human Rights , Leiden, Martinus Nijhoff, 2010, 549 p. Arai-Takahashi, Y., The margin of appreciation doctrine and the principle of proportionality in the

jurisprudence of the ECHR, Antwerpen, Intersentia, 2002, 300 p.

Bibliography

Page 20: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

928

Barents, R., Het Verdrag van Lissabon . Achtergronden en commentaar , Deventer, Kluwer, 2008, 735 p.

Beddard, R., Human rights and Europe , Cambridge, Cambridge University Press, 1993, 278 p. Bieber, R. and J. Monar (eds.), Justice and Home Affairs in the European Union . The Development

of the Third Pillar , Brussels, European Interuniversity Press, 1995, 437 p. Borking, J., Privacyrecht is code: over het gebruik van Privacy Enhancing Technologies , Leiden,

Deventer, Kluwer, 2010 421 p. Brems, E. (ed.), Confl icts Between Fundamental Rights , Antwerp, Intersentia, 2008, 690 p. Bus, J., Crompton, M., Hildebrandt, M. and Metakides, G., Digital Enlightenment . Yearbook 2012 ,

Amsterdam, IOS Press, 2012, 319 p. Bygrave, L., Data Protection Law . Approaching its rationale , logic and limits , The Hague, Kluwer

Law International, 2002, 426 p. Christoffersen, J., Fair balance: proportionality, subsidiarity and primarity in the European con-

vention on human rights , Leiden, Martinus Nijhoff, 2009, 668 p. Clapham, A., Human Rights . A Very Short Introduction . Oxford, Oxford University Press, 2007,

193 p. Clapham, A., Human rights obligations of non - state actors , Oxford, Oxford university press, 2006,

613 p. Clapham, A., Human rights in the private sphere , Oxford, Clarendon Press, 1993, 385 p. Craig, P. and de Bùrca, G. (eds.), The evolution of EU Law , Oxford, Oxford University Press, 2011,

917 p. Craig, P. and de Bùrca, G., EU Law . Text , Cases , and Materials , Oxford, Oxford University Press,

2007, 1148 p. De Busser, E., Data Protection in EU and US Criminal Cooperation. A Substantive Law Approach

to the EU Internal and Transatlantic Cooperation in Criminal Matters between Judicial and Law Enforcemen Authorities , Antwerpen, Maklu, 2009, 473 p.

De Cruz, P., A modern approach to comparative law , Deventer, Kluwer, 1993, 350 p. De Moor-van Vugt, A., Maten en gewichten: het evenredigheidsbeginsel in Europees perspectief ,

Schoordijk Instituut, 1994, 307 p. Détraigne, Y. and Escoffi er, A.-M., Rapport N° 441. Respect de la vie privée à l’heure des mémoires

numériques , Senate, 2008–09, 153 p. Dijstelbloem, H. and Meijer, A. (eds.), De Migratiemachine , Serie kennis , openbare mening ,

politiek , Amsterdam, Rathenau Instituut/Van Gennep, 2009, 319 p. Drzemczewski, A., European Human Rights Convention in domestic law. A comparative study ,

Oxford, Clarendon Press, 1983, 372 p. Electronic Privacy Information Center and Privacy International, Privacy and Human Rights 2006 .

An International Survey of Privacy Laws and Developments , Washington – London, Electronic Privacy Information Center and Privacy International, 2007, 1104 p.

Emiliou, N., The principle of proportionality in European Law : a comparative study , London, Kluwer law, 1996, 288 p.

Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R., Computers , Privacy and Data Protection : an Element of Choice , Springer, 2011, 457.

Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.), Reinventing Data Protection ? Springer, 2009, 352 p

Gutwirth, S., Privacy and the information age , Oxford, Rowman & Littlefi eld, 2002, 146 p. Harris, D., O’ Boyle, M. and Warbrick, C., Law of the European Convention on Human Rights ,

London, Butterworths, 1995, 753 p. Harris, D., O’ Boyle, M. and Warbrick, C., Law of the European Convention on Human Rights ,

Oxford, Oxford University Press, 2009, 902 p. Hartley, T., The foundations of European community law: an introduction to the constitutional and

administrative law of the European community , Oxford, Oxford University press, 2007, 472 p. Hildebrandt, M. and S. Gutwirth (eds.), Profi ling the European Citizen . Cross - Disciplinary

Perspectives , Springer, 2008, 373 p. Jay, R., Data protection : law and practice , London, Sweet and Maxwell, 2007, 1025 p.

Bibliography

Page 21: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

929

Janssen, H., Constitutionele interpretatie. Een rechtsvergelijkend onderzoek naar de vaststelling van de reikwijdte van het recht op persoonlijkheid , Den Haag, Sdu, 2003, 493 p.

Jowell, J. and Cooper, J. (eds.), Understanding Human Rights Principles , Oxford and Portland, Oregon, Hart, 2001, 201 p.

Karanja, S., Transparency and Proportionality in the Schengen Information System and Border Control Co-operation , Leiden-Boston, Martinus Nijhoff, 2008, 466 p.

Koffeman, N., The right to personal autonomy in the case law of the European Court of Human Rights , Leiden, 2010, 71 p., available at https://openaccess.leidenuniv.nl/handle/1887/15890

Koops, B.-J. and De Hert, P. (eds.), Constitutional Rights and New Technologies . A Comparative Study , The Hague, Asser, 2008, pp. 159–197.

Kranenborg, H. and Verhey, L., Wet bescherming persoonsgegevens in Europees perspectief , Deventer, Kluwer, 2011, 225 p.

Kuner, Ch., European Data Protection Law. Corporate Compliance and Regulation, Oxford, Oxford University Press, 2007, 552 p.

Leenes, R., Koops, B.-J., de Hert, P. (eds.), Constitutional Rights and New Technologies . A Comparative Study , The Hague, Asser, 2008, 301 p.

Lemmens, P. (ed.), Uitdagingen door en voor het E . V . R . M ., Mechelen, Kluwer, 2005, 233 p. Lemmens, P., International and European Human Rights Law. Cases and Materials , Leuven,

Acco, 2010, 429 p. Lenaerts, K. and Van Nuffel, P., Europees recht , 2011, Antwerpen, Intersentia, 753 p Lenaerts, K. and Van Nuffel, P., Bray, R. (eds.), Constitutional law of the European Union , London,

Sweet & Maxwell, 2005, 969 p. Lenaerts, K., Van Nuffel, P., Bray, R., European Union Law , Sweet & Maxwell, 2011, 1083 p. Lessig, L., Code : Version 2 . 0 , New York, U.S., Basic books, 2006, 424 p. Lievens, E., Protecting Children in the Digital Era , Leiden-Boston, Martinus Nijhoff, 2010, 584 p. Lodge, J. (ed.), Are you who you say you are ? The EU ad Biometric Borders , Nijmegen, Wolf

Legal Publishers, 2007, 151 p. Maduro, M. and Azoulai, L. (eds.), The Past and Future of EU Law , Oxford and Portland, Hart,

2010, 512 p. Nicoll, C., Prins, J. and Van Dellen, M. (eds.), Digital Anonymity and the Law – Tensions and

Dimensions , The Hague, Asser Press, ITeR, 2, 2003, 307 p. Nouwt, S., de Vries, B. and Prins, C. (eds.), Reasonable Expectations of Privacy? Eleven Country

Reports on Camera Surveillance and Workplace Privacy , Den Haag, Asser Press, 2005, 363 p. Nys, H. (ed.), De conventie Mensenrechten en Biogeneeskunde van de Raad van Europa ,

Antwerpen, Intersentia, 1998, 273 p. Osiatyński, W., Human rights and their limits , Cambridge, Cambridge University press, 2009, 241

p. Prakke, L. and Kortmann C., Het staatsrecht van 15 landen van de Europese Unie , Deventer,

Kluwer, 2009, 1063 p. Purtova, N., Property Rights in Personal Data: A European Perspective , Oisterwijk, BOXPress,

2011, 283 p. Rannenberg, K., Royer, D. and Deuker, A. (eds.), The Future of Identity in the Information Society -

Challenges and Opportunities , Dordrecht, Springer, 2009, 508 p. Ringelheim, J. and O. De Schutter, Ethnic monitoring. The processing of racial and ethnic data in

anti-discrimination policies: reconciling the promotion of equality with privacy rights , Brussels, Bruylant, 2010, 190 p.

Rowland D. and Macdonald E., Information technology law , London, Cavendish, 2005, 573 p. Rule, J. and Greenleaf, G. (eds.), Global Privacy Protection . The First Generation , Cheltenham

(U.K.) – Northampton (Mass., U.S.A.), Edward Elgar, 2010, 318 p. Schermers, H. and Blokker, N., International institutional law : unity within diversity , The Hague,

Nijhoff, 2003, 1302 p. Schwarze, J., European Administrative Law , London, Sweet and Maxwell, 2006, 1562 p.

Bibliography

Page 22: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

930

Smis, S., Janssens, Ch., Mirgaux, S. and Van Laethem, K.., Handboek Mensenrechten . De Internationale bescherming van de rechten van de mens , Antwerpen, Intersentia, 2011, 660 p.

Stevens, T., Elliott, J., Hoikkanen, A., Maghiros, I. and Lusoli, W., The State of the Electronic Identity Market : Technologies , Infrastructure , Services and Policies , European Commission , Joint Research Centre, Institute for Prospective Technological Studies, 2010, 80 p.

Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l’homme , Brussels, Bruylant, 2005, 336 p.

Šušnjar, D., Proportionality, fundamental rights and balance of powers , Leiden, Martinus Nijhoff, 2010, 389 p.

Van den Brandhof, H., Burkens, M., Calogeropoulos, A., Craenen, G., Prakke, L., Kortmann, C., Constitutional law of 15 EU member states , Deventer, Kluwer, 979 p.

van Dijk, P., van Hoof, F., van Rijn, A. and Zwaak, L. (eds.), Theory and Practice of the European Convention on Human Rights , Antwerp, Intersentia, 2006, 1190 p.

Van Drooghenbroeck, S., La proportionnalité dans le droit de la convention européenne des droits de l’homme. Prendre l’idée simple au sérieux , Brussels, Bruylant/Publications des Facultés universitaires Saint-Louis, 2001, 786 p.

Vedder, A., van de Wees, L., Koops, B.-J. and de Hert, P., Van privacyparadijs tot een controlestaat ? Misdaad - en terreurbestrijding in Nederland aan het begin van de 21ste eeuw , Den Haag, Rathenau Instituut, 2007, 94 p., available on http://www.rathenau.nl/publicaties/publicatie/van-privacyparadijs-tot-controlestaat.html

Verhey, L., Horizontale werking van grondrechten, in het bijzonder van het recht op privacy , Zwolle, Tjeenk Willink, 1992, 487 p.

Westin, A., Privacy and Freedom , New York, Atheneum, 1970, 487 p. White, R. and Ovey, C., The European Convention on Human Rights , Oxford, Oxford University

Press, 2010, 644 p. Wright, D. and De Hert, P. (eds.), Privacy Impact Assessment , Springer, 2012, 519 p. Woodward, J., Orlans, N. and Higgins, P., Biometrics : Identity assurance in the Information Age ,

Berkley, Osborne, 2003, 462 p. Woodward, J., Webb, K., Newton, E., Bradley, M., Rubenson, D. et al., Army biometric applica-

tions : identifying and addressing sociocultural concerns , RAND, Santa Monica, CA, 2001, 225 p.

Wouters, J., Verhey, L. and Kiiver, Ph., European constitutionalism beyond Lisbon ̧ Antwerp, Intersentia, 2009, 306 p.

Zweigert, K. and Kötz, H., Introduction to Comparative Law , Oxford, Clarendon Press, 1998, 714 p.

b . Belgium

Adams, M. en P. Popelier (eds.), Recht en democratie . De democratische verbeelding in het recht , Antwerpen, Intersentia, 2004, 696 p.

Alen, A. and K. Muylle, Compendium van het Belgisch staatsrecht , Syllabusuitgave, Mechelen, Kluwer, 2012, 387 p.

Alen, A. and K. Muylle, Compendium van het Belgisch staatsrecht , Syllabusuitgave, Mechelen, Kluwer, 2008, 417 p.

Alen, A., Handboek van het Belgisch staatsrecht , Antwerpen, Kluwer, 1995, 889 p. Barents, R., Het Verdrag van Lissabon. Achtergronden en commentaar , Deventer, Kluwer, 2008,

p. 148. Blanpain, R., Labour Law in Belgium , Alphen aan den Rijn, WoltersKluwer, 2010, 398 p. Bourdoux, G., E. De Raedt, M. De Mesmaeker, A. Liners, De wet op het politieambt . Handboek

van de politiefunctie , Brussel, Politeia, 2010, 781 Callens, S., Goed geregeld ? Het gebruik van medische gegevens voor onderzoek , Antwerpen –

Apeldoorn, Maklu, 1995, 538 p. Cassiman J. et al., Wat zit er in mijn genen , 2008, Leuven, Davidsfonds, 223 p.

Bibliography

Page 23: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

931

Craenen, G. (ed.), The institutions of federal Belgium: an introduction to Belgian public law , 2001, Leuven, Acco, 175 p.

Delnooz, F., Entre proportionnalé et opportunité , Namur, FUNDP, 2010, 21 p. D’Hooghe, D. and Vandendriessche, F., Publiek - private samenwerking , Brugge, Die Keure, 2003,

251 p. De Bot, D., Privacybescherming bij e-government in België. Een kritische analyse van het

Rijksregister, de Kruispuntbank van Ondernemingen en de elektronische identiteitskaart als belangrijkste juridische bouwstenen , Brugge, Vanden Broele, 2005, 469 p.

De Bot, D., Verwerking van persoonsgegevens , Antwerpen, Kluwer, 2001, 403 p. De Busser, E., Data Protection in EU and US Criminal Cooperation. A Substantive Law Approach

to the EU Internal and Transatlantic Cooperation in Criminal Matters between Judicial and Law Enforcemen Authorities, Antwerpen, Maklu, 2009, 473 p.

De Hert, P., Privacy en het gebruik van visuele technieken door burger en politie , Brussell, Politeia, 1998, 197 p.

De Raedt, E., Berkmoes, H., De Mesmaeker, M. and Liners, A., De wet op het politieambt , 2011, Brussel, Politeia, 780 p.

Dierickx, L., Het recht op afbeelding , Antwerpen – Oxford, Intersentia, 2005, 345 p. Docquir, B., Le droit de la vie privée , Brussels, De Boeck-Larcier, 2008, 354 p. Dumortier, J., (ed.), Recente ontwikkelingen in informatica- en telecommunicatierecht, Brugge,

Die Keure, 1999, 355 p. Dumortier, J., and Robben, F. (eds.), Persoonsgegevens en privacybescherming. Commentaar op

de wet tot bescherming van de persoonlijke levenssfeer , Brugge, Die Keure, 1995, 348 p. Dumortier, J., Robben, F. and Taeymans, M. (eds.), A Decade of Research @ the Crossroads of

Law and ICT , Gent, Larcier, 2001, 452 p. Dumortier, J., ICT - recht , Leuven, Acco, 2008, 271 p. Dumortier, J., Wet tot Bescherming van de Persoonlijke Levenssfeer. Wet en Parlementaire

Voorbereiding , Gent, Mys & Breesch, 1993, 176 p. Ergec, R., Velaers, J., Spreutels, J., Dupont, L. and Andersen, R., Maintain de l ’ ordre et droits de

l ’ homme , Brussels, Bruylant, 1987, 294 p. Ergec, R., Introduction au droit public. 2. Les droits et libertés , Diegem, Kluwer, 1995, 168 p. Fijnaut, C., Stuyck, J. and Wytinck, P. (eds.), Schengen : Proeftuin voor de Europese Gemeenschap

?, Antwerpen, Kluwer, 1992, 212 p. Goossens, F., Politiebevoegdheden en mensenrechten , Kluwer, 2006, 973 p. Gorlé, F., Bourgeois, G., Bocken, H., Reyntjens, F., De Bondt, W. and Lemmens, K.,

Rechtsvergelijking , Mechelen, Kluwer, 2007, 359 p. Graux, H. and Dumortier, J., Privacywetgeving in de praktijk , Kortrijk, UGA, 2009, 439 p. Gutwirth, S., Waarheidsaanspraken in recht en wetenschap , Brussel and Antwerpen, VUBPress

and Maklu, 1993, 846 p. Hendrickx, F., Privacy en Arbeidsrecht , Brugge, Die Keure, 1999, 358 p. Hendrickx, K., Taal- en formuleringsproblemen in de regelgeving, Brugge, Die Keure, 2003, 461 p Isgour, M., and B. Vincotte, Le droit à l ’ image , Brussel, Larcier, 1998, 155 p. Velu, J. and Ergec, R., La convention européenne des droits de l ’ homme , Brussels, Bruylant, 1990. Lemmens, K., La presse et la protection juridique de l’individu. Attention aux chiens de garde ! ,

Brussel, Larcier, 2004, 603 p. Lodder, A., Dumortier, J. en Bol, S., Het recht rond elektronische handtekeningen Richtlijn

1999/93/EG en de omzetting in België en Nederland , Deventer, Kluwer, 2005, 212 p. Mulkers, J. (ed.), Privé-detectives. Ontwikkelingen inzake private opsporing, Antwerpen, Maklu,

2002, 116 p. Pintens, W., Inleiding tot de rechtsvergelijking , Leuven, Universitaire pers, 1998, 265 p. Popelier, P., Democratisch regelgeven , Antwerpen, Intersentia, 2001, 326 p. Popelier, P., Rechtszekerheid als beginsel van behoorlijke regelgeving , Antwerpen, Intersentia,

1997, 680 p. X., Privacy en de rechten van de mens. Handelingen van het Derde Internationaal Colloquium over

het Europees Verdrag tot Bescherming van de Rechten van de Mens , Leuven, Acco, 1974, 398 p.

Bibliography

Page 24: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

932

Rigaux, F. (ed.), La vie privée . Une liberté parmi les autres ?, Brussels, Larcier, 1992, 317 p. Rigaux, F., La protection de la vie privée et des autres biens de la personnalité , Brussels, Bruylant,

1990, 849 p. Rimanque, K., (ed.), De toepasselijkheid van de grondrechten in private verhoudingen , Antwerpen,

Kluwer, 1982, 461 p. Trouet, C., Van lichaam naar lichaamsmateriaal. Recht en het nader gebruik van cellen en weefsels ,

Antwerpen, Intersentia, 2003, 590 p. Van de Voorde, W., Goethals, J. and Nieuwdorp, M. (eds.), Multidisciplinair forensisch onderzoek ,

Brussel, Politeia, 2003, 544 p. Van den Wyngaert, Ch., Strafrecht, Strafprocesreht & Internationaal strafrecht , Antwerpen-

Apeldoorn, Maklu, 2006, 1314 p. Van Eecke, P., De handtekening in het recht. Van pennentrek tot elektronische handtekening , Gent,

Larcier, 2004, 608 p. Van Eecke, P., Wetboek ICT , Antwerpen, Maklu, 2010, 618 p. Van Laethem, W., Decorte, T. and Bas, R., Private politiezorg en grondrechten , Leuven, Universaire

Pers Leuven, 1995, 357 p. Vande Lanotte, J. and Y. Haeck (eds.), Handboek EVRM . Deel 1 . Algemene beginselen , Antwerpen,

Intersentia, 2005, 949 p. Vande Lanotte, J. and Y. Haeck (eds.), Handboek EVRM . Deel 2 . Artikelsgewijze commentaar .

Volume I , Antwerpen, Intersentia, 2004, 1066 p. Vande Lanotte, J. and Y. Haeck (eds.), Handboek EVRM . Deel 2 . Artikelsgewijze commentaar .

Volume II , Antwerpen, Intersentia, 2004, 762 p. Vandendriessche, J., Bescherming van het privé - leven in de Corte, R. (ed.) Praktijkboek Recht en

Internet . Brugge, Vanden Broele, 2007, 74 p. Velu, J., Le droit au respect de la vie privée , Namur, Presses Universitaires de Namur, 1974, 160 p. Velu, J., Les effects directs des instruments internationaux en matière de droits de l’homme ,

Brussels, Swinnen-Prolegomena, 1982. Verstraeten, R., Handboek strafvordering , Antwerpen-Apeldoorn, Maklu, 2007, 1193 p. Witteveen, W., Het wetgevend oordeel , Boom, Juridische uitgevers, 2010, 337 p.

c . France

Dadamo, C., and S. Farran, The French Legal System , London, Sweet & Maxwell, 1993, 240 p. Jeune Barreau (ed.), Le principe de proportionnalité en droit belge et en droit français , Liège,

Jeune barreau, 1995, 197 p. Le Gac-Pech, S., La proportionnalité en droit privé des contrats , 2000, Paris, LGDJ, 580 p. Oostra-Boeuf, C., Vijftien jaar privacybescherming in Frankrijk , Assen, Van Gorcum,1996, 190 p. Sciotti-Lam, C., L’applicabilité des traités internationaux relatifs aux droits de l’homme en droit

interne , Bruxelles, Bruylant, 2004, 704 p. Sudre, F., Marguénaud, J.P., Andriantsimbazovina, J., Gouttenoire, A. and Levinet, M., Les grands

arrêts de la Cour européenne des Droits de l ’ Homme , Paris, Themis, 2009, 854 p. Sudre, F., Droit Européen et international des droits de l ’ homme , Paris, Presses Universitaires de

France, 2008, 843 p. Sudre, F., Le droit au respect de la vie familiale au sens de la Convention européenne des droits de

l’homme , Brussels, Bruylant, 2002, 410 p. Xynopoulos, G., Le controle de proportionnalité dans le contentieux de la constitutionnalité et de

la légalité, en France, Allemagne et Angleterre, 1995, 463 p. Zoller, E., Droit constitutionnel , Paris, Presses Universitaires de France, 1999, 642 p.

d . The Netherlands

Alkema, E., Groen, H., Wattel, P. and Naeyé, J., De reikwijdte van fundamentele rechten , Zwolle, Tjeen Willink, 1995, 303 p.

Barkhuysen, T and van Emmerik, M., Het EVRM en het Nederlandse bestuursrecht , Deventer, Kluwer, 2011, 164 p.

Bibliography

Page 25: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

933

Berkvens, J. and Prins, J. (eds.), Privacyregulering in theorie en praktijk , Deventer, Kluwer, 2007, 288 p.

Cuijpers, C., Privacyrecht of privaatrecht ? Een privaatrechtelijk alternatief voor de implementatie van de Europese privacyrichtlijn , Wolf Legal Publishers, 2004, 441 p.

Geesink, I. and Steegers, Ch., Nader gebruik nader onderzocht . Zeggenschap over lichaamsmate-riaal , 2009, Den Haag, Rathenau Instituut, 168 p., also available at http://www.rathenau.nl/uploads/tx_tferathenau/Nader_20gebruik_20nader_20onderzocht._20Zeggenschap_20over_20lichaamsmateriaal.pdf

Holvast, J. and Mosshammer, A., Identifi catieplicht : het baadt niet maar het schaadt wel , Utrecht, Van Arkel, 1993, 112 p.

Hooghiemstra, T. and Nouwt, S., Tekst en Toelichting Wet Bescherming Persoonsgegevens , Den Haag, Sdu, 2007, 508 p.

Kortmann, C., Constitutioneel recht , Kluwer, 2008, 593 p. Koops, B.-J., Tendensen in opsporing en technologie. Over twee honden en een kalf , Nijmegen,

Wolf Legal Publishers, 2006, 55 p. Munnichs, G., Schuijff, M., and Besters, M. (eds.), Databases . Over ICT - beloftes , informatie-

honger en digitale autonomie , Den Haag, Rathenau Instituut, 2010, 115 p. Pauly, A. (ed.), Schengen en panne , Maastricht, European Institute of Public Administration, 1994,

396 p. Prinsen, M., Forensisch DNA-onderzoek. Een balans tussen opsporing en fundamentele rechten ,

Nijmegen, Wolf, 2008, 256 p. Prins, C., de Vries, M. de Hert, P. and Prinsen, M., ID or not to be ? Naar een doordacht stelsel

voor digitale identifi catie , Den Haag, Rathenau instituut, 2003, 61 p. van den Heuvel, C., Nijboer, J., van Rijsewijk, A., de Roos, Th., Forensic DNA - onderzoek : een

rechtsvergelijkende verkenning , 2006, Kluwer, 186 p. Van der Pot, reworked by D. Elzinga and R. de Lange with collaboration of H. Hoogers, Handboek

van het Nederlandse staatsrecht , Deventer, Kluwer, 2006, 1073 p. Wetenschappelijke Raad voor het Regeringsbeleid, iOverheid , Amsterdam, Amsterdam University

Press, 2011, 287 p.

e . Other countries

Agre, Ph. and Rotenberg, M. (eds.), Technology and privacy : the new landscape , Cambridge, Massachusetts, MIT press, 1998.

Pierre-Beausse, C., La Protection des Données Personnelles , Luxemburg, Promoculture, 2005, 378 p.

Coats, W., Bagdasarian, A., Helou T. and Lam T. (eds.), The Practitioner ’ s Guide to Biometrics , Chicago, American Bar Association, 2007, 224 p.

