2018
DOI: 10.1007/978-3-662-58387-6_2
|View full text |Cite
|
Sign up to set email alerts
|

On Purpose and by Necessity: Compliance Under the GDPR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(45 citation statements)
references
References 18 publications
0
45
0
Order By: Relevance
“…Step 2: Deleting sensor reading (Lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. Suppose that in an epoch T i , n sensor records are needed to be deleted.…”
Section: State Transition Phasementioning
confidence: 99%
“…Step 2: Deleting sensor reading (Lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. Suppose that in an epoch T i , n sensor records are needed to be deleted.…”
Section: State Transition Phasementioning
confidence: 99%
“…Second, it has been argued that annotation and static analysis are not enough because these miss the purpose of using personal data [37]. While the pseudonymization solution partially addresses also this concern, it must be acknowledged that the intention of using personal data is not made explicit in the architecture.…”
Section: B Limitations and Challengesmentioning
confidence: 99%
“…There have been various studies recently which have looked at how digital technologies can improve the shopping experience [2,29,49]. The main focus of these studies have been to examine the capabilities which are offered by technologies but the studies focusing on how the use of technologies can be affected by GDPR are rare [1].…”
Section: Technologies For Enhancing Customer Journeymentioning
confidence: 99%
“…Article 31 of the GDPR requires Data Controllers to report data breaches to the supervisory authority within 72 hours of becoming aware of the breach. In addition to that Article 32 requires that the data subject is informed of the data breach for as long as sensitive information that can potentially deny the data subject their rights of privacy except if the data controller can prove that they have (1) implemented appropriate technical and organisational protection measures in respect of the personal data affected by the breach (such as encryption). (2) taken subsequent measures which ensure that the high risk to the rights and freedoms of individuals is no longer likely to arise or It would involve disproportionate effort [11].…”
Section: Data Breachesmentioning
confidence: 99%
See 1 more Smart Citation