2010
DOI: 10.1515/icl-2010-0306
|View full text |Cite
|
Sign up to set email alerts
|

The EU as an emerging 'Surveillance Society': The function creep case study and challenges to privacy and data protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 0 publications
0
4
0
1
Order By: Relevance
“…Dekkers (2020) has problematized the increase of interoperability – the sharing of information – in the context of migration control in the European Union by addressing the notion of function creep: ‘the expansion of a process or system, where data collected for a specific purpose is subsequently used for another unintended or unauthorized purpose’ (Mordini and Massari, 2008: 490). For instance, the EURODAC system that started as a fingerprint database to enable identification of asylum-seekers and irregular immigrants is now also used in the ‘war on terrorism’ (Besters and Brom, 2010; Tzanou, 2010). The underlying assumption would be that potential terrorists are among the asylum-seekers, creating a need to match migration data with criminal justice data.…”
Section: Reconstructing Intra-schengen Borders For Core and Non-core ...mentioning
confidence: 99%
“…Dekkers (2020) has problematized the increase of interoperability – the sharing of information – in the context of migration control in the European Union by addressing the notion of function creep: ‘the expansion of a process or system, where data collected for a specific purpose is subsequently used for another unintended or unauthorized purpose’ (Mordini and Massari, 2008: 490). For instance, the EURODAC system that started as a fingerprint database to enable identification of asylum-seekers and irregular immigrants is now also used in the ‘war on terrorism’ (Besters and Brom, 2010; Tzanou, 2010). The underlying assumption would be that potential terrorists are among the asylum-seekers, creating a need to match migration data with criminal justice data.…”
Section: Reconstructing Intra-schengen Borders For Core and Non-core ...mentioning
confidence: 99%
“…Although we can distinguish different types of surveillance by the part of public and private actors, they are not easy to separate in practice as they tend to use the same technologies or agree on some forms of partnerships [15]. This highlights the importance of privacy by design, and the development of a technology respectful itself with data protection regulation requirements.…”
Section: A Towards Oblivious Identity Management In the Context Of The Surveillance Societymentioning
confidence: 99%
“…As the Data Privacy and Integrity Advisory Committee of the DHS in the US similarly proposes, in order to avoid "function creep", 365 the data collected by RFID technology should only be used for the stated objectives and kept "for only as long as necessary to meet the original objective for which it was collected". Function creep "constitutes a breach to the purpose limitation principle" (Tzanou 2010 Especially without technological safeguards, a number of difficulties may still arise in enforcing a prohibition on reading RFID implants (or other RFID tags on a person) without the knowledge and/or permission of the person concerned. 365 The term "function creep" refers to any additional use of personal data beyond the specified purposes for which the personal data was permitted to be collected in the first place.…”
Section: Use Limitationmentioning
confidence: 99%