David Hume Institute, Privacy and Property , Edinburgh, Edinburgh University Press, 1994, 68 p. Kamlah, R., Right of privacy. Das allgemeine persönlichkeitsrecht in Amerikanischer sicht unter

berücksichtigung neuer technologischer entwicklungen , Köln, Carl Heymanns, 1969, 195 p. Kent, S. and Millett, L. (eds.), Who goes there ? Authentication Through the Lens of Privacy ,

National Research Council, 2003, 214 p. Rossnagel, A. (ed.), Allgegenwärtige Identifi zierung ? Neue Identitätsinfrastrukturen und ihre

rechtliche Gestaltung , Baden-Baden, Nomos, 2006, 132 p. Solove, D., Rotenberg, M. and Schwartz, P., Information Privacy Law , New York, Aspen, 2006,

1008 p. Solove, D., The digital person. Technology and Privacy in the Information Age , New York, New

York University Press, 2004, 283 p. Solove, D., The future of reputation: gossip, rumor, and privacy on the internet , New Haven, Yale

University Press, 2007, 247 p. Solove, D., Understanding Privacy , Cambridge (Massachusetts, U.S.A.), Harvard University

Press, 2008, 257 p. Turn, R., N. Shapiro, M. Juncosa, Privacy and security in centralized vs. decentralized databases ,

Santa Monica, Calif., Rand Corp., 1975, 31 p.

Bibliography

Page 26: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

934

Technical – Other

Alexandre, P. and Denoyelle, J. (eds.), Tweehonderdste verjaardag van de geboorte van Adolphe Quetelet (1796–1874) Stichter van de Sterrenwacht van Brussel , Astronomisch Bulletin 1996, Koninklijke Sterrenwacht van België, 113 p.

Anderson, R., Security Engineering. A Guide to Building Dependable Distributed Systems , New York, Wiley, 2001, 612 p

Angell, I., and Demetis, D., Science ’ s First Mistake . Delusions in Pursuit of Theory , London/New York, Bloomsbury, 2010, 240 p.

D’Haeninck, L. Dekeersmaeker, B. Hempen, K. Geris, R. Goossens, P. Vernemmen, Biogenie 6 . 1 , Antwerpen, De Boeck, 2009, 304 p.

Dequeker, J., De kunstenaar en de dokter. Anders kijken naar schilderijen , Leuven, Davidsfonds, 2006, 413 p.

Fischer-Hübner, S., IT-security and Privacy. Design and use of privacy - enhancing security mecha-nisms , Springer, 2001, 351 p.

Garfi nkel, S., Database Nation . The Death of Privacy in the 21 st Century , Sebastopol (United States, CA), O’Reilly, 2000, 320 p.

Jain, A., Flynn, P., and Ross, A. (eds.), Handbook of Biometrics , Springer, Boston, MA, Springer, 2008, 556 p.

Li, S. (ed.), Encyclopedia of Biometrics , Springer, 2009, 1433 p. Maltoni, D., Maio, D., Jain, A. and Prabhakar, S., Handbook of Fingerprint Recognition , London,

Springer, 2009, 494 p. Menezes, A., van Oorschot, P. and Vanstone, S., Handbook of applied cryptography , 1996, 816 p.,

available at http://cacr.uwaterloo.ca/hac/ Miller, A., The Assault on Privacy : Computers , Data Bases and Dossiers , Ann Arbor (Mich.),

University of Michigan press, 1971, 333 p. Quetelet, A., Sur l’homme et le développement de ses facultés, ou essai de physique sociale ,

Bruxelles, Hauman, 1836, 339 p. Rotter, P. (ed.), Large - scale Biometrics Deployment in Europe : Identifying Challenges and Threats ,

JRC Scientifi c and Technical Reports, European Commission JRC – IPTS, Seville, 2008, 135 p. van Blarkom Re, G., Borking, J. and Oik, J. (eds.), Handbook of Privacy and Privacy - Enhancing

Technologies – The case of Intelligent Software Agents , The Hague, College Bescherming Persoonsgegevens, 2003, 372 p., also available at http://www.andrewpatrick.ca/pisa/handbook/Handbook_Privacy_and_PET_fi nal.pdf

Wayman, J., (ed.), National Biometric Test Center Collected Works 1997 – 2000 , San Jose State University, 2000, 289 p.

Wayman, J., Jain, A., Maltoni, D. and Maio, D. (eds), Biometric systems : Technology , Design , and Performance Evaluation , New York, Springer, 2005, 370 p.

Xu, H., Spectral Minutiae Representations for Fingerprint Recognition, Enschede, Gildeprint, 2010, 174 p.

B. Contributions in books

Legal

a . International – Europe

Andronikou, V., Yannopoulos, A. and Varvarigou, Th., ‘Chapter 7. Biometric Profi ling : Opportunities and Risks’, in Hildebrandt, M. and Gutwirth, S. (eds.), Profi ling the European Citizen . Cross - Disciplinary Perspectives , Springer, 2008, pp. 131–139.

Beyleveld, D. and Taylor, M., ‘Patents for biotechnology and the data protection of biological samples and shared genetic data’ in J. Herveg (ed.), The protection of medical data . Challenges of the 21 st century , Louvain-La-Neuve, Anthemis, 2008, pp. 131–152.

Bing, J., ‘Classifi cation of personal information, with respect to the sensitivity aspect’, in Data Banks and Society , Proceedings of the First International Oslo Symposium on Data Banks and Society, Oslo, Scandinavian University Books, 1972, pp. 98–150.

Bibliography

Page 27: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

935

Bing, J., ‘Introduction. Notions of sensitive personal data’, in M. Pérez Asinari and P. Palazzi (eds.), Défi s du droit à la protection de la vie privée . Perspectives du droit Européen et Nord - Américain , Brussel, Bruylant, 2008, pp. 191–208.

Broeders, D., ‘Mobiliteit en surveillance: een migratiemachine in de maak’, in H. Dijstelbloem en A. Meijer (eds.), De Migratiemachine , Serie kennis, openbare mening, politiek, Amsterdam, Rathenau Instituut/Van Gennep, 2009, pp. 35–59.

Brouwer, E., ‘The use of biometrics in EU data bases and identity documents. Keeping track of foreigner’s movements and rights’, in J. Lodge (ed.), Are you who you say you are ? The EU ad Biometric Borders , Nijmegen, Wolf Legal Publishers, 2007, pp. 45–66.

Brouwer, E.,‘Juridische grenzen aan de inzet van migratietechnologie’, in Dijstelbloem, H. and Meijer, A. (eds.), De Migratiemachine , Serie kennis, openbare mening, politiek, Amsterdam, Rathenau Instituut/Van Gennep, 2009, pp. 191–227.

Burgorgue-Larsen, L., ‘L’appréhension constitutionnelle de la vie privée en Europe. Analyse croi-sée des systèmes constitutionnels allemand, espagnol et français’, in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 69–115.

Callens, S., ‘Gezondheidsrechtelijke vragen bij gebruik van cellen, weefsels, coupes en ander lichaamsmateriaal’, in Tilleman, B. and Verbeke, A. (eds.), Actualia vermogensrecht – Liber Alumnorum KULAK , Brugge, 2005, pp. 263–273.

Carrera, S., ‘Chapter VI. Frontex and the EU’s Integrated Border Management Strategy’, in Lodge, J. (ed.), Are you who you say you are ? The EU ad Biometric Borders , Nijmegen, Wolf Legal Publishers, 2007, pp. 31–43.

Cavoukian, A., Stoianov, A. and Carter, F., ‘Biometric Encryption: Technology for Strong Authentication, Security AND Privacy’ in de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.), IFIP . Policies and Research in Identity Management , Boston, Springer, 2008, pp. 57–77.

Clapham, A., ‘The ‘Drittwirkung’ of the Convention’, in Macdonald, R., Matscher, F. and Petzold, H. (eds.), The European System for the Protection of Human Rights , Dordrecht, Martinus Nijhoff, 1993, pp. 163–206.

Cole, S.,‘Fingerprint Identifi cation and the Criminal Justice System: Historical Lessons for the DNA Debate’, in Lazer, D. (ed.), The Technology of Justice : DNA and the Criminal Justice System ’ available at http://www.ksg.harvard.edu/dnabook/

Crowley, M., ‘Cyber Crime and Biometric Authentication – The Problem of Privacy Versus Protection of Business Assets’, in Bhavani, M., Biometrics . Techno - Legal Issues , Hyderabad, India, ICFAI University Press, 2008, pp. 41–55.

de Bùrca, G., ‘The evolution of EU Human Rights law’, in P. Craig and G. de Bùrca (eds.), The evolution of EU Law , Oxford, Oxford University Press, 2011, pp. 465–497.

De Hert P. and Gutwirth, S., ‘Data Protection in the Case Law of Strasbourg and Luxemburg : Constitutionalisation in Action’, in Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.), Reinventing Data Protection ?, Springer, 2009, pp. 3–44.

de Hert, P. and Loncke, M., ‘Camera surveillance and workplace privacy in Belgium’, in S. Nouwt, B. de Vries and C. Prins (eds.), Reasonable Expectations of Privacy ? Eleven Country Reports on Camera Surveillance and Workplace Privacy , Den Haag, Asser Press, 2005, pp. 167–209.

De Meyer, J., ‘The right to respect for private and family life, home and communications in relations between individuals, and the resulting obligations for state parties to the Convention’, in A. Robertson (ed.), Privacy and human rights , 1973.

De Meyer, J.,‘Preadvies. Het recht op eerbiediging van het privé-leven, van de woning en van med-edelingen in de betrekkingen tussen particulieren en de verplichtingen die daaruit voortvloeien voor de staten die partij zijn bij het verdrag. H/Coll.(70)4’, in X., Privacy en rechten van de mens . Handelingen van het Derde internationaal Colloquium over het Europees Verdrag tot Beschermping van de Rechten van de Mens , Leuven, Acco, 1974, pp. 251–284.

De Vlieger, L. and Verstuyft, N., ‘Politieregisters en privacy’, in G. Vermeulen (ed.), Privacy en Strafrecht . Nieuwe en grensoverschrijdende verkenningen , Antwerpen, Maklu, 2007, pp. 219–272.

Bibliography

Page 28: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

936

De Vries, K., Bellanova, R., De Hert, P. and Gutwirth, S., ‘The German Constitutional Court Judgement on Data Retention: Proportionality overrides Unlimited Surveillance (Doesn’t it?), in S. Gutwirth, Y. Poullet, P. De Hert and R. Leenes (eds.), Computers , privacy and data protec-tion : an element of choice , Dordrecht, Springer, 2011, pp. 3–24.

de Witte, B. ‘Direct effect, primacy, and the nature of the legal order’, in P. Craig and G. de Bùrca (eds.), The evolution of EU Law , Oxford, Oxford University Press, 2011, pp. 323–362.

Dinant, J.-M., ‘Chapter 5. The Concepts of Identity and Identifi ability: Legal and Technical Deadlocks for Protecting Human Beings in the Information Society’, in Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.), Reinventing Data Protection ? Springer, 2009, pp. 111–122.

Douglas-Scott, S., ‘Freedom, Security, and Justice in the European Court of Justice: The Ambiguous Nature of Judicial Review’, in T. Campbell, K. Ewing and A. Tomkins, The legal protection of Human Rights . Sceptical Essays , Oxford, Oxford University Press, 2011, pp. 268–311.

Dumortier, J. and Goemans, C., ‘Legal Challenges for Privacy Protection and Identity Management’, in Jerman-Blažič, B., Schneider, W. and Klobučar, T., Security and Privacy in Advanced Networking Technologies , Amsterdam, IOS Press, 2004, pp. 191–212.

Dumortier, J., ‘Het Schengen Informatie Systeem en de bescherming van persoonsgegevens’, in Fijnaut, C., Stuyck, J. and Wytinck, P. (eds.), Schengen : Proeftuin voor de Europese Gemeenschap ?, Antwerpen, Kluwer, 1992, pp. 119–173.

Fordham, M., and De la Mare, Th., ‘Identifying the principles of proportionality’, in Jowell, J. and Cooper, J. (eds.), Understanding Human Rights Principles , Oxford and Portland, Oregon, Hart, 2001, pp. 27–89.

Fumy, W., ‘Machine Readable Travel Documents’, in W. Fumy and M. Paeschke (eds.), Handbook of eID Security , Erlangen, Publicis, 2011, pp. 94–106.

Goemans, C. and Dumortier, J. ‘Mandatory retention of Traffi c Data in the EU: Possible Impact on Privacy and on-line Anonymity’, in Nicoll, C., Prins, J. and Van Dellen, M. (eds.), Digital Anonymity and the Law – Tensions and Dimensions , The Hague, Asser Press, ITeR, 2, 2003, pp. 161–183.

González Fuster, G. and De Hert, P., ‘PNR and Compensation’, in Lodge, J. (ed.), Are you who you say you are ? The EU ad Biometric Borders , Nijmegen, Wolf Legal Publishers, 2007, pp. 101–111.

Granet-Lambrechts, F., ‘Le droit à l’identité’, in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 193–213.

Grijpink, J. and Prins, C., ‘New rules for anonymous electronic transactions ? An exploration of the private law implications of digital anonymity’, in Nicoll, C., Prins, J. and Van Dellen, M. (eds.), Digital Anonymity and the Law – Tensions and Dimensions , The Hague, Asser Press, ITeR, 2, 2003, pp. 249–269.

Guild, E., ‘Chapter IV. Unreadable Papers ? The EU’s fi rst experiences with biometrics: Examining EURODAC and the EU’s Borders’, in J. Lodge (ed.), Are you who you say you are ? The EU ad Biometric Borders , Nijmegen, Wolf Legal Publishers, 2007, pp. 31–43.

Hogg, M., ‘The Very Private Life of the Right to Privacy’, Privacy and Property , Edinburgh, Edinburgh University Press, 1994, pp. 1–28.

Holznagel, B. and M. Sonntag, “A case study: the Janus project” in Nicoll, C., Prins, J. and Van Dellen, M. (eds.), Digital Anonymity and the Law – Tensions and Dimensions , The Hague, Asser Press, ITeR, 2, 2003, pp.121–135.

Hossein, G., ‘Privacy as Freedom’, in Jørgensen, R. (ed.), Human Rights in the Global Information Society , Cambridge (Massachusetts), MIT Press, 2006, pp. 121–147.

Hurt, M., ‘The “horizontal effect” of the Human rights Act: moving beyond the public-private distinc-tion’, in Jowell, J. and Cooper, J. (eds.), Understanding Human Rights Principles , Oxford and Portland, Oregon, Hart, 2001, pp. 161–177.

Hustinx, P., ‘The Role of Data Protection Authorities’ in Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.), Reinventing Data Protection ?, Springer, 2009, pp. 131–137.

Bibliography

Page 29: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

937

Jacobs, F. ‘Recent Developments in the Principle of Proportionality in European Community Law’, in Ellis, E. (ed.), The Principle of Proportionality in the Laws of Europe , Oxford and Portland, Oregon, Hart, 1999, pp. 1–21.

Jarosz, H. and Fondeur, J.-Ch., ‘Large-Scale Identifi cation System Design’, in Wayman, J., Jain, A., Maltoni, D. and Maio, D. (eds), Biometric systems : Technology , Design , and Performance Evaluation , New York, Springer, 2005, pp. 263–287.

Kindt, E., ‘Need for Legal Analysis of Biometric Profi ling’, Reply to V. Andronikou, A. Yannopoulos, Th. Varvarigou, ‘Chapter 7. Biometric Profi ling: Opportunities and Risks’, in M. Hildebrandt and S. Gutwirth (eds.), Profi ling the European Citizen . Cross - Disciplinary Perspectives , Springer, 2008, pp. 139–144.

Kindt, E., ‘Best Practices for privacy and data protection for the processing of biometric data’ in Campisi, F. (ed.), Security and Privacy in Biometrics , Springer, 2013, pp. 339–366.

Kindt, E., ‘Biometric applications and the data protection legislation’ in Bhavani, M. (ed.), Biometrics . Techno - Legal Issues , Hyderabad, India, ICFAI University Press, 2008, pp. 170–182.

Kindt, E., ‘The use of privacy enhancing technologies for biometric systems analysed from a legal perspective’ in Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M. and Zhang, G. (eds.), Privacy and Identity Management for Life , Berlin – New York, Springer, 2010, pp. 134–145.

Kindt, E., Lievens, E., Kosta, E., Leys, Th. and de Hert, P., ‘Chapter 2. Constitutional rights and new technologies in Belgium’, in Leenes, R., Koops, B.-J., de Hert, P. (eds.), Constitutional Rights and New Technologies . A Comparative Study , The Hague, Asser, 2008, pp. 11–55.

Kindt, E., Müller, L. and Meints, M., ‘4.2.3. Biometrics’, in Rannenberg, K., Royer, D. and Deuker, A., (eds.), The Future of Identity in the Information Society – Challenges and Opportunities , Dordrecht, Springer, 2009, pp. 138–148.

Kindt, E., ‘Ownership of Information and Database Protection’, in Dumortier, J., Robben, F. and Taeymans, M. (eds.), A Decade of Research @ the Crossroads of Law and ICT , Gent, Larcier, 2001, pp. 145–160.

Kumm, M., ‘Internationale Handelsgesellschaft, Nold and the New Human Rights Paradigm’, in Maduro, M. and Azoulai, L. (eds.), The Past and Future of EU Law , Oxford and Portland, Hart, 2010, pp. 106–118.

Lenaerts, K., ‘The Basic Constitutional Charter of a Community Based on the Rule of Law’, in Maduro, M. and Azoulai, L. (eds.), The Past and Future of EU Law , Oxford and Portland, Hart, 2010, pp. 295–315.

Levinet, M., ‘Le droit au respect de l’image’, in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 179–192.

Lodge, J., ‘Chapter III. Are you who you say you are ?’, in Lodge, J. (ed.), Are you who you say you are ? The EU ad Biometric Borders , Nijmegen, Wolf Legal Publishers, 2007, pp. 15–29.

Matyáš, V. and Říha, Z., ‘On Usability(and Security) of Biometric Authentication Systems, in ‘Legal Challenges for Privacy Protection and Identity Management’, in Jerman-Blažič, B., Schneider, W. and Klobučar, T., Security and Privacy in Advanced Networking Technologies , Amsterdam, IOS Press, 2004, pp. 178–190.

Mc Call Smith, A., ‘Property, Dignity, and the Human Body’, Privacy and Property , Edinburgh, Edinburgh University Press, 1994, pp. 29–40.

Meulders-Klein, M-Th. ‘L’irrésistible ascension de la “vie privée” au sein des droits de l’homme’, in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 305–333.

Mountfi eld, H., ‘The concept of lawful interference with fundamental rights’, in Jowell, J. and Cooper, J. (eds.), Understanding Human Rights Principles , Oxford and Portland, Oregon, Hart, 2001, pp. 5–25.

Nicoll, C., ‘Concealing and revealing identity on the Internet’ in Nicoll, C., Prins, J. and Van Dellen, M. (eds.), Digital Anonymity and the Law – Tensions and Dimensions , The Hague, Asser Press, ITeR, 2, 2003, pp. 99–119.

Nuno Gomes de Andrade, ‘Right to Personal Identity: The Challenges of Ambient Intelligence and the Need for a New Legal Conceptualization’, in Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R., Computers , Privacy and Data Protection : an Element of Choice , Springer, 2011, pp. 65–97.

Bibliography

Page 30: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

938

Parker, T., ‘Are we protected ? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age’, Ethics and Policy of Biometrics , Lecture Notes in Computer Science, Berlin, Springer, 2010, pp. 40–46.

Poullet Y. and Léonard, Th., ‘Les libertés comme fondement de la protection des données nomina-tives’, in Rigaux, F. (ed.), La vie privée . Une liberté parmi les autres ?, Brussels, Larcier, 1992, pp. 229–277.

Poullet, Y., ‘Pour une troisième génération de réglementations de protection des données’ in Pérez Asinari, M. and Palazzi, P. (eds.), Défi s du droit à la protection de la vie privée . Perspectives du droit Européen et Nord - Américain , Brussel, Bruylant, 2008, pp. 25–70.

Preneel, B., ‘An Introduction to Modern Cryptology’, in Bergstra, J. and de Leeuw, K. (eds.), The History of Information Security , Amsterdam-London, Elsevier, 2007, pp. 565–592.

Priem, B., Kosta, E., Kuczerawy, A., Dumortier, J. and Leenes, R., ‘User-centric privacy- enhancing Identity Management’, in Camenisch, J., Leenes, R. and Sommer, D. (eds.), Digital Privacy – PRIME – Privacy and Identity Management for Europe , Berlin – Heidelberg, Springer, 2011, pp. 91–106.

Prins, J., ‘Acht gesprekken over Privacy en Aanpalende Belangen’ in Franken, H. et al., Zeven Essays over Informatietechnologie en Recht , Den Haag, Sdu, 2003, pp. 53–105.

Prins, J., ‘Technologie en de nieuwe Dilemma’s rond Identifi catie, Anonimiteit en Privacy’, Justitiële Verkenningen 2004, pp. 34–47.

Rejman-Greene, M., ‘Privacy Issues in the Applicatin of Biometrics: a European Perspective’, in Wayman, J., Jain, A., Maltoni, D. and Maio, D. (eds.), Biometric systems : Technology , Design , and Performance Evaluation , New York, Springer, 2005, pp. 335–359.

Schönberger, V., ‘Strands of Privacy: DNA databases and informational privacy and the OECD Guidelines’, in D. Lazer (ed.), The Technology of Justice : DNA and the Criminal Justice System , available at http://www.ksg.harvard.edu/dnabook/

Schreurs, W., Hildebrandt, M., Kindt, E. and Vanfl eteren, M., ‘Chapter 13. Cogitas, Ergo Sum The Role of Data Protection Law and Non-discrimination Law in Group Profi ling in the Private Sector, in Hildebrandt M. and Gutwirth, S. (eds.), Profi ling the European Citizen . Cross - Disciplinary Perspectives , Springer, 2008, pp. 241–270.

Sprokkereef, A., ‘Chapter 13. The Introduction of Biometrics in the Netherlands: An Evaluation Under Data Protection and Administrative Law’, in van der Hof S. and Groothuis, M. (eds.), Innovating Government . Normative , Policy and Technological Dimensions of Modern Government , The Hague, Asser, 2011, pp. 217–228.

Sudre, F., ‘Rapport introductif. La “construction” par le juge européen du droit au respect de la vie privée’, in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention euro-péenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 11–33.

Tridimas, T. ‘Primacy, Fundamental Rights and the Search for Legitimacy’ in Maduro, M. and Azoulai, L. (eds.), The Past and Future of EU Law , Oxford and Portland, Hart, 2010, pp. 98–105.

Tulkens, F., ‘La réglementation de l’usage des biens dans l’intérêt général. La troisième norme de l’article 1er du premier protocole de la Convention Européenne des droits de l’Homme’, in X., Propriété et droit de l ’ homme , Brussels, Bruylant, pp. 61–97.

Van Alsenoy, B., Kindt, E. and Dumortier, J., ‘Chapter 15, Privacy and Data Protection Aspects of e-Government Identity Management’, in van der Hof S. and Groothuis, M. (eds.), Innovating Government . Normative , Policy and Technological Dimensions of Modern Government , The Hague, Asser, 2011, pp. 251–282.

van der Ploeg, I., ‘Chapter 3. Normative Assumptions in Biometrics: On Bodily Differences and Automated Classifi cations’, in van der Hof S. and Groothuis, M. (eds.), Innovating Government . Normative , Policy and Technological Dimensions of Modern Government , The Hague, Asser, 2011, pp. 29–40.

Van Gerven, W., ‘The Effect of Proportionality on the Actions of Member States of the European Community : National Viewpoints from Continental Europe’, in E. Ellis (ed.), The Principle of Proportionality in the Laws of Europe , Oxford and Portland , Oregon, Hart, 1999, pp. 37–63.

Bibliography

Page 31: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

939

Van Gerven, W., ‘Het evenredigheidsbeginsel: een beginsel met een groot verleden en een grote toekomst’, in Nieskens-Isphording, B., Raaijmakers, M., Spier J. and Vranken, J. (eds.), In het nu , wat worden zal . Opstellen aangeboden aan Prof . Mr . H . C . F . Schoordijk ter gelegenheid van zijn afscheid als hoogleraar aan de Katholieke Universiteit Brabant , Deventer, Kluwer, 1991, pp. 75–86.

Wachsmann, P., ‘Le droit au secret de la vie privée’ in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 119–155.

Zoller, E. ‘Le droit au respect de la vie privée aux Etats-Unis’, in Sudre, F. (ed.), Le droit au respect de la vie privée au sens de la Convention européenne des droits de l ’ homme , Brussels, Bruylant, 2005, pp. 36–67.

b . Belgium

Andersen, R., ‘Le maintien de l’ordre et le passage des frontières’ in Ergec, R., Velaers, J., Spreutels, J., Dupont, L. and Andersen, R., Maintain de l ’ ordre et droits de l ’ homme , Brussels, Bruylant, 1987, pp. 259–294.

Brillon, S., ‘Le droit d’accès au dossier du patient’, in Brillon, S., Callens, S., Gauche, N., Noel, N., Schamps, G. and Verhaegen, M.-N., Memento : Droits du patient et responsabiité médicale , Mechelen, Kluwer, 2004, pp. 69–105.

Cassiman, J., Nys, H., Vinck, I. and de Corte, R., ‘Genetica, patiëntenrechten, mensenrechten: DNA van recht tot krom’, in Cassiman J. et al., Wat zit er in mijn genen , Leuven, Davidsfonds, 2008, pp. 180–202.

Claes, E., ‘Legaliteit, rechtszekerheid en democratie in het strafrecht’, in Adams, M. and Popelier, P. (eds.), Recht en democratie . De democratische verbeelding in het recht , Antwerpen, Intersentia, 2004, pp. 381–422.

Corbet, J., ‘Middelen uit het auteursrecht ter bescherming van het privé leven’, in X., Privacy en de rechten van de mens. Handelingen van het Derde Internationaal Colloquium over het Europees Verdrag tot Bescherming van de Rechten van de Mens , Leuven, Acco, 1974, pp. 123–132.

De Hert, P. and Gutwirth, S. ‘Hoofdstuk 2: Informatie: wel beschermd, doch niet vatbaar voor diefstal. Denkoefeningen over het juridisch statuut van informatie vanop het grensvlak tussen het strafrecht en de intellectuele rechten’, in Byttebier, K., de Batselier, E. and Feltkamp, R. (eds.), Tendensen in het economische recht , Antwerpen, Maklu, 2006, pp. 85–116.

De Hert, P., ‘Artikel 8. Recht op privacy’ in Vande Lanotte, J. and Haeck, Y. (eds.), Handboek EVRM , Intersentia, 2004, pp. 705–788.

De Hert, P., ‘Hoofdstuk 3. Het Artikel 8 EVRM’ in De Hert, P. (ed.) Privacy en Persoonsgegevens , Brussel, Politeia, 2004, pp. 79–187.

De Wilde, L., ‘Anonimiteit in het strafproces’, in De Nauw, A. et al. (ed.), Actuele problemen van strafrecht (XIVe postuniversitaire cyclus W. Delva, 1987–1988), Antwerpen, Kluwer, 1988, pp. 57–86.

Decorte, R., and Cassiman, J.-J., ‘DNA-analyse in strafzaken. Een synthese van de mogelijkheden en beperkingen voor het gerechtelijk onderzoek’, in Van de Voorde, W., Goethals, J. and Nieuwdorp, M. (eds.), Multidisciplinair forensisch onderzoek , Brussel, Politeia, 2003, pp. 369–400.

Demeersseman, S., ‘Bewijs in strafzaken en privacy’, in Vermeulen, G. (ed.), Privacy en Strafrecht . Nieuwe en grensoverschrijdende verkenningen , Antwerpen, Maklu, 2007, pp. 199–217.

Develtere, R., ‘Dactyloscopie: grandioos verleden, wat met de toekomst ?’, in Van de Voorde, W., Goethals, J. and Nieuwdorp, M. (eds.), Multidisciplinair forensisch onderzoek , Brussel, Politeia, 2003, pp. 317–328.

Dhaese, Ch., ‘De regeling van de fouillering en de identiteitscontrole’, in Fijnaut C. and Hutsebaut F. (eds.), De nieuwe politiewetgeving in België , Arnhem, Gouda Quint, 1993, pp. 147–170.

Dirix, E., ‘Grondrechten en overeenkomsten’, in Rimanque, K., (ed.), De toepasselijkheid van de grondrechten in private verhoudingen , Antwerpen, Kluwer, 1982, pp. 35–92.

Docquir, B. ‘Le droit de la vie privée: aperçu général et règle de proportionalité’, in Docquir B. and Puttemans A. (eds.), Actualités du droit de la vie privée , Brussels, Bruylant, 2008, pp. 1–38.

Bibliography

Page 32: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

940

Dumortier, J. and Van Eecke, P., ‘De nieuwe wetgeving over digitale en elektronische handtekening’, in Dumortier, J., (ed.), Recente ontwikkelingen in informatica - en telecommunicatierecht , Brugge, Die Keure, 1999, pp. 1–26.

Dumortier, J., ‘De nieuwe wetgeving over de verwerking van persoonsgegevens’, in Dumortier J. (ed.), Recente ontwikkelingen in informatica - en telecommunicatierecht , Brugge, Die Keure, 1999, pp. 73–103.

Ergec, R., ‘Les libertés fondamentales et le maintien de l’ordre dans une société démocratique : un équilibre délicat’, in Ergec, R., Velaers, J., Spreutels, J., Dupont, L. and Andersen, R., Maintain de l ’ ordre et droits de l ’ homme , Brussels, Bruylant, 1987, pp. 3–33.

Fossoul, V., ‘RFID et Biométrie: Etat des lieux d’un point de vue de vie privée’, in Docquir, B. and Puttemans, A. (eds.), Actualités du droit de la vie privée , Brussels, Bruylant, 2008, pp. 139–202.

Humblet, P., ‘Kort geding en collectief confl ict. Diabolische procedure of laatste rechtsmiddel tegen syndicaal hooliganisme ?’, in Van Gerven, W., Van Orshoven, P. and De Corte, R. et al., De norm achter de regel : wet , doel en algemene rechtsbeginselen , Gent, Story-Scientia, 1995, pp. 138–159.

Lemmens, K., ‘Sic transit gloria mundi: over vergeten en vergaan in het recht’, in Mensenrechten . Jaarboek 2000 – 2001 , Antwerpen-Apeldoorn, Maklu, pp. 45–70.

Lemmens, P., ‘Article 6 E.V.R.M., in het licht van de algemene rechtsbeginselen die het huldigt en van de doelstellingen die eraan ten grondslag liggen’, in Van Gerven, W., Van Orshoven, P. and De Corte, R. et al., De norm achter de regel : wet , doel en algemene rechtsbeginselen , Gent, Story-Scientia, 1995, pp. 160–180.

Lemmens, P., ‘De verwerking van persoonsgegevens door politiediensten en de eerbiediging van de persoonlijke levenssfeer’ in X., Liber amicorum J . D ’ Haenens , Gent, Mys en Breesch, 1993, pp. 205–218.

Lemmens, P., ‘Het recht op eerbiediging van de persoonlijke levenssfeer, in het algemeen en ten opzichte van de verwerking van persoonsgegevens in het bijzonder’ in Arnou, P., Delwaide, L., Dirix, E., Dupont, L. and Verstraeten, R. (eds.), Liber amicorum J . Armand Vandeplas , 1994, Gent, Mys & Breesch, pp. 313–326.

Lemmens, P., ‘Het recht op eerbiediging van het privé-leven’, in Liga voor Mensenrechten, Privacy in de administratiefrechtelijk praktijk , Gent, 1989.

Lemmens, P., ‘Informatique et protection de la vie privée : la loi du 8 décembre 1992’ in Poullet, Y. (ed.), Droit informatique : enjeux – nouvelles responsabilités , Brussels, Jeune Barreau de Bruxelles, 1993, pp. 407–444.

Meirlaen, M., ‘Biometrische en elektronische identifi catoren en privacy’, in Vermeulen, G. (ed.), Privacy en strafrecht , Antwerpen-Apeldoorn, Maklu, 2007, pp. 335–350.

Rimanque, K., and Peeters, P., ‘De toepasselijkheid van de grondrechten in de betrekkingen tussen private personen. Algemene probleemstelling’, in Rimanque, K., (ed.), De toepasselijkheid van de grondrechten in private verhoudingen , Antwerpen, Kluwer, 1982, pp. 1–34.

Rimanque, K., ‘Noodzakelijkheid in een democratische samenleving – een beperking van gron-drechten’ in X., Liber amicorum Frédéric Dumon , Antwerpen, Kluwer 1993, pp. 1207–1234.

Robben, F., ‘De verwerking van gevoelgie en gerechtelijke gegevens en de bescherming van de persoonlijke levenssfeer’, in Dumortier, J. and Robben, F. (eds.), Persoonsgegevens en privacybescherming . Commentaar op de wet tot bescherming van de persoonlijke levenssfeer , Brugge, Die Keure, 1995, pp. 119–151.

Spreutels, J., ‘Maintien de l’ordre et vie privée’, in Ergec, R., Velaers, J., Spreutels, J., Dupont, L. and Andersen, R., Maintain de l ’ ordre et droits de l ’ homme , Brussels, Bruylant, 1987, pp. 107–192.

Taeymans, M. ‘Privacybescherming en de bevolkingsregister’ in Dumortier, J. and Robben, F. (eds.) Persoonsgegevens en privacybescherming . Commentaar op de wet tot bescherming van de persoonlijke levenssfeer , Brugge, Die Keure, 1995, pp. 249–288.

Van Eecke, P., ‘Bewijsrecht en elektronische handtekeningen, nieuwe perspectieven’, in X., Le droit des affaires en évolution – Tendensen in het bedrijfsrecht , Diegem, Brulant/Kluwer, 1999, pp.70–121.

Bibliography

Page 33: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

941

Van Gerven, W., ‘Het proportionaliteitsbeginsel’, in Van Gerven, W., Van Orshoven, P. and De Corte, R. et al., De norm achter de regel : wet , doel en algemene rechtsbeginselen , Gent, Story- Scientia, 1995, pp. 1–17.

Van Leuven, N., ‘Privacy: een onrustig begrip in volle ontplooiing’, in Lemmens, P. (ed.), Uitdagingen door en voor het E . V . R . M ., Mechelen, Kluwer, 2005, pp. 3–20.

Van Oevelen, A., ‘Schade en schadeloosstelling bij de schending van grondrechten door private personen’, in K. Rimanque (ed.), De toepasselijkheid van de grondrechten in private ver-houdingen , Antwerpen, Kluwer, 1982, pp. 421–461.

Velu, J., ‘Preadvies’ in X., Privacy en de rechten van de mens. Handelingen van het Derde Internationaal Colloquium over het Europees Verdrag tot Bescherming van de Rechten van de Mens, Leuven, Acco, 1974, pp. 19–107.

Voorhoof, D., ‘Het recht op afbeelding en de toestemming van de geportreteerde’ in Voorhoof, D., Actuele vraagstukken van mediarecht . Doctrine en jurisprudentie , Antwerpen, Kluwer, 1992, pp. 490–506.

Voorhoof, D., ‘Artikel 10 Portretrecht’ in Brison, F. and Vanhees, H. (eds.), De Belgische auteurswet . Artikelsgewijze commentaar , Gent, Larcier, 2008.

c . France

Braibant, G., ‘Le principe de proportionnalité’ in Mélanges offerts à Marcel Waline : le juge et le droit public , Paris, 1974, 859 p.

El Atmani, F., ‘Données sensibles : la notion de consentement de la personne concernée’, Lamy droit de l ’ informatique 1996, N° 86, pp. 1–11.

Larralde, J.-M., ‘La constitutionnalisation de l’ordre public’, in Redor, M.-J. (ed.), L ’ ordre public : Ordre public ou ordres publics ? Ordre public et droits fondamentaux , Bruxelles, Bruylant, 2001.

Picard, E., ‘Introduction générale: la fonction de l’ordre public dans l’ordre juridique’, in Redor, M.-J. (ed.), L ’ ordre public : Ordre public ou ordres publics ? Ordre public et droits fondamen-taux , Bruxelles, Bruylant, 2001.

d . The Netherlands

Artz, S. and van Blarkom, G., ‘Beveiliging van persoonsgegevens: de WPB. Privacy en Biometrie: een technisch vraagstuk ?’, Jaarboek Fraudebestrijding , 2002, available at http://www.cbp-web.nl/Pages/art_sar-gbl_2002_privacy_biometrie.aspx

Holvast, J., ‘Elektronische overheid’, in Berkvens, J. and Prins, J. (eds.), Privacyregulering in theorie en praktijk , Deventer, Kluwer, 2007, pp. 105–124.

Prins, J., and Berkvens, J., ‘De Wet bescherming persoonsgegevens’ in Berkvens, J. and Prins, J. (eds.), Privacyregulering in theorie en praktijk , Deventer, Kluwer, 2007, pp. 25–46.

Sprokkereef, A., ‘Data Protection and the Use of Biometric Data in the EU’, in Fischer Huebner, S., Duquenoy, P., Zaccato, A. and Martucci, L. (eds.), The Future of Identity in the Information Society , IFIP (International Federation for Information Processing), Boston, Springer, 2008, pp. 277–284.

van der Hof, S., Koops, B.-J. and Leenes, R. ‘Anonymity and the Law in the Netherlands’, in Kerr, I., Steeves, V. and Lucock, C. (eds.), Lessons from the Identity Trail , Anonymity , Privacy and Identity in a Networked Society , Oxford, Oxford University Press, 2009, pp. 503–521.

Van Kralingen, R., Prins, C. en Grijpink, J., ‘Het lichaam als sleutel. Juridische beschouwingen over biometrie’, in Van Kralingen, R., Prins, C. en Grijpink, J. et al., Nationaal Programma Informatietechnologie en Recht , Alphen aan den Rijn/Diegem, Samsom BedrijfsInformatie Bv, 1997, pp. 2–66.

Verhey, L., ‘Horizontale werking van grondrechten: de stille Straatsburgse revolutie’ in Barkhuysen, T., van Emmerik, M. and Loof, J. (eds.), Geschakeld recht . Liber Amicorum voor Evert Alkema , Deventer, Kluwer, 2009, pp. 517–535.

Bibliography

Page 34: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

942

e . Other countries

Hornung, G., ‘Elektronische Zertifi kate, Ausweise und Pseudonyme – Voraussetzungen der Selbstbestimmung’, in Rossnagel, A. (ed.), Allgegenwärtige Identifi zierung ? Neue Identitätsinfrastrukturen und ihre rechtliche Gestaltung , Baden-Baden, Nomos, 2006, pp. 53–69.

Albrecht, A., ‘Biometric Authentication from a Legal Point of View – A European and German Perspective’, in Coats, W., Bagdasarian, A., Helou, T. and Lam, T. (eds.), The Practitioner ’ s Guide to Biometrics , Chicago, ABA, 2007, pp. 87–138.

Technical – Other

Andronikou, V., Yannopoulos, A., Varvarigou, Th., ‘Chapter 7. Biometric Profi ling: Opportunities and Risks’, in Hildebrandt, M. and Gutwirth, S. (eds.), Profi ling the European Citizen . Cross - Disciplinary Perspectives , Springer, 2008, pp. 131–139.

Bleumer, G., ‘Biometric Authentication and Multilateral Security’, in Müller, G. and Rannenberg, K. (eds.), Multilateral Security in Communications . Technology , Infrastructure , Economy , München, Addison-Wesley, 1999, pp. 157–171.

Bringer, J., Chabanne, H., Pointcheval, D. and Zimmer, S., ‘An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication’, in Matsuura, K. and Fujisaki, E. (eds.), IWSEC 2008, Berlin, Springer, 2008, pp. 219–230.

Clarke, R., ‘Identifi ed, Anonymous and Pseudonymous Transactions: The Spectrum of Choice’, April 1999, p. 5, in S. Fischer-Hübner, G. Quirchmayr, L. and L. Yngström (eds.), User Identifi cation & Privacy Protection : Applications in Public Administration & Electronic Commerce , Kista, Sweden, June 1999, IFIP WG 8.5 and WS 9.6., also available at http://www.anu.edu.au/people/Roger.Clarke/DV/UIPP99.html

Diaz, C., Seys, S., Claessens, J. and Preneel, B., ‘Towards measuring anonymity’, in Federath, H. (ed.), Designing Privacy Enhancing Technologies , vol. 2482, LNCS, 2002, available at http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.986

Hayes, B., ‘There is no “balance” between security and civil liberties – just less of each’ in Essays for civil liberties and democracy in Europe , 2006, available at http://www.ecln.org/essays/essay-12.pdf

Hoernlein, M., ‘Unites States Visitor and Immigrant Status Indicator Technology Program’, in Coats, W., Bagdasarian, A., Helou, T. and Lam, T. (eds.), The Practitioner ’ s Guide to Biometrics , Chicago, ABA, 2007, pp. 37–47.

Jain A. and Feng, J., ‘Latent Palmprint Matching’, 31 IEEE Transactions on Pattern Analysis and Machine Intelligence , vol. 6, 2009, pp. 1032–1047, also available at http://www.computer.org/portal/web/csdl/doi?doc= doi/10.1109/TPAMI.2008.242

Johnson, I. ‘Theft of Biometric Data : Implausible Deniability’, in Coats, W., Bagdasarian, A., Helou T. and Lam T. (eds.), The Practitioner ’ s Guide to Biometrics , Chicago, ABA, 2007, pp. 79–86.

Pfi tzmann, A. and Borcea-Pfi tzmann, K., ‘Identitätsmanagement und informationelle Selbstbestimmung’, in Rossnagel, A. (ed.), Allgegenwärtige Identifi zierung ? Neue Identitätsinfrastrukturen und ihre rechtliche Gestaltung , Baden-Baden, Nomos, 2006, pp. 83–91.

Ratha, N., ‘Privacy Protection in High Security Biometrics Applications’, in A. Kumar and D. Zhang (eds.), ICEB 2010 , LNCS 6005 , pp. 62–69.

Salazar-Tejeda, P., Melin, P. and Castillo O., ‘A New Biometric Recognition Technique Based on Hand Geometry and Voice Using Neural Networks and Fuzzy Logic’, in Castillo, O. et al. (eds.), Soft Computing for Hybrid Intel . Systems , Springer, Berlin-Heidelberg, 2008, pp. 170–186.

Sutrop, M., ‘Ethical Issues in Governing Biometric Technologies’, in A. Kumar and D. Zhang (eds.), ICEB 2010 , LNCS 6005 , pp. 102–114.

Wayman, J., ‘A Defi nition of “Biometrics”’, in Wayman, J. (ed.), National Biometric Test Center Collected Works 1997 – 2000 , San Jose State University, 2000, pp. 21–25, available at http://www.engr.sjsu.edu/biometrics/nbtccw.pdf

Bibliography

Page 35: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

943

Wayman, J., ‘Fundamentals of Biometric Authentication Technologies’, in Wayman, J. (ed.), National Biometric Test Center Collected Works 1997 – 2000 , San Jose State University, 2000, pp. 1–20.

C. Articles in journals

Legal

a . International – Europe

Blas, D., ‘Ensuring effective data protection in the fi eld of police and judicial activities: some consid-erations to achieve security, justice and freedom’, ERA Forum 2010, pp. 233–250, also avail-able online at http://www.springerlink.com/content/u6566750w5954262/

Bock, K., ‘EuroPriSe Trust Certifi cation’ in DuD 2008, pp. 1–5. Bradshaw, S., Millard, Ch. and Walden, I., ‘Contracts for clouds: comparison and analysis of the

Terms and Conditions of cloud computing services’, Int ’ l Journal of Law and Information Technology 2011, pp. 187–223.

Breebaart, J., Yang, B., Buhan-Dulman, I. and Busch, Ch. ‘Biometric Template Protection. The need for open standards’ in DuD 2009, pp. 299–304.

Brouwer, E., De Hert, P. and Saelens, R., ‘Ontwerp-Kaderbesluit derde pijler holt bescherming persoonsgegevens uit’ in P & I 2007, pp. 9–13.

Bygrave, L., ‘Data Protection Pursuant to the Right to Privacy in Human Rights Treaties’, International Journal of Law and Information Technology 1998, pp. 247–284.

Bygrave, L., ‘Minding the Machine: Article 15 of the EC Data Protection Directive 95/46/EC and Automated Profi ling’, Computer Law & Security Report 2001, pp. 17–24.

Bygrave, L., ‘The Body as data ? Biobank regulation via the ‘Back Door’ of Data Protection Law’, Law , Innovation and Technology 2010, pp. 1–25.

Bygrave, L., ‘The Place of Privacy in Data Protection Law’, University of NSW Law Journal 2001, also available at http://www.austlii.edu.au/au/journals/UNSWLJ/2001/6.html

Coudert, F. and Werkers, E., ‘In the Aftermath of the Promusicae Case: How to Strike the Balance?’, International Journal of Law and Information Technology 2010, pp. 50–71.

Coudert, F., ‘When video cameras watch and screen: Privacy implications of pattern recognition technologies’, Computer Law & Security Review 2010, pp. 377–384.

Cuijpers, C., Van Eecke, P., Kindt, E. and de Vries, H., ‘Een eerste verkenning van het Voorstel Verordening bescherming persoonsgegevens’, Computerrecht 2012, pp. 185–199.

De Beer, D., De Hert, P., González Fuster G. and Gutwirth, S., ‘Nouveaux éclairages de la notion de “donnée personnelle” et application audacieuse du critère de proportionnalité’, Rev . trim . dr . h . 2010, pp. 141–161.

de Búrca, G., ‘The Principle of Proportionality and its Application in EC Law’, YBEL 1993, pp. 105–150.

De Hert P. and A. Sprokkereef, ‘Biometrie en recht in Nederland’, in Computerrecht 2008, pp. 299–300.

De Hert, P. ‘Balancing security and liberty within the European human rights framework. A critical reading of the Court’ case law in the light of surveillance and criminal law enforcement strate-gies after 9/11’, Utrecht Law Review , September 2005, pp. 68–96, also available at http://www.utrechtlawreview.org/index.php/ulr/article/view/4

De Hert, P. ‘Identity management of e-ID, privacy and security in Europe. A human rights view’, Information Security Technical Report , 2008, pp. 71–75.

De Hert, P., ‘Artikel 35 Wet Politieambt en beeldgaring van burgers voor pers en politie’, Panopticon 1998, pp. 413–441.

De Hert, P., ‘Het Europees Hof Rechten van de Mens erkent publieke privacy. De legaliteitseis en het politioneel optreden in het licht van art. 8 EVRM’, Nieuw Juridisch Weekblad 2002, pp. 116–122.

Bibliography

Page 36: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

944

De Hert, P., ‘Identity management of e-ID, privacy and security in Europe. A human rights view’, Information Security Technical Report 2008, pp. 71–75.

De Hert, P., and Riehle, C., ‘Data protection in the area of freedom, security and justice. A short introduction and many questions left unanswered’, ERA Forum 2010, pp. 159–167, also avail-able at http://www.springerlink.com/content/u6566750w5954262/

De Hert, P., Nouwt, J., Voets, I. and van der Wees, J., ‘SMS, opsporing en privacy’, in Computerrecht 2008, pp. 154–160.

De Hert, P., De Vries, K., Gutwirth, S., ‘Duitse rechtspraak over remote searches, datamining en afl uisteren op afstand. Het arrest Bundesverfassungsgericht 27 februari 2008 (Online- Durchsuchung) in breder perspectief’, Computerrecht 2009, pp. 200–211.

De Hert, P., Schreurs, W. and Brouwer, E., ‘Machine-readable identity documents with biometric data in the EU: Overview of the legal framework’, Keesing Journal of Documents and Identity , 2006, pp 3–10.

de Lange, R., ‘The European public order, constitutional principles and fundamental rights’, Erasmus Law Review , 23 p., available at http://www.erasmuslawreview.nl/fi les/01- EUROPEAN_PUBLIC_ORDER.pdf

Dix, A., ‘Built-in privacy – no panacea, but a necessary condition for effective privacy protec-tion’, Identity in the Information Society 2010, pp. 257–265, available at http://www.springer.com/computer/journal/12394

Drzemczewski, A., ‘The European Human Rights Convention and relations between private par-ties’, N . I . L . R . 1979.

Drzemczewski, A., ‘The domestic status of the European Convention on Human Rights; new dimensions’, Legal issues of European Integration , no 1, 1977, pp. 1–85.

Grijpink, J., ‘Identity fraud and biometrics, an assessment model for the use of biometrics’, Computer Law and Security Report 2006, pp. 316–319.

Grijpink, J., ‘Trend report on biometrics : Some new insights, experiences and developments’, Computer Law & Security Report 2008, pp. 261–264.

Grijpink, J., ‘Two barriers to realizing the benefi ts of biometrics: a chain perspective on biometrics, and identity fraud as biometrics’ real challenge’, Computer Law and Security Report 2005, pp. 138–145 and pp. 249–256.

Gutwirth, S., ‘Beyond identity ?’, IDIS 2008, pp. 123–133. Gutwirth, S., ‘Biometrics between opacity and transparency’, Ann Ist Super Sanita , 2007,

pp. 61–65. Hijmans, H. and Scirocco, A., ‘Shortcomings in EU Data Protection in the Third and the Second

Pillars. Can the Lisbon Treaty be expected to help ?’, Common Market Review 2009, pp. 1485–1525.

Hijmans, H., ‘Recent developments in data protection at European Union level’, ERA Forum 2010, pp. 219–231, also available at http://www.springerlink.com/content/55v28703k0401j06/?p=8deefc2e6fe44277952aa80998026 d61&pi=1

Hildebrandt, M., ‘Privacy en identiteit in slimme omgevingen’, Computerrecht 2010, pp. 273–282.

Hinde, S., ‘2001: A privacy Odyssey Revisted’, Computers & Security 2002, pp. 16–34, also avail-able at http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/h/Hinde:Stephen.html

Hoepman, J., ‘Revocable privacy’, P & I 2008, pp. 114–118. Holvast, J., ‘Vijftig jaar discussie over de informationele privacy in vogelvlucht’, P & I 2011,

pp. 234–246. Hornung, G., ‘The European Regulation on Biometric Passports: Legislative Procedures, Political

Interactions, Legal Framework and Technical Safeguards’, SCRIPTed 2007 , pp. 246–262, avail-able at http://www2.law.ed.ac.uk/ahrc/script-ed/vol4-3/hornung.asp

Jansen, M., ‘Verwerking van persoonsgegevens een inbreuk op artikel 8 EVRM ?’, P & I 2011, pp. 299–304.

Kindt, E., Bruyndonckx, B. and Kaspersen, H., ‘Veroordeling van identiteitsdiefstal op Facebook ‘avant la lettre’ van de wet ?’, Noot onder Corr. Gent, 21 September 2011, Computerrecht 2012, pp. 165–170.

Bibliography

Page 37: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

945

Kindt, E ., ‘Biometric applications and the data protection legislation. The legal review and the proportionality test, DuD 2007, pp. 166–170.

Kindt, E. and Dumortier, J., ‘Biometrie als herkenning- of identifi catiemiddel ? Enkele juridische beschouwingen’, Computerrecht 2008, pp. 185–198.

Kindt, E. and van der Hof, S., ‘Identiteitsgegevens en –beheer in een digitale omgeving: een juri-dische benadering’, Computerrecht 2009, pp. 44–52.

Kindt, E., ‘Belgisch biometrisch paspoort onveilig’, Computerrecht 2007, pp. 221–223. Koops, B. J. and Leenes, R., ‘“Code” and the Slow Erosion of Privacy’, Michigan

Telecommunications & Technology Law Review 12 (1), pp. 115–188. Koops, B.-J., Leenes, R. and de Hert, P., ‘Grondrechten en nieuwe technologieën. Een rechts-

vergelijkend overzicht’, NJB 2008, pp. 1157–1164. Koops, B.-J., Leenes, R., Meints, M., van der Meulen, N. and Jaquet-Chiffelle, D.-O., ‘A Typology

of Identity-related Crime: Conceptual, Technical, and Legal Issues’, Information , Communication & Society 2008, pp. 1–24.

Kuczerawy, A. and Dumortier, J., ‘Social Networks and Web 2.0: are users also bound by data protection regulations ?’, IDIS 2009, pp. 65–79.

Lemmens, K., ‘The Protection of Privacy between a Rights-Based and a Freedom-Based Approach: What the Swiss Example can teach us’, MJ 2003, pp. 381–403.

Lenaerts, K. and Corthaut, T., ‘Judicial Review as a Contribution to the Development of European Constitutionalism’, YBEL 2003, pp. 1–43.

Lenaerts, K. and de Smijter, E., ‘The Charter and the Role of the European Courts’, MJ 2001, pp. 90–101.

Lenaerts, K., ‘The Principle of Subsidiarity and the Environment in the European Union: Keeping the Balance of Federalism’, 17 Fordham Int ’ l L . J . 1994, pp. 846–895.

Litman, J., ‘Information Privacy/Information Property’, 52 Stan . L . Rev . 1999–2000, pp. 1283–1313.

Liu, Y., ‘Identifying Legal Concerns in the Biometric Context’, Journal of International Commerical Law and Technology , 2008, pp. 45–54.

Liu, Y., ‘The principle of proportionality in biometrics: Case studies from Norway’, Computer Law & Security Review 2009, pp. 237–250.

Lowry, H. ‘Transborder Data Flow: Public and Private International Law Aspects’, Houston Journal of International Law , 1984, pp.159–174.

Meints, M., ‘Implementierung grosser biometrischer Systeme. Kriterien und deren Anwendung am Beispiel des ePasses’, DuD 2007, pp. 189–193.

Meysmans, E., ‘De verwerking van persoonsgegevens inzake consumentenkrediet’, Computerrecht 1993, pp. 2–6.

Miller, P. ‘Teleinformatics, Transborder Data Flows and the Emerging Struggle for Information : An Introduction to the Arrival of the New Information Age’, Columbia Journal of Law and Social Problems 1986, pp. 89–143.

Mom, G., ‘Uitvoering in (strikt) besloten kring’, AMI 2010, pp. 81–91. Murphy, Th. and Ócuinn, G., ‘Works in Progress: New Technologies and the European Court of

Human Rights’, Human Rights Law Review 2010, pp. 601–638. Phillipson, G., ‘Transforming Breach of Confi dence ? Towards a Common Law Right of Privacy

under the Human Rights Act’, MLR 2003, pp. 726–728. Ploem, M., ‘Het verschijnsel biobanking in privacyperspectief’, Computerrecht 2011,

pp. 320–328. Prins, J. ‘Property and Privacy: European Perspectives and the Commodifi cation of our identity’,

in Guibault, L. and Hugenholtz, P. (eds.), The Future of the Public Domain : Identifying the commons in information law , Kluwer Law International, 2006, pp. 223–257.

Prins, J., ‘Biometrie: een instrument bij privacybescherming’, Beveiliging 2001, pp. 50–55, also available at http://arno.uvt.nl/show.cgi?fi d=6017

Prins, J., ‘Property and Privacy: European Perspectives and the Commodifi cation of our identity’, Information Law Series 2006, pp. 223–257, available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=929668

Bibliography

Page 38: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

946

Prins, J., ‘The propertization of Personal Data and Identities’, EJCL 2004, available at http://www.ejcl.org/83/art83-1.html

Prins, J., ‘Technologie en de nieuwe dilemma’s rondom identifi catie’, Justitiële verkenningen 30(8), pp. 34–47.

Prinsen, M., ‘De bestaande forensische DNA-databank en een verkenning van de mogelijkheden tot uitbreiding’, P & I 2006, pp. 54–58.

Schaar, P., ‘Privacy by Design’, IDIS 2010, pp. 267–274, available at http://www.springer.com/computer/journal/12394

Solove, D., ‘“I’ve got nothing to hide” and other misunderstandings of privacy’, San Diego Law Review 2007, pp. 745–772.

Titulaer-Meddens, J., ‘Tien Jaar Wbp. En hoe nu verder ?’, P & I 2011, pp. 249–254. Tulkens, F., ‘Towards a Greater Normative Coherence in Europe: The Implications of the Draft

Charter of Fundamental Rights of the European Union’, H . R . L . J . 2000, p. 329. Van Alsenoy, B, ‘Allocating responsibility among controllers, processors, and “everything in

between”: the defi nition of actors and roles in Directive 94/46/EC’, Computer Law & Security Review 2012, pp. 25–43.

Van Alsenoy, B. and De Cock, D., ‘Due processing of personal data in eGovernment ? A Case Study of the Belgium electronic identity card’, DUD 2008, pp. 178–183.

van den Hoven van Genderen, R., ‘Hoe hard is de NEN-norm ? Bescherming van persoonsge-gevens voor de zorgsector langs de meetlat van NEN 7510’, Computerrecht 2011, pp. 21–26.

Van der Ploeg, I., ‘Written on the body: biometrics and identity’, in ACM SIGCAS Computers and Society , 1999, pp. 37–44.

Van Eecke, P. and Truyens, M., ‘Privacy en sociale netwerken’, Computerrecht 2010, pp. 115–128.

Visser, E., ‘Who owns your bits when you die?’, Computerrecht 2007, pp. 195–198. Volokh, E., ‘Freedom of Speech and Information Privacy: The Troubling Implications of a Right

to stop People from Speaking About You’, 52 Stan . L . Rev . 1999–2000, pp. 1049–1124. Welinder, Y., ‘A face tells more than a thousand posts: developing face recognition privacy in social

networks’, Harvard Journal of Law and Technology , Vol. 26, No. 1, 2012, 74 p.

b . Belgium

Berkmoes, H., ‘Zenuwachtig worden als grond voor identiteitscontrole’, comments on Cass., 24.01.2001, Vigiles 2002, pp. 176–177.

Boulanger, M.-H., C. de Terwangne, Th. Léonard, S. Louveaux, D. Moreau and Y. Poullet, ‘La protection des données à caractère personnel en droit communautaire’, Journal des tribunaux droit européen 1997, pp. 121–127 (part 1) and pp. 145–179 (part 2).

de Corte, R., ‘De achterkant van de privacy. Kan het beroep op privacy leiden tot straffeloosheid ?’, N . J . W . 2003, pp. 798–810.

De Hert, P., ‘Roepen om de erkenning van een grondrecht op veiligheid. Implicaties voor de poli-tie’, in Vigiles 2002, pp. 33–41.

De Hert, P., De Schutter, O. and Gutwirth, S., ‘Pour une reglementation de la videosurveillance’, J . T . 1996, pp. 569–579.

Desmet, B., ‘Genetisch onderzoek en verzekeringen. De wet van de (genetisch) sterkste’, Jura Falconis 2005–2006, pp. 505–548, available at http://www.law.kuleuven.be/jura/art/42n4/desmet.html

Dhont, J., ‘Le traitement des données à caractère personnel dans le secteur d’assurances. La légalité des banques de données’, Rev . dr . ULB 2000, pp. 289–334.

Dumortier, F., ‘L’utilisation de la biométrie et des RFIDs dans le cadre de l’espace de liberté, de sécurité et de justice: une affi are de balance ou une question de dignité ?, ERA Forum 2008, pp. 543–579.

Dumortier, J. and Robben, F., ‘Gebruikers- en toegangsbeheer bij het bestuurlijke elektronische gegevensverkeer in België’, Computerrecht 2009, pp. 52–60.

Dumortier, J., ‘Privacybescherming en gegevensverwerking’, Vlaams Jurist Vandaag 1993, pp. 4–14.

Bibliography

Page 39: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

947

Frala, D., ‘La pratique des banques de données dans le secteur de l’assurance. Le cas des fi chiers communs au secteur gérés par le GIE Datassur’, Rev . dr . ULB 2000, pp. 267–288.

Ganshof van der Meersch, W., ‘L’ordre public et les droits de l’homme’, J . T . 1968, pp. 658–663. Guldix, E., ‘Algemene systematische beschouwingen over het persoonlijkheidsrecht op eigen

afbeelding’, R . W . 1980–81, pp. 1161–1192. Gutwirth, S., ‘De toepassing van het fi naliteitsbeginsel van de privacywet van 8 December 1992 tot

bescherming van de persoonlijke levenssfeer ten opzicht van de verwerking van persoonsge-gevens’, T . P . R . 1993, pp. 1409–1477.

Lambrecht, D., ‘De bescherming van de privacy in de Belgische wetgeving. Overzicht van de bestaande wetgeving en een blik vooruit naar de op handen zijnde veranderingen’, Jura Falconis 2000–2001, pp. 443–494, available at http://www.law.kuleuven.be/jura/art/37n3/lambrecht.htm

Lemmens, P., ‘De veiligheidsgordel en het recht op eerbiediging van het privé-leven’, R . W . 1979–80, pp. 838–846.

Lemmens, P., ‘The Relationship between the Charter of Fundamental Rights of the EU and the ECHR: Substantive Aspects’, MJ 2001, pp. 49–67.

Léonard T. and Poullet, Y., ‘La protection des données à caractère personnel en plein (r)évolution’, J . T . 1999, pp. 377–396.

Nys, H., ‘Het Verdrag Mensenrechten en Biogeneeskunde van de Raad van Europa: enkele krachtlijnen’, in R . W . 1997–98, pp. 666–674.

Oversteyns, B., ‘Het recht op eerbiediging van het privé-leven’, R . W . 1988–1989, pp. 488–498. Popelier, P., ‘The Role of the Belgian Constitutional Court in the Legislative Process’, Statute Law

Review 2005, pp. 22–40. Rouvroy, A., ‘Informations génétiques et assurance. Discussion critique autour de la position “pro-

hibitionniste” du législateur belge’, J . T . 2000, pp. 583–603. Rigaux, F., ‘La protection de la vie privée à l’égard des données à caratère personnel’, Annales de

droit de Louvain 1993, pp. 49–72. Rimanque, K., ‘Nationale bescherming van grondrechten’, T . B . P . 1981, pp. 33–42. Schutyser, K., ‘Eigendomsrecht en medische dossiers’, R.W. 1983–84, pp. 3021–3048. Van Eecke P. and Ooms, B., ‘De nieuwe wet op de camerabewaking: een analyse van een langver-

wachte wet na een rechtsonzekere periode’, in Computerrecht 2008, pp. 147–153. Van Eecke, P., ‘De elektronische handtekening in het recht’, T . B . H . 2009,

pp. 322–354. Van Gerven, W. ‘Principe de proportionnalité, abus de droit et droits fondamentaux’, J . T . 1992,

pp. 305–309. Van Kriekinge, D., ‘La Banque-Carrefour des Entreprises en tant que pillier de réalisation

de l’e- governeent : un pas vers la simplifi cation administrative ?’, R . D . T . I ., 20.12.2004, pp. 7–23.

Van Oldeneel, Ch., ‘Protection de la vie privée. Incidences pratiques de la directive européenne sur le droit belge’, C . J . 1996, pp. 21–28.

Van Raemdonck, K., ‘De invloed van de wet van 8 December 1992 ter bescherming van de per-soonlijke levenssfeer t.o.v. de verwerking van persoonsgegevens op de banksector’, R . W . 1997, pp. 897–914 (part 1) and pp. 937–947 (part 2).

Verbeke, A., ‘Informatie over andermans vermogen. Belangenafweging tussen het recht op pri-vacy van de schuldenaar en het recht op informatie van de schuldeiser’, R . W . 1993–94, pp. 1129–1155.

Verhenneman, G. ‘Radio Frequency Identifi cation – Fictie wordt werkelijkheid en onze privacy staat weer onder druk’, in Jura Falconis 2007–2008, pp. 131–159.

c . France

Bousta, R., ‘La « spécifi cité » du contrôle constitutionnel français de proportionnalité’, R . I . D . C . 2007, pp. 859–877.

Buisson, J., ‘Contröles et vérifi cations d’identité, art. 78-1 à 78-5’, Juris - Classeur de procédure pénale 1998, 10.

Bibliography

Page 40: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

948

Byk, Ch., ‘Bioéthique : législation, jurisprudence et avis des instances d’éthique’, La Semaine Juridique Edition Générale , 26.03.2008, I no. 129.

Byk, Ch., ‘Biométrie et Constitution : est-il déjà trop tard pour les libertés publiques ?’ La Semaine Juridique Edition Générale , 18.06.2008, I 154.

Fromont, M., ‘Le principe de proportionnalité’, AJDA 1995, pp. 156–166. Guibal, M., ‘De la proportionnalité’, ADJA 1978. Laffaire M.-L. and Elm, T., ‘Biometrie, la première décision d’une longue série’, Expertises 2005,

p. 299. Lepage, A., ‘La Biometrie refoulée de l’entreprise’, Comm . Comm . Electronique 2005, no 164,

pp. 46–48. Rozenfeld, S., ‘Biométrie: âs de validité des contrats sans respect de la loi de 1978’, Expertises

2011, no 359. Touchent, D., ‘La mise en oeuvre d’un système de badgeage par empreintes digitales dans

l’entreprise’, La Semaine Juridique Entreprise et Affaires n°35, 15.12.2005, pp. 1337–1339.

d . The Netherlands

De Leeuw, E., ‘Biometrie en nationaal identiteitsmanagement’, P & I 2007, pp. 50-56. Grijpink, J., ‘Biometrics and Privacy’, Computer Law and Security Report 2001, pp.154–160. Grijpink, J., ‘Een beoordelingsmodel voor de inzet van biometrie’, P & I 2006, pp. 14–17. Prins, J., ‘Making our body identify for us: Legal implications of biometric technologies’,

Computer Law & Security Report 1998, pp. 159–165. Snijder, M. and Grijpink, J., ‘Twee jaar Paspoortwet: terug naar af ?’, P & I 2011,

pp. 142–144. Zwenne, G.-J. and L. Mommers, ‘Zijn foto’s en beeldopnamen ‘rasgegevens’ in de zin van artikel

126 nd Sv en artikel 18 Wbp ?’, P & I 2010, pp. 237–247.

e . Other Countries

Bloustein, E., ‘Privacy as an Aspect of Human Dignity: An answer to Dean Prosser’, 39 New York University Law Review 1964, p. 962 et seq .

Cohen, J., ‘The right to read anonymously: a closer look at ‘copyright management’ in cyber-space’, 28 Conn . L . Rev . 1996, pp. 981–1039.

Flaherty, D., ‘On the Utility of Constitutional Rights to Privacy and Data Protection’, 41 Case W . Res . L . Rev . 831, 1990–1991, pp. 831–855.

Greenleaf, G., ‘India’s national ID system: Danger grows in a privacy vacuum’, Computer Law & Security Review 2010, pp. 479–491.

Hoeren, T.‚ ’Was ist das Grundrecht auf Integrität und Vertraulichtkeit informationstechnischer Systeme ?’, Multimedia und Recht 2008, pp. 365–366.

Hornung G. and Schnabel, Ch., ‘Data protection in Germany I: The population census decision and the right to informational self-determination’, Computer Law & Security Review 2009, pp. 84–88.

Hornung, G., ‘Ein neues Grundrecht’, Computer und Recht 2008, pp. 299–306. Joh, E., ‘Reclaiming “Abandoned” DNA’: The Fourth Amendment and Genetic Privacy’, 100

Northwestern University Law Review 2006, pp. 857–884, also available at http://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=86638

Kaye, D., ‘Science Fiction and Shed DNA’, 101 Northwestern University Law Review Colloquy 2006, pp. 62–67, also available at http://www.law.northwestern.edu/lawreview/colloquy/2006/7/#fn13down

Kaye, D., ‘Two fallacies About DNA Data Banks for Law Enforcement’ 67 Brooklyn Law Review , 2001, pp. 179206, also available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=301650

Sullivan, C., ‘The United Kingdom Identity Cards Act 2006 – Civil or Criminal ?’, International Journal of Law and Information Technology 2007, pp. 320–361.

Warren, S. and Brandeis, L., ‘The Right to Privacy’, 4 Harv . L . Review 1890, p. 193.

Bibliography

Page 41: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

949

Technical – Ethical – Other

Albrecht, A., ‘Privacy best practices’, in Biometric Technology Today , November/December 2003, pp. 8–9.

Alterman, A., ‘A piece of yourself’: Ethical issues in biometric identifi cation’, Ethics and Information Technology, 2003, pp. 139–150, available at http://www.hideproject.org/down-loads/references/Alterman-A_Piece_of_yourself.pdf

Backhouse, J., ‘Interoperability of Identity and Identity Management Systems’ in DuD 2006, pp 568–570.

Butler, J., ‘Genetics and Genomics of Core Short Tandem Repeat Loci Used in Human Identity Testing’, 51 Journal Forensic Science , pp. 253–265, also available at http://www.cstl.nist.gov/div831/strbase/pub_pres/Butler2006JFS_coreSTRreview.pdf

Daugman, J., ‘Interview. Pattern recognition : Biometrics, Identity and the State – An Interview with John Daugman’, in BioSocieties 2008, pp. 81–86.

Friedewald, M., Wright, D., Gutwirth, S. and Mordini, E., ‘Privacy, data protection and emerging sciences and technologies toward a common framework’, The European Journal of Social Science Research 2010, pp. 61–67.

Galton, F., ‘Finger print evidence’, Nature 1902, p. 606, available at http://galton.org/bib/JournalItem.aspx_ action=view_id=291

Godard, B., Raeburn, S., Pembrey, M., Bobrou, M., Farndon, P. and Ayme, S., ‘Genetic informa-tion and testing in insurance and employment: technical, social and ethical issues’, European Journal of Human Genetics 2003, also available at http://www.nature.com/ejhg/journal/v11/n2s/pdf/5201117a.pdf

Godard, B., Schmidtke, J., Cassiman, J.-J. and Aymé, S., ‘Data storage and DNA banking for bio-medical research: informed consent, confi dentiality, quality issues, ownership, return of bene-fi ts. A professional perspective, European Journal of Human Genetics 2003, also available at http://www.nature.com/ejhg/journal/v11/n2s/pdf/5201114a.pdf

Grimaldi, K., Look, M., Scioli, A., Coll Clavero, J., Marinos, S., and Tagaris T., ‘Personal genetics: regulatory framework in Europe from a service provider’s perspective’, European Journal of Human Genetics 2011, pp. 382–388.

Gutwirth, S., ‘Biometrics between opacity and transparency’, Ann Ist Super Sanità 2007, pp. 61–65. Hartung, D., ‘Venenbilderkennung. Privatsphärenschutz unerlässlich’, DuD 2009, pp. 275–279. Jain, A., Nandakumar, K. and Nagar, A., ‘Biometric template security’, EuRASIP journal on

Advances in Signal Processing 2008, 17 p. Jain, A. and Pankanti, S. ‘Beyond Fingerprinting. Security systems based on anatomical and

behavioural characteristics may offer the best defense against identity theft’, in Scientifi c American 2008, pp. 78–81.

Jain, A., Prabhakar, S. and Pankanti, S. ‘On the similarity of identical twin fi ngerprints’, Pattern Recognition 35, no. 11, November 2002, pp. 2653–2663.

Korte, U., Merkle, J., Niesing, M., ‘Datenschutzfreundliche Authentisierung mit Fingerabdrücken. Konzeption und Implementierung eines Template Protection Verfahrens – ein Erfahrungsbericht’, DuD 2009, pp. 289–294.

Laufer, B., ‘History of the fi nger-print system’, 1912 Smithsonian Institution Annual report ,1912, reprinted in The Print , vol. 16 (2), 2000, pp.1–13, also available at http://www.scafo.org/library/160201.html

Maricq, H., ‘”Ethnic” Differences in the Fingerprint Data in an “All White” Control Sample’, Hum Hered 1972, pp. 573–577.

Mordini, E., and Petrini, C., ‘Ethical and social implications of biometric identifi cation technol-ogy’, Ann . Ist Super Sanit à 2007, pp. 5–11.

Nickel, C., ‘Authentisierung an mobilen Geräten mittels Gangerkennung’, DuD 2009, pp. 280–283.

Nithin, M., Manjunatha, B., Preethi, D. and Balaraj, B., ‘Gender differentiation by fi nger ridge count among South Indian population’, Journal of Forensic and Legal Medicine 2011, pp. 79–81.

Bibliography

Page 42: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

950

Ratha, N., Connell, J. and Bolle, R., ‘Enhancing security and privacy in biometrics-based authen-tication systems’, IBM Systems J . 2001, pp. 614–634.

Saenz, R., ‘Primary care of infants and young children with Down syndrome’, American Family Physician 1999, pp. 381–390, available at http://www.aafp.org/afp/990115ap/381.html

Schumacher, A. and Unverricht, K., ‘Rechtliche und gesellschaftliche empfehlungen zur Gestaltung Biometrischer Systeme. Gemäss ISO/IEC Technical Report TR 24714-1’, DuD 2009, pp. 308–312.

Van der Ploeg, I., ‘Genetics, biometrics and the informatization of the body’, Ann Ist Super Sanità 2007, pp. 44–50.

Van der Ploeg, I., ‘The Illegal Body: ‘Eurodac’ and the Politics of Biometric Identifi cation’, Ethics and Information Technology 1999, pp. 295–302.

van Hoyweghen, I. and Horstman, K., ‘European practices of genetic information and Insurance. Lessons for the Genetic Information Nondiscrimination Act’, JAMA 2008, pp. 326–327.

Van Quathem, K., ‘Controlling personal data in clinical trials’, P & I 2009, pp. 74–79. Wallis, V., ‘The Signifi cance of Brushfi eld’s Spots in the Diagnosis of Mongolism in Infancy’,

Archives of disease in childhood 1951, pp. 495–500. Watson, J. and Crick, F., ‘A Structure for Deoxyribose Nucleic Acid’, Nature 171 , 1953, pp. 737–738,

available at http://www.nature.com/nature/dna50/watsoncrick.pdf Wilkinson, R., ‘Genetic information: Important but not “exceptional”, in IDIS 2010, 16 p., avail-

able at http://www.springerlink.com/content/g6647h7501555316/fulltext.pdf Yousefi -Nooraie, R., Mortaz-Hedjri, S., ‘Dermatoglyphic asymmetry and hair whorl patterns in

schizophrenic and bipolar patients’, Psychiatry Research 2008, pp. 247–250. Yue, F., Zuo, W., Zhang, D. and Li, B., ‘Fast palmprint identifi cation with multiple templates per

subject’, in Pattern Recognition Letters 2011, pp. 1108–1118.

D. Dissertations

Ekker, A., Anoniem communiceren : van drukpers to Weblog , Dissertation, Amsterdam, 2006, 286 p.

Guldix, E., De persoonlijkheidsrechten, de persoonlijke levenssfeer en het privé-leven in hun onderling verband, doctoral thesis, Brussels, VUB, 1986, 692 p. and references (332 p.).

Kindt, E., The escape of transborder data fl ow of a global legal framework. An analysis of the poli-cies. A search for an effi cient global legal framework , Athens (GA, U.S.A.), Law Library UGA, 1988, 126 p.

Kosta, E., Unravelling consent in European data protection legislation. A prospective study on consent in electronic communications , Leuven, Law faculty, 2011, 364 p.

Newton, E., Biometrics and Surveillance: Identifi cation, De-Identifi cation, and Strategies for pro-tection of Personal Data , Pittsburgh (Pennsylvania), Carnegie Mellon University, 2009, 178 p.

V. Reports and studies

Legal

A. International – Europe

a . European Union

DLA Piper, Legal analysis of a Single Market for the Information Society . New rules for a new age ?, Brussels, 2009, 505 p., available at http://ec.europa.eu/information_society/newsroom/cf/ itemlongdetail.cfm?item_id=7022 EDPS, Annual Report 2010 , Luxembourg, EU Publications offi ce, 2011, 120 p.

Bibliography

Page 43: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

951

ENISA Ad Hoc Working Group on Privacy & Technology, Technology - Induced challenges in Privacy & Data Protection in Europe , M. Langheinrich and M. Roussopoulos (eds.), 2008, 48 p. previously available at http://www.enisa.europa.eu/activities/risk-management/fi les/deliverables/technology-induced-challenges-in-privacy-data-protection-in-europe

ENISA, Flying 2.0. Enabling automated air travel by identifying and addressing the challenges of loT & RFID technology , 2010, 109 p.

EPEC, Study for the Extended Impact Assessment of the Visa Information System . Final Report , Brussels, 2004, 95 p., available at http://www.statewatch.org/news/2005/jan/vis-com-835- study.pdf

European Commission, Consultation on the legal framework for the fundamental right to protec-tion of personal data , 2009.

European Commission, Annual Report from the Commission to the European Parliament and the Council on the activities of the EURODAC Central Unit in 2008 , 25.9.2009, COM(2009) 494 fi nal, 20 p.

European Commission, Report from the Commission to the European Parliament and the Council on the evaluation of the Dublin system , COM(2007) 299 fi nal, 6.06.2007, 13 p.

European Commission, First Report on the implementation of the Data Protection Directive: Analysis and impact study on the implementation of Directive EC 95/46 in Member States , COM(2003) 265 fi nal, 15.5.2003, 27 p.

European Commission, Comparative Study on different approaches to new privacy Challenges , in particular in the light of technological developments , 2010, 59 p., available at http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/fi nal_report_en.pdf

European Parliament, Resolution on the First Report on the implementation of the Data Protection Directive ( 95 / 46 / EC ), (COM(2003) 265 – C5-0375/2003–2003/2153(INI), 9.03.2004, O . J . C102E, 28.4.2004, pp. 147–153.

European Parliament, Report on the First Report on the implementation of the Data Protection Directive (95/46/EC) COM(2003)265, A5-0104/2004 fi nal, 24.02.2004, 22 p.

b . Council of Europe

Committee of experts on data protection (CJ-DP), The introduction and use of personal identifi ca-tion numbers : the data protection issues , Council of Europe, 1991, 20 p., available at http://www.coe.int/t/dghl/standardsetting/dataprotection/Reports/Pins_1991_en.pdf

Consultative Committee of the Convention for the Protection of Individuals with regards to Automatic Processing of Personal Data [CETS No. 108] (T-PD), Progress report on the appli-cation of the principles of convention 108 to the collection and processing of biometric data , Strasbourg, Council of Europe, CM(2005)43, March 2005, 22 p., available at https://wcd.coe.int/ViewDoc.jsp?Ref=CM(2005)43&Language =lanEnglish&Site=COE&BackColorInternet=DBDCF2&BackColorIntranet=FDC864&BackColorLogged=

c . OECD

Organisation For Economic Co-Operation And Development, Thirty Years after the OECD Privacy Guidelines , Paris, OECD, 2011, 111 p.

Organisation For Economic Co-Operation And Development, At a Crossroads : “ Personhood ” and the Digital Identity in the Information Society ( STI Working Paper 2007 / 7 ), Paris, OECD, 51 p., available at http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html

Organisation For Economic Co-Operation And Development, Background material on biomet-rics and enhanced network systems for the security of international travel , Paris, OECD, DSTI/ICCP/REG(2003)3/FINAL, 23 December 2004, 53 p.

Organisation For Economic Co-Operation And Development, Biometric - based Technologies , Paris, OECD, DSTI/ICCP/REG(2003)2/FINAL, 30 June 2004 (cancelling and replacing the same document of 28 April 2004), 66 p.

Bibliography

Page 44: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

952

d . European Research projects ( 5 th , 6 th and 7 th Framework Programmes )

BioVision

Albrecht, A. and Walsh, M. (eds.), BioVision . Report on legal and privacy issues , BioVision, 2003, 26 p.

Albrecht, A., BioVision. Privacy Best Practices in Deployment of Biometric Systems , BioVision, 2003, 49 p.

Mansfi eld, T. and Statham, Ph., BioVision. User and Application Security Issues for Biometric Systems , BioVision, 2003, 62 p.

Rejman-Greene, M. (ed.), Roadmap for Biometrics in Europe to 2010 , BioVision , 15 October 2003, 202 p., available at http://oai.cwi.nl/oai/asset/4057/04057D.pdf

Fidis

( All Fidis deliverables and contributions mentioned are available and can be downloaded at www.fi dis.net )

Backhouse, J. and Halperin, R., D . 4 . 5 . A Survey on Citizen ’ s trust in ID systems and authorities , Frankfurt, FIDIS, 2007, 27 p.

Bauer, M., Meints, M., (eds.), D.3.1. Structured Overview on Prototypes and Concepts of Identity Management Systems, Frankfurt, FIDIS, 2004, 77 p.

Buitelaar, H. (ed.), D13 . 3 Study on ID number policies , Frankfurt, FIDIS, 2007, 105 p. Buitelaar, J., Meints, M. and Kindt, E. (eds.), D16 . 3 . Requirements for privacy - friendly identity

management in e - government , Frankfurt, Fidis, 2009, 88 p. Cehajic, S. and Sprokkereef, A., ‘Germany’ in Kindt, E. and Müller, L. (eds.), D . 13 . 4 . The privacy

legal framework for biometrics , Frankfurt, FIDIS, 2009, pp. 70–82. De Hert, P. and Sprokkereef, A., ‘Regulation for biometrics as a primary key for interoperability?’

in Kindt, E. and Müller, L. (eds.), D . 3 . 10 . Biometrics in identity management , Frankfurt, FIDIS, 2007, pp. 47–55.

De Hert, P. and Sprokkereef, A., ‘The Netherlands’ in Kindt, E. and Müller, L. (eds.), D13 . 4 . The privacy legal framework for biometrics , Frankfurt, FIDIS, 2009, pp. 83–102.

Gasson, M., Meints, M. and Warwick, K. (eds.), D . 3 . 2 . A study on PKI and biometrics , Frankfurt, FIDIS, 2005, 138 p.

Geradts, Z. and Gloe, Th. (eds.), D6 . 8b . Identifi cation of images , Frankfurt, FIDIS, 2009, 90 p. Geradts, Z., Sommer, P. (eds.), D . 6 . 1 . Forensic Implications of Identity Management Systems ,

Frankfurt, FIDIS, 2006, 111 p. Halperin, R. and Backhouse, J. (eds.), D.4.12. A qualitative comparative analysis of citizens’

perception of eIDs and interoperability , Frankfurt, FIDIS, June 2009, 50 p. Hildebrandt, M., Backhouse, J. (eds.), D . 7 . 2 . Descriptive analysis and inventory of profi ling prac-

tices , Frankfurt, FIDIS, 2005, 116 p. Kindt, E. and Hildebrandt, M., ‘Vulnerabilities of the present legal framework regarding BBP’, in

Hildebrandt, M. (ed.), D . 7 . 12 . Behavioural biometrics profi ling and transparency enhancing tools , 2009, pp. 38–46.

Kindt, E. and Coudert, F., ‘France’ in Kindt, E. and Müller, L. (eds.), D13 . 4 . The privacy legal framework for biometrics , Frankfurt, FIDIS, 2009, pp. 52–67.

Kindt, E., ‘Belgium’, in van der Meulen, N. and Koops, B.-J. (eds.), D12 . 7 Identity - related crime in Europe – Big problem or big hype ? Frankfurt , FIDIS, 2008, pp. 12–29.

Kindt, E. and Müller, L. (eds.), D . 3 . 10 . Biometrics in identity management , Frankfurt, FIDIS, 2007, 130 p

Leenes, R. (ed.), D.5.2b. ID-related Crime: Towards a Common Ground for Interdisciplinary Research , Frankfurt, FIDIS, 2006, 123 p.

Meints, M. & Hansen, M., ‘Additional and in some cases health related information in biometrics’, in Kindt, E. and Müller, L. (eds.), D . 3 . 10 . Biometrics in identity management , Frankfurt, FIDIS, 2007, pp. 83–86.

Bibliography

Page 45: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

953

Meints, M. & Hansen, M., (eds), D . 3 . 6 Study on ID Documents , Frankfurt, FIDIS, 2006, 156 p. Müller, L. and Kindt, E. (eds.), D3.14. Model implementation for a user controlled biometric

authentication , Frankfurt, FIDIS, 2009, 57 p. Müller, L., ‘3.1.2 Reference model of a biometric system’ in Kindt, E. and Müller, L. (eds.),

D . 3 . 10 . Biometrics in identity management , Frankfurt, FIDIS, 2007, pp. 17–26. Müller, L., ‘3.1.4 Biometric system errors’ in Kindt, E. and Müller, L. (eds.), D . 3 . 10 . Biometrics in

identity management , Frankfurt, FIDIS, 2007, pp. 26–36. Pfi tzmann, A. and Steinbrecher, S., ‘6.3.2. The technical perspective’, in Meints, M. and Hansen,

M. (eds), D . 3 . 6 Study on ID Documents , Frankfurt, FIDIS, 2006, pp. 111–115. van der Meulen, N. and Koops, B.-J. (eds.), D12 . 7 Identity - related crime in Europe – Big prob-

lem or big hype ? Frankfurt, FIDIS, 2008, 86 p. Zoun, R., ′5. Case Study: Biometric Artefacts’ in Geradts, Z. and Sommer, P. (eds.), D . 6 . 1 . Forensic

Implications of Identity Management Systems , Frankfurt, FIDIS, 2006, pp. 28–69.

Turbine

( Turbine deliverables mentioned are available and can be downloaded at http://www.turbine- project.eu/ )

Kindt, E., D.1.4.3 Practical Guidelines for a privacy friendly implementation of biometric data for identity verifi cation , Paris, Turbine, 2011, 38 p.

Kindt, E., D.1.4.1 Legal Aspects of Identity Management, Paris, Turbine, 2009, 75 p.

Other research projects’ reports

Best Network, D2.1. Survey of existing (non-governmental applications) and emerging biometric applications , Best Network, 2010, 29 p.

Best Network, D2.1. Survey of existing (non-governmental applications) and emerging biometric applications , Best Network, 2010, 16 p.

Dumortier, J. and Goeman, C., Roadmap for Advanced Research in Privacy and Identity Management (RAPID), 2003, 27 p., also available at https://www.law.kuleuven.be/icri/deliverables/421rapid.pdf?where=

Fischer-Hübner, S. and H. Zwingelberg (eds.), D.4.3.2, UI prototypes: Policy administration and presentation. Version 2 , Primelife, 2010, 96 p., available at http://www.primelife.eu/images/sto-ries/deliverables/d4.3.2-policy_administration_and_presentation_ui_prototypes_v2-public.pdf

Gutwirth, S., Gellert, R., Bellanova, R., Friedewald, M., Schütz, P., Wright, D., Mordini E. and Venier, S., Legal , social , economic and ethical conceptualisations of privacy and data pro-tection , Prescient, D.1, 23.03.2011, 76 p., available at http://www.prescient-project.eu/pre-scient/inhalte/download/PRESCIENT-D1---fi nal.pdf

Legal IST Project, Report on additional legal issues , 2006, 163 p., available at http://www.ve- forum.org/projects/P1507/D15%20Report%20on%20Additional%20Legal%20Issues%20-%20fi nal%20version.pdf

London Economics, Study on the economic benefi ts of privacy-enhancing technologies (PETs). Final Report to the European Commission DG Justice, Freedom and Security , July 2010, 238 p., also available at http://ec.europa.eu/justice/policies/privacy/docs/studies/fi nal_report_pets_16_07_10_en.pdf

Schumacher, G. (ed.), D1.3. Biometrics for Border Control – A Roadmap for Europe- , Best Network, 2012, 35 p.

van der Ploeg, I., D.3.3a. Ethical Brief on Biometrics & Embedded Technology , Hide, 2009 13 p.

e . Other

Australian Law Reform Commission, Essentially Yours : The Protection of Human Genetic Information in Australia , ALRC Report 96, May 2003, Sydney, ALRC, available at http://www.alrc.gov.au/publications/1-introduction-inquiry/essentially-yours

Bibliography

Page 46: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

954

Bekker, R., Betreft : Onderzoek naar besluitvorming biometrie op reisdocumenten , 21.2.2012, Kamerstukken II 2011/12, 25 764, nr. 54, Annex, available at https://zoek.offi cielebekendmakingen.nl/blg-155412.html

Bogdanowicz, M. and Beslay, L., Cyber - security and the future of identity , IPTS report, 2002. Church, P. and Ruegg, Ch. (eds.), Data protected. A report on the status of data protection

legislation in Europe in 2008 , July 2008, London, Linklaters LLP, 142 p. De Hert, P. and Sprokkereef, A., An Assessment of the Proposed Uniform Format for Residence

Permits : Use of Biometrics , CEPS Briefi ng Note for the European Parliament’s committee on Civil Liberties, Justice and Home Affairs, IP/C/LIBE/FWC/2005-xx, available at www.ceps.be

De Hert, P., What are the Risks and What Guarantees Need to be Put in Place in View of Interoperability of Police Databases ? 01.02.2006 IP/C/LIBE/FWC/2005-25, Briefi ng paper for the EP Citizens Rights and Constitutional Affairs Committee, available at http://www.europarl.europa.eu/RegData/etudes/note/join/2006/378275/IPOL-LIBE_NT(2006)378275_EN.pdf

European Commission, DG JRC and the Institute of Prospective Technological Studies, Biometrics at the Frontiers : Assessing the Impact on Society , Sevilla, European Commission, 2005, 144 p.

Frontex, Operational and Technical security of Electronic Passports , Warsaw, Frontex, 2011, 189 p. Frontex, BIOPASS II. Automated biometric border crossing systems based on electronic pass-

ports and facial recognition: RAPID and Smartgate , Warsaw, Frontex, 2010, 50 p. Hays, B. and Vermeulen, M., Borderline. The EU’s New Border Surveillance Initiatives. Assessing

the Costs and Fundamental Rights Implications of EUROSUR and the “Smart Borders” Proposals , Heinrich Böll Foundation, June 2012, 82 p., available at http://www.statewatch.org/news/2012/jun/borderline.pdf

Institute for Prospective Technological Studies, Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview , European Commission, 2003, 187 p.

Korff, D. (ed.), Comparative Study on Different Approaches to new privacy challenges, in particular in the light of technological developments. Country studies. A.3 – France , May 2010, 54 p.

Korff, D., Automated processes of identifi cation , behavioural analysis and risk detection , Paper and presentation at Security , privacy and data protection seminar, organized by the Spanish Data Protection Agency, 9–11 June 2010, 43 p.

Korff, D., Comparative Study on Different Approaches to new privacy challenges, in particular in the light of technological developments, Working Paper N° 2: Data protection laws in the EU : the diffi culties in meeting the challenges posed by global social and technical developments, 20 January 2010, Brussels, European Commission, 120 p., available at http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/fi nal_report_working_paper_2_en.pdf

Korff, D., Comparative Study on Different Approaches to new privacy challenges, in particular in the light of technological developments, Comparative Chart: Divergences between data protection laws in the EU, 20 January 2010, Brussels, European Commission, 6 p., available at http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/final_report_comparative_chart_en.pdf

London Economics, Study on the economic benefi ts of privacy-enhancing technologies (PETs). Final report to the European Commission DG Justice, Freedom and Security , London, July 2010, 259 p., available at http://ec.europa.eu/justice/policies/privacy/docs/studies/fi nal_report_pets_16_07_10_en.pdf

LRDP Kantor and Centre for Public Reform, Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments, Final report , Brussels, European Commission, 20.01.2010, 57 p.

Lusoli, W., Compaňó, R. and Maghiros, I, Young People and Emerging Digital Services . An Exploratory Survey on Motivations , Perceptions and Acceptance of Risks , Sevilla, European Commission, JRC, 2009, 86 p, also available at http://ftp.jrc.es/EURdoc/JRC50089.pdf

Pato, J., Millett, L. (eds.), Biometric Recognition : Challenges and Opportunities , National Research Council, September 2010, 165 p.

Punie, Y., A social and technological view of Ambient Intelligence in Everyday Life : What bends the trend ?, Sevilla , DG JRC IPTS, Technical Report, EUR 20975 2003, 68 p., with executive

Bibliography

Page 47: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

955

summary available at http://ftp.jrc.es/EURdoc/20975-ExeSumm.pdf and a second version of the paper available at http://www.idate.fr/fi c/revue_telech/410/CS57_PUNIE.pdf

Robinson, N., Graux, H., Botterman, M. and Valeri, L., Review of the European Data Protection Directive , Cambridge, Rand, 2009, 82 p., available at http://www.ico.org.uk/upload/ documents/library/data_protection/detailed_specialist_guides/review_of_eu_dp_directive.pdf

X., Special Eurobarometer 359 . Attitudes on Data Protection and Electronic Identity in the European Union , 2011, Brussels, TNS Opinion & Social, 208 p. and Annexes, also available at http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf

B. National

Böhre, V., Happy Landings ? Het Biometrische Paspoort als zwarte doos , Wetens chappelijke Raad voor het Regeringsbeleid, Webpublicatie nr. 46, 2010, 155 p.

Brussee, R., Heerink, L., Leenes, R., Nouwt, S., Pekarek, M., Sprokkereef, A. and Teeuw, W., Persoonsinformatie of Identiteit? Identiteitsvaststelling en Elektronische Dossiers in het Licht van Maatschappelijke en Technologische Ontwikkelingen , 2008, Telematica Instituut, Report TI/RS/2008/034:1–98, 104 p, available at https://doc.novay.nl/dsweb/Get/Document-91969

De Hert, P. and Sprokkereef, A., The Use of Privacy Enhancing Aspects of Biometrics. Biometrics as a PET (privacy enhanding technology) in the Dutch private and semi-public domain , Tilburg, Centrum voor Recht, Technologie en Samenleving, January 2009, 50 p., available at http://arno.uvt.nl/show.cgi?fi d=93109

Dierx, J. and Ernste, D., Verwerking van persoonsgegevens over etnische afkomst. Verkenning onder achttien gemeenten , 2010, De Beuk, 65 p.

Dumortier, J., Goemans, C., and Loncke, M., Anonymity and Privacy in Electronic Services ( APES ). D.4, General report of the legal issues, 2003.

Independent Centre for Privacy Protection (ICPP) & Studio Notarile Genghini (SNG), the Identity Management Systems ( IMS ): Identifi cation and Comparison Study , September 2003, 327 p, available at https://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf

Jacobs, K., ‘Verzekeringen en genetica’, in Guldix, E., Stuyk, J., Jacobs, K. and Rigo, A., Het gebruik van genetische informatie. Het ethisch en juridisch kader voor het maatschappelijk gebruik van geïndividualiseerde genetische informatie , Brussel, Federale Diensten voor Wetenschappelijke, Technische en Culturele Aangelegenheden, 1994, pp. 129–150.

London School of Economics and Political Science, The Identity Project . An assessment of the UK Identity Cards Bill and its implications , Londen, LSE. The Department of Information Systems, v. 1.09, 27 June, 2005, 303 p., available at http://is2.lse.ac.uk/IDcard/identityreport.pdf

Snijder, M. Biometrisch Paspoort in Nederland : Crash of zachte landing , Wetenschappelijke Raad voor het Regeringsbeleid, Webpublicatie nr. 51, 2010, 145 p.

Tijdelijke Adviescommissie Modernisering GBA (‘Commissie Snellen’), GBA in de toekomst . Gemeentelijke Basis Administratie persoonsgegevens als spil voor toekomstige identiteits - infrastructuur , Den Haag, Tijdelijke Adviescommissie Modernisering GBA, 2001, 32 p., beschikbaar op www.minbzk.nl

Winter, H. and Sibma, A., Sanctionering van privacyschendingen . Een vergelijkend onderzoek in België , Duitsland en Oostenrijk , Wetenschappelijk Onderzoek- en Documentatiecentrum (WODC) (ed.), Den Haag, 2009, 64 p.

Zwenne, G.-J., Duthler, A.-W., Groothuis, M., Kielman, H., Koelewijn, W. en Mommers, L., Eerste fase evaluatie Wet bescherming persoonsgegevens . Literatuuronderzoek en knelpunten-analyse , Leiden, 2007, 213 p., available at http://www.wodc.nl/onderzoeksdatabase/1382a-evaluatie- wet-bescherming-persoonsgegevens-wbp-1e-fase.aspx

Technical – Ethical – Other

Bernecker, O., ‘Biometrics security: An end user perspective’, Information Security Technical Report 2006 , pp. 111–118, available (for purchase) at http://www.sciencedirect.com/science/article/pii/S1363412706000379

Bibliography

Page 48: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

956

Bundeskriminalamt, Forschungsprojekt. Gesichtserkennung als Fahndungshilfsmittel Foto-Fahndung. Abschlussbericht , Wiesbaden, February 2007, 28 p.

European Network Against Racism, Ethnic Profi ling , Brussels, ENAR, June 2009, 17 p. European Security Research & Innovation Forum (ESRIF), Final Report , December 2009, 324 p. Irish Council for Bioethics, Biometrics : Enhancing security or invading privacy ? Opinion, 2009,

170 p., available at http://www.scribd.com/doc/81418299/Irish-Council-for-Bio-Metrics Irish Council for Bioethics, Human biological material : Recommendations for Collection , Use and

Storage in research , 2005, 127 p., available at http://irishpatients.ie/news/the-vault/bioethics/human-biological-material-recommendations-for-collection-use-and-storage-in-research-2005/

National Science and Technology Council (NSTC), Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics, Privacy & Biometrics . Building a Conceptual Foundation , 15 September 2006 (update), 57 p., available at http://www.biometrics.gov/Documents/privacy.pdf

Nuffi eld Council on Bioethics, T he forensic use of bioinformation : ethical issues , London, Cambridge Publishers, 2007, 139 p.

UK Passport Service, Biometrics Enrolment Trial , May 2005, 299 p. X., 2b or not 2b . Evaluatierapport . Biometrieproef . 2b or not 2b , Ministerie van Binnenlandse

Zaken en Koninkrijksrelaties, 2005, 83 p., available at http://nl.scribd.com/doc/21646625/Evaluatierapport-2b-or-Not-2b

VI. Papers, policy documents and conference proceedings

A. Papers

Legal

Alhadeff, J., Van Alsenoy, B. and Dumortier, J., The accountability principle in data protection regulation : origin , development and future directions , paper presented at Privacy and Accountability 2011, international conference, PATS project in Berlin, April 5–6 2011, 27 p., also available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1933731

Ainsworth, R., ‘Biometrics: Solving the Regressivity of VATs and RSTs with ‘Smart Card’ Technology’, Boston Univ . School of Law Working Paper No.06–20, 2006, 82 p., available at http://www.bu.edu/law/faculty/scholarship/workingpapers/documents/AinsworthR080706.pdf

Albrecht, A., Bromba, M., Hornung, G., Laβmann, G. and Quiring-Kock, G., Orientierungshilfe für eine Betriebsvereinbarung beim Einsatz biometrischer Systeme. Arbeitsgruppe 6 “Biometrische Identifi kationsverfahren”AK “Rechtliche Aspekte der Biometrie ”, Teletrust, 21 September 2005, 17 p., available at http://www.teletrust.de/uploads/media/TTT-AG_Biometrie- Orientierungshilfe-Betriebsvereinbarung.pdf

Bousta, R., Controle Constitutionnel de proportionalité : La “ specifi cité ” française à l ’ épreuve des évo-lutions récentes , VIIIème congrès mondial de l’A.I.D.C. ‚La constitution et les principes’, Mexico, 6–10.12.2010, 21 p., available at http://www.juridicas.unam.mx/wccl/ponencias/9/159.pdf

Carozza, P., Subsidiarity as a structural principle of International human rights law , 42 p., available at http://www.scribd.com/doc/54548130/SUBSIDIARITY-AS-A-STRUCTURAL-PRINCIPLE-OF-INTERNATIONAL-HUMAN- RIGHTS-LAW

Clarke, R., Biometrics and Privacy , 15 April 2001, available at http://www.rogerclarke.com/DV/Biometrics.html

De Hert, P., Biometrics : legal issues and implications . Background paper for the Institute of Prospective Technological Studies , DG JRC, 2005, Sevilla, European Commission, 39 p., available at http://cybersecurity.jrc.ec.europa.eu/docs/LIBE%20Biometrics%20March%2005/LegalImplications_Paul_de_Hert.pdf

Bibliography

Page 49: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

957

Grijpink, J., Criminal Records in the European Union, the challenge of large-scale information exchange , 2006, 15 p., available at http://www.uu.nl/staff/JHAMGrijpink

Grijpink, J., Understanding Biometrics , 15 p., available at http://www.uu.nl/staff/JHAMGrijpink Gutwirth, S., Short statement about the role of consent in the European data protection directive , 2011,

2 p., available at http://works.bepress.com/serge_gutwirth/80/ ICO, The ‘ Durant ’ Case and its impact on the interpretation of the Data Protection Act 1998 , 27

February 2006, 12 p., available at www.ico.gov.uk Kindt, E. and Dumortier, J., Summary of legal data protection requirements for the processing of

biometric data , European Biometrics Portal, September 2005, 35 p., previously available at http://www.europeanbiometrics.info/

Ohm, P., ‘Broken Promises of Privacy: Responding to the surprising failure of anonymization’, UCLA Law Review 2010, pp. 1701–1777.

Simitis, M., Les données sensible revistées , 1999, 11 p., available at http://www.coe.int/t/f/affaires_juridiques/coop%E9ration_juridique/protection_des_donn%E9es/documents/Rapports%20et%20%E9tudes%20des%20experts/1Report_Simitis_1999_fr.pdf

Technical

Adler, A., ‘Sample images can be independently restored from face recognition templates’, in Electrical and Computer Engineering 2003, IEEE CCECE 2003. Canadian Conference, pp. 1163–1166, also available at http://www.sce.carleton.ca/faculty/adler/publications/2003/adler-2003- ccece-restore-face-recognition-templates.pdf

Avoine, G., Kalach, K., and Quisquater, J.-J., Belgian Biometric Passport does not get a pass … Your personal data are in danger , June 2007, available at http://www.uclouvain.be/crypto/passport/index.html

Bromba, M., On the reconstruction of biometric raw data from template data , 2003 (fi rst release), 2006, available at http://www.bromba.com/knowhow/temppriv.htm

Bromba, M., See Bioidentifi kation . Fragen und Antworten , 44 p., last update 11.2.2011, available at www.bromba.com/faq/biofaqd.htm

Bush, C., Forschung für die Grenzkontrollen der Zukunft , 2009, Darmstadt, Hochschule Darmstadt, 2009, 12 p., available at https://www.fbi.h-da.de/fi leadmin/gruppen/FG-IT-Sicherheit/Publikationen/2009/h_da_querschnitt 090403.pdf

BWG, Biometric Security Concerns , 2003, 27 p., available at http://www.cesg.gov.uk/ publications/Pages/categorylist.aspx

Daugman, J., ‘ How Iris Recognition Works ’, IEEE Transactions on circuits and systems for video technology, 2004, pp. 21–30, also available at http://www.cl.cam.ac.uk/~jgd1000/csvt.pdf

Daugman, J., Biometric decision landscapes . Technical Report 482 , Cambridge, University of Cambridge Computer Laboratory, January 2000, 13 p., available at http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR482.pdf

Grother, P., Quinn, G. and Phillips, P., Multiple - Biometric Evaluation ( MBE ) – Report on the Evaluation of 2D Still - Image Face Recognition Algorithms , NIST Interagency Report 7709, 2010, 59 p., available at http://biometrics.nist.gov/cs_links/face/mbe/MBE_2D_face_report_NISTIR_7709.pdf

Hill, C., Risk of Masquerade Arising from the Storage of Biometrics , 2001, Australian National University, 116 p.

J. Philips et al., ‘An introduction to the Good, the Bad & the Ugly Face Recognition: Challenge Problem’, National Institute of Standards & Testing , 2011 , 8 p ., available at http://www.nist.gov/itl/iad/ig/upload/05771424.pdf

Juels, A., Molnar, D. and Wagner, D., Security and Privacy Issues in E - passports , September 2005, 14 p., available at http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1607561&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1607561

Kong, A., Zhang, D. and Kamel, M., ‘Three measures for secure palmprint identifi cation’, in Pattern Recognition 2008, pp. 1329–1337.

Bibliography

Page 50: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

958

Mansfi eld, A. and J. Wayman, Best Practices in Testing and Reporting Performance of Biometric Devices, August 2002, 32 p.

Matsumoto, T., Matsumoto H. and Yamada, K. et al., ‘ Impact of Artifi cial “ Gummy ” Fingers on Fingerprint Systems ’, 2002, 20 p., available at www.cryptome.org/gummy.htm

Mund, C., Biobanks – Data Sources without Limits ? 3 October 2005, 5 p., available at http://www.privacyconference2005.org/fi leadmin/PDF/mund_e.pdf

National Science and Technology Council, the National Biometrics Challenge , 2006, 19 p., avail-able at http://www.biometrics.gov/nstc/publications.aspx

Phillips, P., Scruggs, W., O’Toole, A., Flynn, P., Bowyer, K., Schott, C. and Sharpe, M., FRVT 2006 and ICE 2006 Large - Scale Results , 2007, 56 p., available at http://www.face-rec.org/vendors/frvt2006andice2006largescalereport.pdf

Ross, A., Shah, J. and Jain, A., ‘From template to Image: Reconstructing Fingerprints from Minutiae Points’, IEEE Transactions on Pattern Analysis and Machine Intelligence , Special Issue on Biometrics, 2007, pp. 544–560, also available at http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4107560&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4107560

Ross, A. and Jain, A., Hand geometry , published at the site of Michigan State University, Department of Computer Science and Engineering, available at http://www.cse.msu.edu/rgroups/biometrics/hand_geometry.html

Schneider, J., Ultrasonic Sensors for Capturing Lifescan of Fingerprint Biometrics , 13 p., avail-able at http://www.ultra-scan.com/Portals/16/Schneider%20%20Ultrasonic%20Fingerprint %20Sensors.pdf

Ethical – Other

Ashbourn, J., The Social Implications of the Wide Scale Implementation of Biometric and Related Technologies. Background paper for the Institute of Prospective Technological Studies, DG JRC – Sevilla, European Commission, January 2005, 21 p., available at http://www.statewatch.org/news/2005/apr/jrc-biometrics-julian-ashbourn.pdf

Clarke, R., Introduction to Dataveillance and Information Privacy , and Defi nitions of Terms , 1997, as revised, 12 p., available at http://www.rogerclarke.com/DV/Intro.html

Drulàkovà, R., Post - democracy within the EU : Internal security vs. human rights – unavoidable confl ict ?, Paper prepared for the Central and East European International Studies Association (CEEISA) 4 th Convention, Tartu, Estonia, 25–27 June 2006, 23 p.

Eschenburg, F., Bente, G., Troitzsch, H., Powierski, R. & Fischer, O., ‘The BioSec Mobile Usability Lab for Biometric Security Systems’, Third COST 275 Workshop . Biometrics on the Internet , 27–28.10.2005, University of Hertfordshire, United Kingdom, pp. 67–70.

Farelo, A., A history of Fingerprints , April 2009, Interpol, 11 p., available at http://www.inter-pol.int/Public/Forensic/fi ngerprints/History/BriefHistoricOutline.pdf

Gellman, R., Fair Information Practices : A Basic History , 3.10.2011, 14 p., available at http://bobgellman.com/rg-docs/rg-FIPShistory.pdf

Liberatore, A., Balancing Security and Democracy: the Politics of Biometric Identifi cation in the European Union , European University Institute, Working Paper RSCAS No. 2005/30, 2005, 29 p.

National Science and Technology Council (NSTC), Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics, Biometrics History , last updated 7 August 2006, 27 p., available at http://www.biometrics.gov/Documents/BioHistory.pdf

Symantec, Symantec Report on the Underground Economy . July 2007-June 2008, November 2008, 16 p., available at http://www.symantec.com/about/news/release/article.jsp?prid=20081123_01

B. Policy papers and documents

a . International – Europe

APEC, APEC Privacy Framework , 2005, 40 p., available at http://www.apec.org/Groups/Committee-on-Trade-andInvestment/~/media/Files/Groups/ECSG/05_ecsg_privacy framewk.ashx

Bibliography

Page 51: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

959

Biermann, H., Bromba, M., Busch, C., Hornung, G., Meints, M. and Quiring-Kock, G. (eds.) White Paper zum Datenschutz in der Biometrie , 2008, 30 p., available at http://www.teletrust.de/uploads/media/White_Paper_Datenschutz-in-der-Biometrie-080321.pdf

Cameron, K., Posch, R., Rannenberg, K., Proposal for a common identity framework: A user-Centric Identity Metasystem , v. 1.001, 19 August, 2008, 26 p.

Cavoukian, A., Chibba, M. and Stoianov, A., ‘Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment’, in Review of Policy Research , 2012, pp. 37–61.

Cavoukian, A. and Stoianov, A., ‘Biometric Encryption Chapter from the Encyclopedia of Biometrics, 14 p., also available at http://www.ipc.on.ca/images/Resources/bio-encrypt-chp.pdf

Clauss, S., Pfi tzmann, A., Hansen, M. and Van Herreweghen, E., Privacy - Enhancing Identity Management , IPTS report, September 2002, previously available at http://ipts.jrc.ec.europa.eu/home/report/english/articles/vo l67/IPT2E676.htm

Comments Standing Committee of experts in international immigration, refugee and criminal law on the draft proposal for a Regulation concerning the Visa Information System (VIS), COM(2004) 835, Utrecht, April 2005, 6 p.

Electronic Privacy Information Center, Comments of the Electronic Privacy Information Center to the Federal Trade Commission . Face Facts: A Forum on Facial Recognition , project number P115406, 31 Januari 2012, 24 p., available at http://epic.org/privacy/facerecognition/EPIC-Face- Facts-Comments.pdf

European Commission, Information Society and Media Directorate-General, eGovernment Unit, A Roadmap for a pan - European eIDM Framework by 2010 , v1.0, Block VIII., available at http://ec.europa.eu/information_society/activities/ict_psp/documents/eidm_roadmap_paper.pdf

European Group on Ethics in Science and New Technologies, Report on the Charter on Fundamental Rights related to technological innovation as requested by President Prodi on February 3, 2000 , 23 May 2000, 32 p.

European Privacy and Data Protection Commissioners, Declaration adopted on the Spring Conference of European Data Protection Authorities , Rome, 17–18 April 2008, available at https://www.ip-rs.si/index.php?id=272&tx_ttnews%5Btt_news%5D=367&cHash=47956ed169f8c49b72d2a7cbe042d9d4

European Privacy and Data Protection Commissioners, Declaration on leadership and the future of data protection in Europe , Edinburgh, 23–24 April 2009, 1 p.

Federal Trade Commission, Facing Facts . Best Practices for Common Uses of Facial Recognition Technologies , October 2012, 30 p., available at http://ftc.gov/os/2012/10/121022facialtechrpt.pdf

FIDIS, Budapest Declaration on Machine Readable Travel Documents ( MRTDs ), Frankfurt, FIDIS, 2006, 4 p., available at http://www.fi dis.net/fi leadmin/fi dis/press/budapest_declara-tion_on_MRTD.en.20061106.pdf

Liberty Alliance Project, White paper : Personal Identity , 23 March 2006, previously available at http://www.projectliberty.org/liberty/content/view/full/340/(offset)/30

Myhr, Th., Regulating a European eID . A preliminary study on a regulatory framework for entity authentication and a pan European ID , 2005, 39 p., available at http://porvoo10.net/p10/Thomas_Myhr_report.pdf

National Institute of Standards and Technology, ‘Biometric Testing Program’, National Voluntary Laboratory Accreditation Program , updated 23.12.2008, available at http://ts.nist.gov/ standards/scopes/programs.htm

Offi ce of the Privacy Commissioner, Approval of the Biometrics Institute Privacy Code , Australia, 19 July 2006, 24 p., also available at www.Biometricsinstitute.org

Prime, Prime White paper v . 3 . 0 , 2008, 22 p., available at https://www.prime-project.eu/prime_products/whitepaper/index_html

The Public Voice, The Madrid Privacy Declaration , Madrid, Spain, 3.11.2009, available at www.thepublicvoice.org/madrid-declaration

X., Analysis and Impact Study on the implementation of Directive EC 95 / 46 in Member States , 68 p., available at http://www.statewatch.org/news/2006/oct/com-implentation-1995-dir-techn.pdf

Bibliography

Page 52: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

960

b . National

FBI, State - of - the - Art Biometric Excellence Roadmap ( SABER ) Report , 24.11.2008, available at http://www.biometriccoe.gov/SABER/index.htm

Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, 1973, available at http://epic.org/privacy/hew1973report/

US Defense Science Board Task, Report on Defense Biometrics , March 2007. CNIL, the Panthéon-Assas-Paris II University and the French Senate, Informatique : servitude ou

libertés ?, Report, Colloquium, 7–8 November 2005, 134 p., available at http://www.senat.fr/colloques/colloque_cnil_senat/colloque_cnil_senat.html

Comité Consultatif National d’Etique pour les Sciences de la Vie et de la Santé, Avis n ° 98 . « Biométrie , données identifi antes et droits de l ’ homme », 28 p., available at http://www.liberty-security.org/IMG/pdf_avis098fr.pdf

Sun Microsystems, Positioning Federated Identity for the UK Government – Whitepaper , 21 February 2005, 12 p., available at http://uk.sun.com/specials/entireid/pdf/fedid4govn_ wp_feb05.pdf .

C. Conference proceedings

Bing, J., ‘Classifi cation of personal information, with respect to the sensitivity aspect’, in Data Banks and Society , Proceedings of the First International Oslo Symposium on Data Banks and Society , Oslo, Scandinavian University Books, 1972, pp. 98–150.

Boult, T. E., Scheirer, W. J., Woodworth, R., ‘Revocable Fingerprint Biotokens: Accuracy and Security Analysis’, in Computer Vision and Pattern Recognition, 2007. CVPR ′07. IEEE Conference, 17–22 June 2007.

Bourlai, T., Ross, A. and Jain, A., ‘On Matching Digital Face Images Against Scanned Passport Photos’, in Proc . of First IEEE Intern . Conf . on Biometrics , Identity and Security , September 2009, 10 p., also available at http://www.cse.msu.edu/rgroups/biometrics/Publications/Face/BourlaiRossJain_BIDS2009.pdf

Bowyer, K., ‘Face Recognition Technology: Security versus Privacy’, in IEEE Technology and Society Magazine , 2004, pp. 9–20.

Breebaart, J., Bush, C., Grave, J. and Kindt, E., ‘A reference architecture for biometric template pro-tection based on pseudo identities’, in A. Brömme (ed.), Proceedings of the Special Interest Group on Biometrics and Electronic Signatures , Bonn, Gesellschaft für Informatik, 2008, pp. 25–37.

Bringer, J., Chabanne, H., Kevenaar, T. and Kindarji, B., ‘Extending match-on-card to local bio-metric identifi cation’, in Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A. and Faundez- Zanuy M. (eds.), BioID _ MultiComm ’ 09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication , pp. 178–186.

Bringer, J., Chabanne, H. and Simoens, K., Blackbox Security of Biometrics , 4 p., paper presented at International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE Press, Darmstadt, Germany, October 15–17, 2010.

Clauss, S., Kesdogan, D. and Kölsch, T., Privacy Enhancing Identity Management : Protection against Re - identifi cation and Profi ling , Proceedings of the 2005 workshop on Digital Identity Management (DIM’05), pp. 84–93.

Coudert F. and Dumortier, J., ‘Intelligent video surveillance networks: data protection challenges’, in Proceedings of the third international conference on availability , reliability and security , IEEE Computer society , 2008, pp. 975–981.

De Hert, P. and Gutwirth, S., Who is in control of our data ? The role of academics in a changing world where privacy matters , The European Data Protection Day, Brussels, 2010, pp. 14–15, previously available at http://www.vub.ac.be/LSTS/cgi-bin/pub-search.cgi

Fischer, S., Duquenoy, P., Hansen, M. and Leenes, R. (eds.), Privacy and Identity Management for Life , Proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6, PrimeLife International Summer School, Springer, 2011, 353 p.

Bibliography

Page 53: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

961

Hornung, G., ‘The European Regulation on Biometric Passports: Legislative Procedures, Political Interactions, Legal Framework and Technical Safeguards’, SCRIPTed 2007 , (246), p. 250, avail-able at http://www.law.ed.ac.uk/ahrc/script-ed/vol4-3/hornung.asp

Hugenholtz, P., The New Database Right : Early Case Law from Europe , paper presented at Ninth Annual Conference on International IP Law & Policy, Fordham University School of Law, New York, 19–20 April 2001, available at http://www.ivir.nl/medewerkers/hugenholtz.html

Jain, A. and Ross, A., ‘A Prototype Hand Geometry-based Verifi cation System’, in X., Proceedings of 2 nd Int ’ l Conference on Audio - and Video - based Biometric Person Authentication ( AVBPA ), Washington D.C., 1999, pp. 166–171, also available at http://www.csee.wvu.edu/~ross/pubs/RossHand_AVBPA99.pdf

Matey, J., Naroditsky, O., Hanna, K., Kolczynski, R., LoIacono, D., Mangru, S., Tinker, M., Zappia, T. and Zhao, W., Iris on the Move : Acquisition of Images for Iris Recognition in Less Constrained Environments , in Proceedings of the IEEE, 2006, pp. 1936–1947, available at http://ieeexplore.ieee.org/Xplore/login. jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F5%2F4052463%2F04052478.pdf&authDecision=-203

Lu, S. and Jain, A., ‘Ethnicity identifi cation from face images’ in Proceedings SPIE Defense and Security Symposium , Orlando, April 2004, 10 p., available at http://www.cse.msu.edu/biometrics/Publications/Face/LuJain_EthnicityFace_SPIE04.pdf

Mc Cullagh, K., Data Sensitivity: resolving the conundrum, BILETA , 2007 Annual Conference , 16–17.4.2001, 15 p., available at http://works.bepress.com/karen_mccullagh/10/

Middleton, L, Wagg, D., Bazin, A., Carter, J. and Nixon, M., A smart environment for biometric capture, in IEEE Conference on Automation Science and Engineering 2010, Shanghai, China, 6 p., available at http://eprints.ecs.soton.ac.uk/12914/

Park, U., Tong, Y. and Jain, A., ‘Face Recognition with Temporal Invariance: a 3D Aging Model’, IEEE Transactions on Pattern Analysis and Machine Intelligence 2010, pp. 947–954.

Pfi tzmann, A., ‘Biometrics – How to put to use and How Not at All’, in Furnell, S., Katsikas, S. and Lioy, A. (eds.), TrustBus 2008, LNCS, pp. 1–7.

Qiu, X., S. Sun and T. Tan, ‘Global Texture Analysis of Iris Images for Ethnic Classifi cation’, in D. Zhang and A. Jain (Eds.), Advances in biometrics : international conference , Hong Kong, ICB, 2006, pp. 411–418.

Rigoutsos, I., Huynh, T., Miranda, K., Tsirigos, A., McHardy, A., Platt, D., ‘Short Blocks from the noncoding parts of the human genome have instances within nearly all known genes and relate to biological processes’, Proceedings of the National Academy of Science of the United States , 2006, Washington, pp. 6605–6610.

Ross, A., Shah, J. and Jain, A., ‘From template to Image: Reconstructing Fingerprints from Minutiae Points’, IEEE Transactions on Pattern Analysis and Machine Intelligence , Special Issue on Biometrics , 2007, pp. 544–560, also available at http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4107560&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4107560

Simoens, K., Chang, Ch. and Preneel, B., ‘Reversing Protected Minutiae Vicinities’, IEEE Fourth International Conference on Biometrics : Theory , Applications and Systems ( BTAS ) 2010, pp. 1–8.

Simoens, K., Tuyls, P. and Preneel, B., ‘Privacy Weaknesses in Biometric Sketches’, in Proceedings of the 2009 IEEE Symposium on Security and Privacy , 2009, IEEE Computer Society, pp. 188–203, also available at https://www.cosic.esat.kuleuven.be/privacyGroup/person.php?persid=200

Turn, R., ‘Classifi cation of personal information for privacy protection purposes’, in AFIPS ’ 76 Proceedings of the June 7 – 10 , 1976 National Computer Conference and Exposition , New York, ACM, 1976, pp. 301–307, available at http://portal.acm.org/citation.cfm?id=1499799&picked=prox&CFID=8583698&CFTOKEN =72455603

Yang, B., Hartung, D., Simoens, K. and Bush, Ch., ‘Dynamic random projection for biometric template protection’, presentation and paper at IEEE Fourth International Conference On Biometrics : Theory , Applications and Systems (‘ BTAS ’) 2010 , Washington, U.S.A., 27–29.09.2010, 7 p., available at IEEEXplore Digital Library

Bibliography

Page 54: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

962

VII. Miscellaneous

Trend reports

International Biometric Group, Biometrics Market and Industry Report 2009 – 2014 , 2008, 229 p. Frost & Sullivan, Biometrics in Europe – Future Technologies and Applications , 2009, available at

http://www.frost.com/prod/servlet/segment-toc.pag?segid=9834-00-04-00-00

Speeches

Bygrave, L., The body as data ? Refl ections on the relationship of data privacy law with the human body , 3 p., edited text of speech given at Federation Square, Melbourne, 8 September 2003, also available at https://www.privacy.vic.gov.au/privacy/web2.nsf/fi les/body-as-data-confer-ence-2003-lee-bygrave-presentation/$fi le/conference_03_no2.pdf

Grijpink, J., Our emerging information society . The challenge of large - scale information exchange in the constitutional state , inaugural address, 19 January 2005, 24 p., available at http://keteninformatisering.nl/2005%20inaugural%20address%20chain-computerisation%20in%20the%20constitutional%20state.pdf

(The speeches of the EDPS are available at the website of the EDPS : www.edps.eu )

Hustinx, P., Establishment of ‘ Eurodac ’ for the comparison of fi ngerprints ( recast version ), speech for Committee on Civil Liberties, Justice and Home Affairs (LIBE), European Parliament, Brussels, 11 October 2012

Hustinx, P., Recent developments in EU data protection : stepping up to more comprehensive and more effective protection , speech at the RISE conference ‘Ethics and Governance of Biometrics and Identifi cation Technologies, Brussels, 9 December 2010.

Hustinx, P., The European Approach : Regulation through Protection Authorities , 8 November 2005, Speech at the Colloquium “Information technologies: Servitude or Liberty ?”, Palais du Luxembourg, Paris, 8.11.2005, available at https://secure.edps.europa.eu/EDPSWEB/edps/cache/off/EDPS/Publications/SpeechArticle/pid/102

Presentations (selection only)

Brömme, A., A Discussion on Privacy Needs and ( Mis ) Use of Biometric IT - Systems , presentation, June 2001, available at http://www.cs.kau.se/~simone/ifi p-wg-9.6/scits2/arslan.pdf

Busch, Ch., ISO / IEC Standard 24745 – Biometric Information Protection , BTP Workshop, Paris, 13.7.2012, available at http://www.christoph-busch.de/fi les/Busch-EAB-ISO-24745-120713.pdf

Clarke, R., ‘ Biometrics ’ Inadequacies and Threats , and the Need for Regulation ’, Presentation on the Computers, Freedom & Privacy 2002, available at http://www.anu.edu.au/people/Roger.Clarke/DV/BiomThreats.html

Jain, A. (with A. Nagar & K. Nandakumar), Adapting Biometrics Representations for Cryptosystems , 17.01.2011, presentation at public Turbine workshop, available at http://www.turbine-project.eu/workshop_presentations.php

Meints, M., Privacy and Security Challenges in Deploying Biometrics in the EU . A Data Protection Commission ’ s Perspective , 2008, Unabhängiges Landeszentrum für Datenschutz Schleswig- Holstein, Biometrics Symposium, Tampa, Florida, U.S.A., 48 slides.

Zhou, Y. and Kumar, A., ‘Contactless palm vein identifi cation using multiple representations’, 6 p., presentation and paper at IEEE Fourth International Conference On Biometrics : Theory , Applications and Systems (‘ BTAS ’) 2010 , Washington, U.S.A., 27–29.09.2010, 6 p., available at IEEEXplore Digital Library

Website publications and press releases (selection only)

APEC Electronic Commerce Steering Group, APEC Privacy Framework , available at http://www.apec.org/apec/news___media/fact_sheets/apec_privacy_framework.html

Bibliography

Page 55: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

963

Belgian Privacy Commission, Privacycommissie schetst kader voor verwerking van biometrische gegevens , 6 June 2008, available on http://www.privacycommission.be/nl/press_room/pers_bericht6.html

BWG, Biometric System Security Evaluation and Certifi cation – MS09 , available at http://www.cesg.gov.uk/policyguidance/biometrics/Pages/MS09-Certifi cation.aspx

CNIL, Un peu d ’ histoire , available at http://www.cnil.fr/vos-droits/histoire/ Der Hamburgische Beauftragte für Datenschutz und Informationsfreiheit,

Gesichtserkennungsfunktion von Facebook verstösst gegen europäisches und deutsches Datanschutzrecht. Löschung biometrischer Daten bei Facebook gefordert, 2.8.2011, available at http://www.datenschutz-hamburg.de/news/detail/article/gesichtserkennungsfunktion-von-facebook-verstoesst-gegen-europaeisches-und-deutsches-datenschutzrech.html?tx_ttnews%5BbackPid%5D=170&cHash=b9607e92ef91d779f308acd01b7dd639

European Commission, JHA, Your views on the future EU Visa Information System ( VIS ), available at http://ec.europa.eu/justice_home/news/consulting_public/news_consulting_vis_en.htm

EuroPriSe, EuroPriSe Criteria , v.1.0, available at https://www.european-privacy-seal.eu/criteria Federal Government Services Economy (Belgium), Adolphe Quetelet ( 1796 – 1874 ), available (in

Dutch) at http://www.statbel.fgov.be/info/quetelet_nl.asp International Biometric Group (IBG), Biometric Performance Certifi cation Program Established ,

18.11.2005, available at http://www.biometricgroup.com/press_releases/pr_2005_biometric_ performance_certifi cation.html

International Biometric Group (IBG), Biometrics at the Super Bowl : A BioPrivacy Assessment , datum ? available at http://www.bioprivacy.org/bioprivacy_main.htm

International Biometric Group (IBG), The BioPrivacy Application Impact Framework , available at http://www.bioprivacy.org/bioprivacy_main.htm

UK BWG, Use of Biometrics for Identifi cation and Authentication. Advice on Product Selection. Issue 2.0, 22 March 2002, 36 p.

UK Information Commissioner, The ‘ Durant ’ Case and its impact on the interpretation of the Data Protection Act 1998 , 27 February 2006, available at http://www.nhsgrampian.org/grampianfoi/fi les/DurantCase.pdf

Weir, B., Are DNA Profi les Unique ? 4 p., available at http://bioforensics.com/conference/Identity/weirindid.pdf

Editorials

Kaspersen, R., ‘Lange vingers’, Computerrecht 2008. Kindt, E ., ‘Nieuwe Identifi catietechnologieën, Persoonsgegevens en Privacy: dé uitdaging van de

21ste eeuw’, Jubileum-editorial, Computerrecht 2009, p. 109. Kindt, E., ‘Biometrie ? Hoog tijd voor een debat’, Computerrecht 2006, p. 80.

Terminology

Clarke, R., Terminology Relevant to ‘ Identity in the Information Society ’, p. 2, August 2008, avail-able at http://www.anu.edu.au/people/Roger.Clarke/DV/IdTerm.html

Pfi tzmann A. and Hansen, M., Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology (Version v0.31 Febr. 15, 2008), 83 p., available at http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.31.pdf

Dirix, E., Tilleman, B. and Van Orshove, P., De Valks Juridisch Woordenboek , Antwerpen, Intersentia, 2010, 621 p.

Triplett, M., Michele Triplett ’ s Fingerprint Terms . A collection of over 900 terms used in the Science of Fingerprint Identifi cation , 20 December 2008, available at http://www.fprints.nwlean.net/index.htm

Testimonies

Lynch, J., Written testimony, Senate Committee on the Judiciary, What Facial Recognition Technology Means for Privacy and Civil Liberties , 18.7.2012, 24 p.

Bibliography

Page 56: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

965

A Access control

for laptops , 120, 539 logical , 81 physical , 81

Accountability (Principle of) , 748–750, 906 Accuracy , 29, 38, 39, 48, 52, 54, 55, 57, 60,

68, 79, 85, 162, 172, 185, 270, 309, 317, 336, 363, 365–367, 393, 420, 452, 463, 485, 486, 580, 650, 665, 689–692, 702, 739, 749, 753, 762–764, 791, 800, 805, 818, 837, 841, 842, 848, 869, 888, 889, 895, 904, 907

Administrative use , 65, 81, 290, 309, 396, 405, 406, 475, 482, 590, 614, 702–703, 709, 796

AFIS. See Automated fi ngerprint identifi cation system (AFIS)

Alternative system , 502, 580, 704, 706, 707, 711, 838

Anonymity , 5, 115, 116, 123, 181, 186, 187, 242, 278–296, 300, 303, 396, 425, 489, 505, 506, 597, 675–689, 717, 768, 772, 774, 783, 794, 810, 811, 841, 857, 864, 866, 872

semi-anonymous , 187, 354, 453, 679, 681, 689, 859–860

APEC privacy principles , 88, 94 Article 29 Working Party

Opinion 2/2012 , 96, 102, 104, 118, 164, 350, 351, 717, 719, 720, 794

Opinion 3/2012 , 23, 35, 36, 96–105, 118, 144, 153, 333, 584, 670, 717, 777, 794, 797, 805, 880

Working Document on Biometrics 2003 , 23, 96, 97, 100, 116, 140, 143, 144,

188, 275, 313, 323, 330, 338, 350, 419, 421, 427, 653, 654, 664, 675, 709, 798, 814, 824

Australia , 9, 61, 80, 94, 143, 155, 178, 205, 761 biometrics institute , 61, 155, 761, 762

Authentication. See Identifi cation; Verifi cation Authorization , 2, 40, 41, 81, 115, 125, 136, 138,

176, 206, 291, 302, 303, 352, 359, 445, 458, 464, 476, 516, 518–520, 523, 524, 526–545, 547–459, 569, 577, 581, 582, 584, 585, 587–590, 592, 607–609, 611, 612, 617, 623, 644, 664, 665, 685, 698, 699, 702, 703, 712, 714, 723, 728, 732, 735, 750, 751, 757, 768, 780–782, 787, 790, 799, 814, 816, 821, 825, 827, 834, 846, 859, 865, 877, 879, 883, 891, 892, 898, 905

Unique Authorization(s) (France) , 458, 519, 527, 588–589, 780, 898

Automated fi ngerprint identifi cation system (AFIS) , 66, 74, 78, 119, 199, 211, 277, 282, 318, 319, 362, 586, 624

Availability (Principle of) , 74, 383, 630, 639–642, 695, 787, 862

B Balancing , 11, 258, 274, 287, 358, 418, 449,

450, 454, 467, 477–480, 483, 488, 491, 497, 503, 601, 602, 606, 608, 612, 614, 618–619, 621, 630–743. See also Proportionality principle

of interests , 249, 305, 404, 418, 439, 449, 450, 456, 466, 467, 496, 497, 503–505, 509, 514, 565, 566, 586, 602, 614–619, 635

Index

E.J. Kindt, Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis, Law, Governance and Technology Series 12,DOI 10.1007/978-94-007-7522-0, © Springer Science+Business Media Dordrecht 2013

Page 57: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

966

Banking applications , 713–715 Behavioural advertising , 349, 661 Belgium , 8, 11, 66, 73, 80, 82, 89, 100,

126–139, 157, 158, 160, 173, 178, 186, 189, 190, 192–195, 197–199, 206, 208, 209, 211–213, 219–221, 234, 238, 240, 244, 248, 250, 253, 254, 257, 259–262, 271, 278, 280–282, 286, 288–294, 299–301, 308–311, 319, 320, 322, 328–330, 338, 344, 356, 378, 379, 382–384, 394, 396, 405, 407, 409, 416, 419, 421, 424, 425, 429, 431–435, 437–439, 441, 445, 450, 452, 457–459, 461, 463, 465, 469, 470, 475, 476, 478, 481, 500–517, 544, 565, 576, 577, 580, 584, 588, 590, 593, 600, 616, 627, 635, 664, 677, 678, 680, 684, 694, 695, 697, 698, 704, 708, 709, 711, 722, 726, 727, 736, 742, 743, 751, 756, 760, 771, 783, 788, 790, 799, 808, 823–828, 834, 844, 856, 862, 874, 891, 892, 898, 901, 902, 905

Best available techniques , 766–779, 791, 805, 858, 859, 906

Biological material blood , 166, 179, 184, 189–190, 268, 271 human cells , 107, 164, 174, 185–189,

213–216, 632 human tissues , 107, 166, 179–190, 202,

271, 326 saliva , 166, 169, 179, 185, 189–190

Biometric characteristics , 1, 15, 94, 277, 419, 579, 644, 747, 831 . See also Biometric data

Biometric data artifi cial , 340–343, 369, 647, 876 characteristics , 276–278 defi nition , 19, 24, 36, 89, 144–155, 161,

164, 165, 171, 174, 185, 187, 268, 270, 305, 717, 831, 837, 899

format , 118, 138, 140, 581 health , 2, 94, 108, 124, 133, 137, 319–335,

352, 400, 490, 552, 844–847, 891, 899

protected templates , 83, 104, 118, 143, 333, 334, 339, 398, 453, 508, 512, 572, 582, 622, 686, 687, 692, 702, 706, 707, 710, 714, 716, 725, 769, 791, 797, 801–805, 812, 815, 846, 850–853, 855–859, 868, 875, 886, 887, 894

reference , 37, 40, 41, 46, 360, 366, 371, 419, 648, 803

risks , 3, 143, 323, 359, 361, 362, 380, 398

samples , 22, 43, 45, 46, 98, 101, 107,129, 131–133, 140, 144, 145, 153, 169, 174, 185, 270, 276, 297, 312, 315, 319, 322, 327, 332–335, 348, 354, 359, 369, 384, 391, 398, 421, 454, 638, 646, 647, 674, 685, 686, 769, 794–797, 803, 806, 846, 852, 855–860, 865, 868,899, 903

template , 4, 31, 44, 98, 101, 117, 118, 123, 133, 145, 155, 171, 270, 276, 312, 319, 333–335, 348, 368, 371, 421, 533, 659, 795, 797–799, 801, 803–805, 814, 815, 875

Biometrics. See Biometric characteristics; Biometric data; Biometric systems

Biometric, soft , 35, 146, 147, 351, 624, 657, 831, 848

Biometric systems comparison , 29, 33, 34, 38, 43, 49, 52,

56, 108, 145, 152, 171, 315, 451, 461, 512, 552, 553, 671, 806, 807, 833, 884

enrolment , 19, 37, 41, 43–49, 59, 62–64, 85, 99, 102, 140, 142, 162, 372–375, 531, 536, 597

functionalities , 20, 22, 36–63, 152, 269, 354, 505, 511, 516, 536, 546, 649, 651, 763, 765

hill climbing , 371, 372, 513, 815, 886 multimodality , 62–63, 355, 369, 657, 804 performance , 34, 35, 48, 50, 52–56, 60–62,

321, 818, 868 risks , 4, 9, 20, 34, 35, 50, 107, 126,

152, 160, 204, 228, 240, 275, 306, 312–316, 349, 355, 357, 379, 399, 404, 442, 454, 563, 588, 595, 644, 646, 652, 715, 760, 776, 807, 812, 815, 830, 870, 880, 886, 896, 902, 903

spoofi ng , 336, 342, 369, 815 Biometric Working Group (BWG) , 81–82,

764, 808, 814, 815 BioPrivacy™ Initiative , 760, 761, 794 BioVision , 6, 60, 62, 88, 709, 769, 776, 794,

814, 824 Body scanners , 720, 740–741, 769, 777, 778,

826, 869, 883

Index

Page 58: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

967

C Camera

legislation , 480, 590–591, 705, 842 surveillance , 114, 156–159, 252, 268, 278,

282, 284–286, 288, 300, 303, 342, 367, 407, 427, 429, 441, 452, 458, 478, 485, 514, 544, 576, 590–591, 620, 632, 636, 698, 704, 705, 708, 711, 783, 788, 789, 823, 824, 837, 842, 846, 876, 895, 896

Canada , 9, 57, 80, 94, 149, 150, 155, 243, 289, 308, 348, 380, 384, 468, 582, 636, 659, 768, 769, 782, 787, 827, 843, 851, 857

Information and Privacy Commissioner of Ontario , 57, 348, 380, 768, 775, 787, 811

Card , 2, 21, 90, 278, 485, 580, 637, 745, 833 token , 40, 45, 90, 95, 101, 122, 360, 521,

524, 531, 648, 664, 672, 687, 802, 851, 865, 876

Certifi cation , 178, 189, 219, 341, 370, 524, 555, 643, 646, 683, 759, 763–766, 793, 808, 812, 819–821, 851, 865, 866, 870, 875, 883, 885–887, 893, 897

Children , 16, 68, 131, 260, 326, 328, 366, 389, 391, 394, 430, 482, 485, 505, 508, 546, 637, 676, 691, 706, 709–711, 729, 734, 741, 753, 759, 786, 870, 882

CNIL. See Commission nationale de l’informatique et des libertés (CNIL) (France)

Codes of conduct , 759–763, 766, 835 College Bescherming persoonsgegevens

(CBP) (the Netherlands) , 134–136, 156, 157, 159, 285, 550–564, 579, 583, 589, 594, 597, 611, 621, 664, 722, 723, 739, 767, 768, 771, 781, 875. See also Data Protection Authorities (DPAs)

Commissie voor de Bescherming van de Persoonlijke Levenssfeer (CBPL) (Belgium) , 100, 295, 407, 576, 656, 771, 838 . See also Data Protection Authorities (DPAs)

Commission nationale de l’informatique et des libertés (CNIL) (France) , 17, 137, 286, 422, 574, 651, 745, 853 . See also Data Protection Authorities (DPAs)

Common Criteria. See Standardization

Comparison. See also Biometric systems scores , 105, 106, 109, 150, 174, 334, 370,

372, 815 Consent , 125, 281, 418, 575, 631, 748, 832.

See also Face Recognition Constitutional Court , 80, 192, 259–261, 262,

265, 266, 291, 299, 310, 337, 351, 405, 407, 416, 417, 443, 458, 461, 473, 475, 481, 485, 490, 492, 600, 608, 633, 657, 661, 662, 670, 691, 735, 756, 829, 832, 873

Constitutional rights. See Human rights Consultation , 69, 70, 114, 131, 162, 182, 226,

227, 348, 386, 447, 519, 521–526, 528, 543, 544, 592, 607–609, 611, 612, 614, 621, 697, 703, 762, 774, 780, 782, 785, 786, 822, 824, 828, 841, 853. See also Authorization

prior consultation DPA , 608, 609, 612, 621 Consumers , 25, 31, 33, 150, 163, 295, 351,

353, 446, 503, 659, 720, 761, 835, 854, 859, 879

Control , 1, 19, 104, 278, 405, 577, 638, 745, 835

of the data subject , 104, 118, 122, 353–363, 521, 531, 535, 539, 548, 559, 598, 622, 650, 653, 662, 664–667, 670–672, 674, 687, 701, 715, 729, 778, 780, 802, 807, 818, 849, 851, 853, 860, 863–866, 896, 903

Controller , 9, 25, 87, 277, 418, 575, 631, 745, 833

Council of Europe Council of Europe Convention (1980) ,

90–92, 94, 199, 288, 382 recommendations , 90, 95, 160, 180,

181, 201, 209, 421, 494, 680, 681, 697, 845

D Dactyloscopy , 16–18, 198, 199, 304 Data

genetic , 6, 125, 138, 173, 183, 184, 201–208, 212, 213, 268, 351, 400, 433, 518, 643, 644, 651, 727, 747, 763, 786, 845, 849, 864, 899

minimization , 118, 187, 294, 424, 425, 505, 581, 646, 685, 687, 742, 770, 773, 774, 798, 802, 829, 855, 860, 872

personal , 2, 69, 87, 279, 407, 570, 640, 747, 832

storage , 202, 205, 371, 666, 817

Index

Page 59: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

968

Databases central , 38, 67, 69–71, 74, 90, 112, 262,

291, 302, 304, 314, 345, 353–362, 375, 378, 388, 397, 400, 454, 486, 509, 517, 520, 522–525, 540, 548, 556, 557, 559–561, 578, 595, 620, 648, 649, 651, 659, 664, 668, 669, 674, 705, 707–709, 712, 716, 725, 731, 735–737, 739, 742, 769, 787, 788, 793, 802, 816–818, 835, 848–854, 861, 864, 866, 880, 883, 900, 901, 904

distributed , 668, 816, 849 local , 360, 650, 668, 669, 849

Data protection authorities , 2, 10, 11, 75, 96, 103, 134,

163, 218, 268, 404, 485, 549, 550, 600, 601, 664, 751, 775, 809, 899

impact assessment , 612, 614, 621, 623, 626, 634, 643, 742, 782, 786, 905, 906

Right to , 191, 227, 231, 233–238, 251, 264, 265, 450, 488, 499, 579, 603, 659

Data Protection Authorities (DPAs) , 2, 93, 286, 404, 569, 632, 747, 834

Data Protection Directive 95/46/EC , 87, 104, 226, 235, 320, 361, 376, 445, 446, 571, 668, 683, 748, 749, 782, 785, 789, 821, 835, 864

Data subject right to appeal , 707, 716, 871, 883–885 right to information , 205

DEC. See Duplicate enrolment check (DEC) Deletion , 217–219, 257, 271, 400, 427, 529,

532, 534, 536, 542, 560, 618, 751, 763, 768, 769, 778, 794–796, 813, 818, 843, 857–858, 861, 870, 882, 883, 886, 888, 892, 905

Democratic society , 245, 279, 300, 305, 352, 384, 405, 407, 417, 433, 443, 453–455, 460, 465, 471, 472, 475, 477, 479–491, 498, 509, 566, 571, 594, 599, 604, 606, 615, 620, 624, 626, 631, 679, 693, 708, 724, 739, 745, 756, 826, 848, 852, 902, 903

democratic control , 608, 610, 626 Dignity , 178–181, 230, 231, 234, 243, 250,

251, 260, 263–265, 285, 389, 393, 430, 504, 514, 542, 574, 605, 693, 832, 837, 838, 847–848, 857, 864, 869, 871, 881

Directive 95/46/EC household activities , 118–123, 224, 268,

270, 556, 562, 717, 718, 729–730, 834, 835, 906

scope , 89, 101, 117–123, 156, 181–183, 186, 190, 224, 226, 268, 551, 555, 556, 562, 573, 642, 724, 729

Discrimination , 64, 130, 132, 180, 202, 205, 207, 212, 222, 271, 352, 363, 374, 375, 381, 394, 395, 407, 410, 429, 430, 482, 502, 599, 706, 747, 838, 846, 847

Disorder , 195, 222, 245, 324, 326, 327, 381, 455, 465, 473–475, 478, 575, 578, 591, 593, 594, 616–618, 701, 707, 722, 788, 890, 900, 905

DNA Act (Belgium) , 211–220, 223, 284, 632,

766, 834, 874, 885, 892 analysis , 6, 73, 165, 166, 171, 173, 181,

188, 190, 199–224, 321, 494, 632, 839, 840, 845, 885

databases , 74, 170, 171, 199, 208, 209, 211–220, 241, 321, 380, 827

regulation , 899 Dublin Convention , 66, 67, 112, 386 Duplicate enrolment check (DEC) , 37, 59

E ECHR. See European Convention for Human

Rights (ECHR) ECJ. See European Court of Justice (ECJ) ECtHR. See European Court of Human Rights

(ECtHR) EDPS. See European Data Protection

Supervisor (EDPS) Effi ciency , 84, 115, 270, 290, 309, 316,

365, 367, 390, 436, 446, 452, 483–486, 559, 635, 689–691, 774, 791, 869, 904

Electronic Identity card (eID) , 76, 114, 263, 289–291, 294, 295, 301, 302, 310, 328, 485, 490, 518, 544, 558, 586, 648, 674, 678, 691, 722, 733, 735, 737, 745, 862, 873, 893

Electronic passports (ePassports) , 43, 55, 60, 68, 69, 77, 78, 82, 84, 96, 102, 113, 133, 144, 161, 197, 256, 263, 275, 291, 297, 302, 304, 311, 314, 315, 318, 346, 356, 360–362, 365, 371, 373, 378, 379, 388, 389, 394, 399, 400, 423, 474, 482, 486, 490, 513, 518, 520, 544, 550, 558, 559, 567, 586–588, 637, 647, 668, 674, 691, 695, 696, 715, 716, 731–739, 752, 753, 787, 808, 813, 817, 822, 824, 826, 830, 878, 882, 883, 899

Emotion-sensing technology , 32

Index

Page 60: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

969

Employment employees , 40, 308, 329, 467, 514, 542,

696, 698, 791 employers , 514, 696

Encryption , 44, 50, 51, 57, 101, 103, 104, 118, 355, 372, 513, 523, 536, 537, 555, 558, 562, 563, 583, 597, 611, 635, 637, 689, 692, 732, 733, 752, 771, 776, 793, 795, 798, 800, 802, 805, 807, 810–812, 816, 827, 857, 865, 873–875, 886

Entry-Exit , 75–78, 96, 715 Errors

equal error rate , 52, 53, 363, 691 error rate , 33, 34, 38, 50–54, 56–59, 61,

62, 84, 199, 355, 363, 365–367, 372, 420, 451, 484, 504, 510, 511, 534, 546, 580, 585, 587, 595, 634, 636, 651, 655, 691, 693, 710, 713, 791, 818–820, 842, 849, 867–869, 881, 886, 888–890

false accept , 39, 49, 62, 363, 364, 366, 367, 395, 726

false reject , 20, 39, 49, 62, 363, 366, 367, 373, 377, 395, 419, 420, 452, 554, 691, 762, 884

threshold , 52, 53, 55, 867, 869, 889 Ethics , 163, 183, 205, 210, 228, 238, 328,

359, 388, 389, 573, 659, 739, 751, 768, 782

EU Charter Article 7 , 3, 6, 7, 11, 191, 224, 227, 230,

236, 239, 258–260, 401, 417, 422, 424, 431, 442, 447, 453, 487, 495, 498, 499, 572, 602, 619, 624

Article 8 , 3, 6, 7, 11, 191, 224, 227, 230, 236, 237, 259, 401, 417, 422, 424, 431, 487, 495, 498, 572, 619, 897, 900, 902, 904, 905, 906

Article 52 , 3, 6, 7, 11, 129, 231–234, 259, 401, 417, 424, 453, 457, 495–499, 565, 566, 570–572, 574, 578, 591, 594, 599, 603, 604, 619, 631, 634, 635, 639, 644, 648, 702–704, 711, 715, 716, 739, 787, 792, 851, 852, 880, 897, 900, 904, 905

EURODAC , 1, 66–67, 76, 77, 84, 112, 113, 199, 288, 314–317, 319, 354, 383, 386–388, 399, 453, 480, 486, 491, 544, 567, 645, 668, 695, 749, 793, 814, 836, 860

European Convention for Human Rights (ECHR) , 3, 93, 277, 403, 569, 631, 784, 831

European Court of Human Rights (ECtHR) , 11, 139, 281, 408, 578, 631, 782, 832

European Court of Justice (ECJ) , 4, 94, 119, 139, 229, 231–234, 236, 237, 258, 259, 286, 409–413, 436, 443, 448, 450, 451, 457, 460, 470, 479, 487, 496–499, 566, 570, 571, 610, 613, 620, 631, 632, 661, 666, 717, 719, 737, 750, 904

European Data Protection Supervisor (EDPS) , 8, 92, 275, 418, 590, 634, 748, 845

European Union Council , 91, 97, 113, 134, 140, 142, 144,

160, 180, 181, 201, 203, 205, 206 209, 238, 245, 246, 251, 275, 309, 323, 324, 360, 421, 426, 432, 433, 438, 492–494, 637, 638, 642, 646, 651, 657, 658, 681, 697, 756, 807, 827, 828, 829, 831, 844, 845, 856, 868, 881, 898, 902

European Commission , 3, 6, 7, 15, 24, 31, 60, 65, 68, 69, 75, 76, 93, 120, 125, 131, 133, 205, 206, 227, 235, 237, 245, 246, 254, 279, 290, 325, 378, 382, 433, 437, 448, 471, 474, 484, 573, 586, 606, 609, 617, 638, 641, 644, 667, 670, 695, 706, 723, 725, 728, 734, 747, 752, 766, 767, 769, 774, 775, 782, 785, 789, 792, 793, 819, 828, 835, 841, 851, 861, 886, 892

European Parliament , 25, 68, 69, 71–73, 75, 76, 87, 88, 92, 119, 176, 183, 186, 187, 206, 226, 227, 290, 316, 317, 361, 364–366, 380, 381, 386, 387, 400, 412, 433, 442, 445, 447, 460, 480, 483, 484, 567, 571, 576, 619, 634, 641, 643, 660, 693, 733, 734, 740, 747, 751, 753, 756, 767, 770, 777, 785, 790, 869, 878, 879, 906

Lisbon Treaty , 70, 225–227, 230, 233, 409, 413, 786

pillars , 70, 72, 119, 120, 224–228, 317, 319, 324, 382, 386, 387, 402, 573, 640–642, 862

F Face. See Face recognition Facebook , 5, 114, 121, 156, 162, 163, 191,

196, 256, 299, 339, 344, 384, 587, 717, 718, 720, 854, 901

Index

Page 61: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

970

Face recognition consent , 155, 196, 197, 253, 396, 465, 560,

562, 575, 718–720, 741, 788, 790, 836, 903

facial images , 5, 6, 10, 25, 33, 46, 55, 68, 77, 78, 101, 106, 110, 121, 130, 135, 136, 139–141, 146, 147, 151, 152, 154–164, 178, 179, 190–198, 204, 268–271, 276, 277, 282, 291, 296, 299, 300, 302, 303, 305, 312, 314–317, 320, 321, 324, 326, 328, 332, 335, 337–339, 346, 349, 350, 357, 365, 390, 420, 452, 459, 462, 489, 523, 550, 551, 557, 560, 562, 585, 586, 626, 655, 656, 662, 663, 668, 705, 710, 716–721, 731–733, 735, 736, 738, 776, 787–789, 817, 819, 825, 835–837, 854–857, 861, 876, 882, 892, 899, 903

performance , 33–35, 38, 39, 47, 48, 50, 52–62, 162, 321, 355, 363–366, 376, 377, 391, 437, 447, 448, 486, 524, 575, 592, 690–692, 704, 726, 784, 798, 800–802, 805, 818, 830, 832, 835, 868

Fair. See Processing Fingerprint , 1, 15, 94, 277, 420, 573, 640,

749, 839 Framework Decision 2008/977/JHA , 120,

226, 640 France , 2, 8, 11, 15, 17, 73, 76, 80, 81, 87,

126, 137, 193, 206, 208–210, 213, 224, 234, 238, 250, 259, 260, 263, 275, 280, 285, 286, 289, 291, 299, 301–304, 306, 309, 314, 356, 382, 392, 396, 405, 406, 416, 419, 425, 437, 442, 452, 458, 460, 470, 471, 482, 490, 492, 493, 500, 517–548, 567, 577, 587–589, 607, 609, 611, 618, 626, 637, 651, 663, 670, 677, 682, 695, 697, 708, 709, 711, 723, 730, 732, 735, 751, 780–783, 813, 824, 827, 829, 834, 840, 846, 879, 885–887, 891, 892, 898, 902. See also Constitutional court

Conseil d’Etat , 161, 263, 406, 407, 420, 423, 462, 519, 520, 588, 735, 824, 825, 841, 882

Functionalities. See also Biometric Systems identifi cation , 20, 22, 36–39, 41, 42, 46,

50, 55, 56, 58–60, 67, 85, 152, 154, 162, 269, 278, 354, 363, 364, 376, 396, 429, 505, 516, 517, 540, 546, 560, 561, 591, 596, 620, 648–652,

654, 692, 712, 721, 742, 783, 834, 841, 842, 849, 853, 867, 868, 890, 898, 907

verifi cation , 22, 36–39, 41, 42, 46, 50, 53, 55, 58, 60, 152, 154, 162, 269, 384, 502, 507, 516, 517, 536, 546, 558, 561, 596, 618, 648–654, 665, 742, 763, 840, 842, 867, 868, 895–897, 907

Fundamental rights. See Human rights

G Genetic data , 6, 125, 138, 173, 183, 184,

201–208, 212, 213, 268, 351, 400, 433, 518, 643, 644, 651, 727, 747, 786, 793, 845, 849, 864, 899

Germany , 9, 18, 71, 73, 74, 81, 87, 130, 192, 200, 206, 212, 213, 221, 224, 234, 237, 239, 242, 247, 250, 251, 259, 264–266, 299, 301, 309, 343, 373, 387, 389, 405–407, 409, 437, 443, 448, 452, 460, 471, 472, 481, 600, 608, 636, 637, 661, 662, 668, 669, 677, 684, 695, 697, 714, 724, 728, 730, 732, 737, 743, 750, 751, 779, 781, 794, 815, 817, 821, 826, 864, 885

H Hague Programme (The) , 65, 68, 69, 639,

641, 730 Hand Geometry , 18, 21, 23, 24, 27–29, 33, 44,

50, 58, 83, 141, 146, 154, 155, 320, 322, 324, 326, 327, 342–343, 390, 452, 504, 506, 516, 521, 523, 527–530, 532–535, 538, 543, 545–548, 578, 582, 584–586, 596, 598, 611, 655, 656, 703, 709, 710, 753, 884

Health related information. See Sensitive data Human rights

direct effect , 246, 247, 249, 258, 263 horizontal effect , 232, 247–249, 272, 417,

429, 454, 455, 467, 615 law , 9, 10, 230, 231, 246, 405, 409, 453,

460, 487, 565, 571, 601 national , 4, 9, 80, 89, 93, 180, 191, 212,

229, 231, 238, 245–247, 258, 260, 310, 403, 415, 417, 430, 431, 465, 467, 496, 499, 565, 567, 571, 601, 609, 610, 613, 625, 639, 751, 828, 868, 903

Index

Page 62: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

971

I Identifi cation. See also Functionalities

right to identify , 19, 37, 115, 278 right to identity , 192, 253, 256, 271, 297,

653, 742, 857, 900 Identifi ers

pseudonymous , 685, 686, 743, 804, 806, 872

unique , 107, 273, 296, 305–319, 346, 355, 359, 397, 398, 489, 544, 547, 624, 685, 747, 754, 776, 798, 799, 811, 842–844, 848, 855, 874

Identity biometric , 40, 80, 103, 112, 314, 482, 664,

685, 710, 743, 762, 794–796, 805, 806, 817, 852, 857, 862, 870, 878, 883, 897

control , 58, 81, 278–289, 299, 385, 396, 470, 487, 506, 519, 576, 577, 597, 605, 638, 650, 653, 694, 701, 723, 735, 746, 787, 841, 848, 878, 879, 905

management system , 41, 112, 115–117, 296, 307–308, 336, 338, 340–342, 348, 353, 367, 482, 540, 576, 579, 626, 665, 666, 670, 672, 675, 679–686, 762, 763, 805–806, 840, 841, 868, 887

mltiple biometric(ies) , 103, 654, 673, 685, 763, 794, 795, 805–806, 857, 872

theft , 62, 276, 297, 316, 336, 337, 343–348, 355, 369, 371, 422, 504, 605, 648, 651, 671, 673–674, 715, 743, 770, 795, 800, 810, 817, 840, 848, 859, 872, 893, 895, 900

unique (universal) identifi er , 107, 273, 296, 305–319, 346, 355, 359, 397, 398, 489, 544, 547, 624, 685, 686, 747, 754, 776, 798, 799, 811, 842–844, 848, 855, 874

Immigration , 1, 34, 64, 66, 71, 72, 208, 210, 233, 318, 343, 382, 387, 477, 480, 487, 489, 730, 787. See also EURODAC

asylum seekers , 64, 66–67, 71, 76, 77, 233, 279, 288–291, 319, 354, 382, 386, 387, 486

Impact assessment data protection impact assessment (DPIA) ,

612, 621, 623, 626, 633, 634, 643, 742, 782, 786, 905, 906

privacy impact assessmenet (PIA) , 436, 633, 634, 762, 769, 777, 801, 904

India , 64, 80, 320, 478

Information , 1, 19, 89, 276, 413, 574, 636, 746, 832

to the data subject , 356, 418, 446, 510–511, 515, 528, 531, 533, 535, 552, 557, 622, 727, 809, 820, 895, 907

Interests private , 467, 483, 489 public , 125, 135, 195, 288, 295, 331,

411–414, 418, 428, 433, 437, 447, 448, 467, 469, 470, 476, 478, 518, 541, 592, 593, 603, 605, 606, 609, 617–618, 623, 667, 694, 696, 706, 711, 714, 716, 722, 725, 779, 780, 785, 832, 833, 837, 841, 847, 851, 905

International Biometric Group (IBG) , 154, 341, 586, 760, 761, 764, 794

BioPrivacy , 760, 761, 794 Iris , 1, 18–22, 24, 26–27, 33, 37, 45, 51, 55,

57–59, 62–64, 77–79, 81, 83, 107, 140, 143, 151, 155, 163, 172, 275, 277, 303, 305, 320, 321, 324, 326, 332, 335, 337, 339–343, 346, 357, 364, 373, 380, 388, 390, 397, 420, 427, 504, 506, 516, 521, 523, 524, 549, 584–586, 655, 656, 692, 753, 782, 804, 839, 841, 876, 899

Irreversibility , 144, 334, 390, 548, 562, 674, 755, 797, 801, 803, 814, 823, 830, 843, 846, 857–859, 888, 896, 897 903

J Justice and Home affairs , 69, 119, 120, 200,

225, 226, 317, 346, 360, 361, 387, 414, 445, 480, 639, 640, 813

Third pillar , 70, 72, 119, 120, 225, 227, 228, 317, 319, 382, 387, 573, 640–642, 862

L Law

delegated acts ( see Processing) lawful , 205, 273, 344, 384, 406, 412, 426,

428, 429, 431, 434, 436–438, 443, 445, 459, 460, 500, 547, 563, 566, 570, 573, 625, 631, 749, 761, 813, 822, 839

union law , 8, 71, 120, 213, 226, 228–230, 232, 311, 312, 405, 408–415, 442, 448, 487, 497–499, 565, 566, 572, 609, 610, 625, 724, 790, 792, 904

Index

Page 63: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

972

Law enforcement , 5, 18, 24, 29, 36, 43, 64, 65, 67, 73–74, 78, 99, 102, 113, 117, 119, 120, 124, 152, 158, 173, 189, 198–201, 205, 208, 209, 211, 212, 216, 220–223, 225–227, 232, 256, 259, 268, 269, 271, 277, 278, 282, 287, 288, 296, 297, 305, 312, 317, 319, 322, 323, 345, 347, 349, 356, 358, 375, 381–387, 398–400, 416, 417, 436, 442, 444, 445, 459, 464, 473–475, 480, 484, 501, 544, 547, 571, 574, 583, 586, 593, 617, 630, 639–642, 646, 651, 666, 668, 670, 679, 688, 693, 694, 696, 705, 707, 708, 711, 721, 722, 737, 738, 743, 745, 787–790, 828, 839, 846, 850, 851, 853, 855, 861–864, 866, 897, 901

crime , 73, 78, 102, 173, 212, 216, 220, 221, 223, 277, 280, 287, 305, 347, 375, 381, 383, 384, 399, 473–475, 484, 571, 583, 640, 679, 694, 711, 722, 738, 787–789, 839

Legislation legal basis , 69, 72, 161, 193, 195, 198,

211, 213, 216, 281, 284, 290, 293, 294, 299, 301–305, 355, 379, 383, 385, 392, 396, 397, 416, 419, 441, 445–448, 456–462, 465, 469, 489, 502, 560, 563, 564, 567, 571, 576, 579, 588, 589, 593, 606, 610, 616, 621, 637, 649, 653, 654, 660, 668, 677, 702, 706, 715, 720, 725, 731, 787–789, 791, 798, 809, 825, 841, 847, 849, 856, 860–862, 896, 897, 901, 903–905

legality , 233, 261, 262, 277, 280, 297, 383, 392, 406, 411, 416, 434–436, 439–443, 445, 446, 455–491, 503, 565, 571, 590, 593, 600, 602, 606, 616, 619, 624, 625, 631, 634, 640, 653, 704, 728, 731, 825, 841, 904, 905

Legitimacy , 392, 399, 401, 416, 423, 428, 429, 435, 436, 438, 439, 442, 443, 445–451, 456–491, 498, 502, 503, 515, 565, 571, 572, 590, 593, 602, 616, 624–626, 631, 634, 651, 704, 731, 733, 764, 904

Liability , 257, 362, 521, 748–750, 776, 779, 828, 829, 831, 887–895, 897

Lisbon Treaty. See European Union Liveness tests , 34

M Medical data , 131, 132, 139, 157, 160, 180,

183, 203, 209, 360, 543, 580, 680, 681, 809, 845, 887

N Netherlands (the) , 8, 11, 60, 73, 74, 80, 104, 126,

127, 137, 157–160, 180, 189, 206, 209, 211–213, 221, 224, 233, 234, 238, 239, 242, 244, 248–250, 256, 257, 259, 260, 264, 267, 275, 280, 283–285, 289–292, 294, 295, 301, 314, 317, 328, 330, 356, 358, 365, 373, 379, 382–384, 387, 391, 396, 398, 405, 406, 416–419, 432, 436, 437, 439, 443, 458, 469, 470, 472, 500, 526, 549–567, 571, 605, 637, 648, 663, 667, 677, 695, 700, 705, 708, 709, 711, 721–723, 727, 728, 730, 732, 735–739, 741, 743, 746, 756, 764, 768, 779, 781, 787–789, 813, 816, 825, 826, 830, 834, 844, 846, 856, 885, 898, 901, 902

O Organization for Economic Co-Operation and

Development (OECD) Guidelines (1980) , 90–92, 94, 658

Origin , 23, 66, 112, 130, 179, 181, 211, 271, 320, 321, 324, 325, 374, 387, 389, 393, 404–408, 489, 610, 748, 824

racial/ethnic , 2, 124, 126–128, 130, 131, 133–143, 158, 159, 169, 170, 172, 203, 204, 228, 270, 276, 305, 319–335, 352, 374, 380, 398, 581, 646, 647, 706, 748, 825, 834, 844–847, 855, 891, 899, 901

Ownership , 175–179, 202, 243, 478, 657, 667, 760, 864, 890–891

P Passenger Name Records (PNR) , 76, 119, 225,

314, 381, 421, 444, 470, 482–485, 573, 613, 715, 786

Personal data , 2, 69, 87, 279, 407, 570, 640, 747, 832

sensitive ( see Sensitive data) Police. See Law enforcement Precaution principle , 142, 323, 324, 331, 844, 899

Index

Page 64: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

973

Privacy by default , 163, 742, 768, 773 by design , 185, 227, 265, 563, 634, 643,

661, 673, 749, 754, 766–779, 792, 793, 795, 796, 804, 846, 881, 885, 894, 897, 903, 906

enhancing technologies (PETs) , 80, 90, 118, 202, 474, 551, 554–555, 559, 561, 563, 582, 583, 597, 598, 660, 666, 675, 680, 695, 706, 709, 728, 750, 762, 763, 766–779, 791–807, 810, 814, 819, 820, 823, 830, 843, 846, 852, 855–860, 864, 875, 885, 887, 906

impact assessment , 436, 633, 634, 762, 769, 777, 801, 904 ( see also Data protection, impact assessment)

right to , 4, 10, 87–273, 276, 284, 288, 294–301, 305, 354, 375, 389, 390, 392, 393, 396, 401, 414–417, 431, 432, 436, 437, 440, 443, 446, 449, 451, 453, 454, 457, 459, 461, 462, 465, 471, 473, 478, 480, 481, 488–491, 497, 498, 506, 508, 515, 547, 550, 565, 566, 569, 571, 589, 594, 600, 602, 606, 607, 615, 616, 619, 624, 629, 631, 638, 641, 657, 658, 677, 679, 693, 739, 740, 743, 774, 785, 809, 828, 837, 841, 842, 863, 900, 904, 905

Privacy enhancing technologies (PETs). See Privacy

Private party. See also Private sector private club , 382, 645, 692, 705–708,

745, 851 Private sector , 1, 2, 4, 5, 7, 11, 20, 26, 29,

64–81, 84, 99, 109, 112, 113, 119, 120, 124, 165, 191, 195, 199, 221, 227, 237, 246, 269, 278, 291–295, 300, 302, 304, 310, 317, 340, 350, 377–379, 381–385, 388, 396, 399, 400, 408, 421, 427, 438, 447, 459, 464, 467, 469, 470, 474, 477–479, 520, 521, 547, 549, 550, 564, 575, 585, 586, 588, 620, 622, 625, 626, 634, 637, 642, 645, 652, 653, 664, 690, 692–741, 745, 748, 757, 780, 781, 784, 787, 810, 817, 822, 831–907

Processing adequate , 125, 142, 418–425, 433, 575,

581–583, 587, 604, 631, 665, 700, 703, 706, 711, 714, 735, 742, 743, 790, 822, 838, 867, 873, 879, 896, 907

excessive , 75, 418–425, 505, 524, 560, 563, 565, 575, 581–583, 604, 607, 620, 626, 631, 646, 699, 725, 735, 742, 767, 831

fair , 236, 237, 418, 426, 427, 584–587, 821, 839

lawful , 428, 429, 431, 434, 436–438, 443, 445, 500, 563, 566, 570, 573, 625, 631, 813, 822, 839

relevant , 9, 85, 95, 104, 107, 114, 129, 251, 256, 268, 279, 293, 299, 300, 335, 418–425, 431, 433, 439, 443, 468, 505, 524, 561, 565, 567, 573, 575, 577, 581–584, 588, 589, 604, 607, 620, 626, 631, 644, 652, 662, 665, 716, 755, 806, 833, 847, 900

Processor , 45, 52, 112, 113, 148, 366, 441, 524, 643, 644, 648, 720, 752, 766, 769, 810, 829, 853, 863, 874, 878, 879, 890, 891

Profi ling , 3, 35, 109, 134, 147, 153, 172, 188, 211, 276, 279, 299, 307, 349–352, 355, 359, 376, 377, 381, 397–399, 504, 554, 671, 686, 704, 706, 717, 741, 843, 848, 871, 899, 900

Proportionality principle per se , 117, 158, 217, 318, 330, 506,

508, 509, 515, 516, 577, 579, 584, 686, 711

in Union law , 408–415, 497, 566, 609, 724 Prüm , 65, 73–74, 77, 119, 120, 200, 209, 213,

221, 311, 312, 319, 399, 640, 689, 690, 845, 850, 901

Pseudonimity , 794. See also Identifi ers Public events , 81, 382, 560–561, 563, 564,

599, 611, 721–724, 745, 785, 833, 851, 862

Public order , 177, 210, 248, 250, 262, 280, 282, 284, 286, 319, 406, 433, 434, 446, 448, 469–471, 474, 525, 591, 592, 606, 684, 693, 694, 701, 722–724

Public safety , 81, 119, 145, 245, 281, 295, 410, 433, 448, 449, 455, 465, 471–472, 476, 478, 541, 575, 578, 591, 593–594, 653, 704, 705, 707, 708, 711, 721–724, 902, 905

Purposes legitimate , 318, 358, 418, 422, 424–453,

552, 565, 572, 575–581, 594, 604, 624, 631, 756, 833, 861, 862

re-use , 227, 375, 377–388, 399, 507, 547, 595, 642, 646, 651, 666, 842

Index

Page 65: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

974

R Racial and ethnic origin. See Sensitive data Reform proposals 2012 , 11, 153, 227, 428,

623, 696, 716, 718, 722 Regulation

co- , 758–766, 779, 828, 829 self , 758–766, 897

Reliability , 21, 33–34, 39, 54, 68, 199, 336, 355, 376, 390, 411, 485, 516, 540, 541, 591, 689–692, 702, 738, 753

Research databases , 89, 102, 117, 176, 268,

725–728, 854 projects , 6, 36, 63, 80, 131, 173, 288,

322, 341, 348, 585, 662, 672, 673, 676, 726, 743, 762, 775, 794, 800, 804, 805

and testing ( see Testing) Re-use , 102, 159, 177, 199, 227, 278,

358–359, 361, 362, 371, 375, 377–388, 399, 400, 421, 504, 507, 547, 582, 584, 586, 595, 646, 647, 651, 652, 666, 714, 715, 725, 727, 755, 820, 842, 848–850, 878, 897, 900, 901, 904

by law enforcement , 99, 305, 381–385, 547, 642

Revocability , 673–674, 743, 797, 800–803, 830, 859, 867, 897, 904

renewability , 674, 743, 801, 803, 814, 858, 859, 897

Right to one's own image , 191–196, 242, 645, 719, 720, 836

Risks. See also Biometric data; Biometric systems

identifi ers , 107, 273, 310–316, 339, 359, 397, 489, 595, 624, 776, 799, 848

interoperability , 277, 279, 289, 314–319, 329, 331, 378, 380, 397, 647, 651, 843

linking , 2, 45, 362, 371, 507, 714, 776, 842, 843, 900

S Safeguards , 4, 89, 99, 125, 189, 209, 219, 226,

227, 233, 238, 252, 273, 325, 328, 331, 343, 352, 355, 359, 370, 377, 379, 380, 382, 383, 393, 396, 397, 401, 412, 422, 429, 446, 447, 449–451, 454, 461, 463, 464, 467, 469–471, 473, 476, 483, 489–491, 500, 538, 561, 563, 565, 569, 572, 577, 580, 581, 586, 587, 589, 591,

592, 594, 599, 601, 614, 616, 618, 622–625, 627, 629–631, 633, 639, 643–692, 699–704, 706, 707, 710, 711, 714–716, 720, 722, 723, 725, 727–729, 731, 736, 741–743, 749, 756, 758, 779, 782, 784, 785, 787, 790–791, 797, 799, 807, 822, 824, 828, 831–838, 844, 847, 849, 851, 852, 854, 857, 858, 861–863, 865–868, 871, 875, 877–879, 881, 882, 895–897, 899–901, 903–905

Schengen information system (SIS) , 71–74, 84, 282,

283, 383, 463, 489, 651, 692, 731, 735, 850

information system (second generation) SIS II , 1, 70–73, 77, 84, 85, 104, 119, 201, 225, 282, 314, 316, 346, 355, 365, 383, 399, 414, 489, 567, 637, 651, 692, 695, 731, 813, 850, 893, 901

Schools , 2, 10, 21, 58, 65, 80, 84, 102, 113, 155, 192, 196, 382, 394, 395, 466, 482, 486, 491, 500, 505, 508, 518, 522, 527, 532–535, 538, 539, 545, 548, 549, 573, 578, 580, 584, 615, 645, 692, 693, 708–712, 724, 749, 775, 810, 833, 841, 851, 861, 870, 884

Security attacks ( see biometric systems) breach , 771, 873, 880, 891–894 high needs , 449, 522, 575–578, 591–593,

606, 621, 899 national , 79, 118, 245, 253, 359, 455, 465,

467–473, 482, 573, 613, 694 public , 4, 118–120, 359, 379, 410, 412,

414, 448, 467, 469–471, 497, 572, 573, 578, 591, 592, 642, 694, 699, 707, 716, 724, 788, 819

State , 118, 119, 433, 572, 736, 738, 816, 902

Sensitive data health related information , 142, 170, 391 race and ethnic origin , 646, 647, 825 reverse engineering , 4, 334–335, 342,

348, 357 Social network sites/services (SNS) , 113, 162,

164, 175, 191, 300, 303, 312, 339, 384, 662, 671, 716–721, 742, 835, 839, 844, 846, 855, 861

Societal aspects , 83, 300, 352, 907 Societal issues , 375, 388–395, 544, 574, 599,

620, 745, 826

Index

Page 66: Bibliography978-94-007-7522-0/1.pdf910 electronic communications services or of public communications networks and amending Directive 2002/58/EC, O . J . L 105, 13.04.2006, pp. 54

975

Soft biometrics scars , 35, 36, 146 tattoos , 35, 36, 146

Spoofi ng , 336, 342, 369, 370, 504, 513, 738, 815, 877, 886

Standardization common criteria , 425, 765, 793–794, 812, 875 ISO/IEC SC 37 , 11, 42, 83, 145, 746, 875 ISO standards , 42, 52, 77, 82, 83, 172, 371,

686, 726, 803, 887 ISO vocabulary , 11, 23, 41–44, 46, 49, 63,

83, 98, 144, 145, 148, 153, 154, 174, 312, 353, 360, 374, 649, 689

Standards. See Standardization Surveillance , 5, 46, 106, 278, 407, 571, 632,

747, 834 tracking and tracing , 355–357, 362, 704

T Template. See Biometric data Testing

Competitions Face Recognition Vendor Test (FRVT) ,

57, 395, 691 Fingerprint Verifi cation Competition

(FVC) , 56, 61, 726 Time and attendance , 1, 81, 108, 379, 501,

508, 522, 525, 527–530, 539, 545, 548, 611, 700, 703, 784

Transparency , 71, 74, 184, 237, 240, 276, 296, 310, 331, 341, 358–359, 366, 367, 392, 400, 410, 413, 414, 427, 434, 460, 463, 468, 487, 489, 496, 511, 540, 542, 587, 622, 636, 643, 646, 659, 690, 700, 716, 763, 791, 804, 807, 809, 819–821, 823, 824, 829, 837, 863, 865–871

Turbine project , 50, 54, 58, 131, 327, 368, 652, 662, 666, 672, 673, 687, 688, 713, 762, 769, 794, 795, 797, 800, 804–806, 820, 840, 857, 865

U United Kingdom , 11, 21, 33, 58, 80, 82,

136, 139, 169, 192, 196, 212, 213, 230, 237, 243, 248, 254, 255, 266, 267, 298, 301, 314, 321, 346, 356, 378, 384, 387, 420, 455, 459–461, 463, 464, 466–468, 472, 476, 480–482, 492, 493, 599, 615, 622, 636, 663, 696, 708–710, 730, 739, 760, 764, 830

United States Biometric Information Privacy Act , 155,

164, 810 Federal Trade Commission , 163, 164, 296 Super Bowl , 163, 357, 382, 654, 707,

721, 761 Unlinkability , 115, 116, 680, 755, 794,

798–799, 801–803, 814, 830, 857–859, 897, 904

V Verifi cation. See Functionalities Visa Information System (VIS) , 1, 69–71,

75–77, 84, 85, 104, 117, 136, 137, 225, 297, 298, 314, 316–318, 355, 358, 363, 364, 373, 375, 377, 382–386, 388, 392, 394, 397, 399, 414, 420, 422, 465, 467, 471, 474, 480, 482, 485–487, 544, 556–558, 567, 571–573, 578, 586, 591, 593, 596, 611, 621, 634, 651, 653, 674, 691, 693, 695, 707, 708, 724, 809, 810, 814, 816, 818, 850, 875, 878, 884, 893

Vocabulary. See Standardization

W Working Document on Biometrics 2003. See

Article 29 Working Party

Index