Atjaunināt sīkdatņu piekrišanu

Data Protection: A Practical Guide to UK Law 6th Revised edition [Mīkstie vāki]

  • Formāts: Paperback / softback, 752 pages, height x width x depth: 234x155x42 mm, weight: 1128 g
  • Izdošanas datums: 05-Nov-2020
  • Izdevniecība: Oxford University Press
  • ISBN-10: 0198853564
  • ISBN-13: 9780198853565
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 162,01 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 752 pages, height x width x depth: 234x155x42 mm, weight: 1128 g
  • Izdošanas datums: 05-Nov-2020
  • Izdevniecība: Oxford University Press
  • ISBN-10: 0198853564
  • ISBN-13: 9780198853565
Citas grāmatas par šo tēmu:
Now in its sixth edition, this invaluable handbook provides a complete guide to the practical application of data protection law in the UK. It is fully updated and expanded to include coverage of significant developments in the practice of data protection, and takes account of new legislation since the last edition. The sixth edition includes coverage of the Data Protection Act 2018, Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019, and the European Union (Withdrawal Agreement) Act 2020, and contains relevant analysis of the effect of Brexit on UK data protection law.

Data Protection: A Practical Guide to UK Law is essential reading for all those working with data protection issues, including in compliance departments in both the public and private sectors, as well as in-house and private practice lawyers, company secretaries, HR Officers, marketing executives and IT specialists.

Recenzijas

To pull together such a comprehensive guide, Carey has worked with expert contributors from practice... Overall, I would highly recommend this book. It offers a comprehensive and timely guide to UK data protection law, which will be of real practical value to data protection practitioners, particularly in light of the UK's withdrawal from the EU. Furthermore, it would also be of value to academics specialising in this area of law who are interested in the practical interpretation and application of data protection legislation. * Dr Peter Coe, University of Reading, Computer and Telecommunications Law Review * [ T]his is one of the most well-researched reference works on the subject ... The book overall makes an important addition to the library of every data privacy, data protection and security practitioner in the UK. * Ardi Kolah, Queen's University Belfast, Journal of Data Protection & Privacy *

Table of Cases
xv
Table of UK Legislation
xvii
Table of UK Secondary Legislation
xxv
Table of European and International Legislation
xxxiii
Contributing Authors' Biographies xlv
List of Abbreviations
xlvii
Introduction to the Sixth Edition xlix
1 Historical Perspective, Territorial Scope, and Terminology
1(37)
Damien Welfare
Peter Carey
Introduction and Historical Perspective
1(5)
Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) Regulations 2019
6(1)
Territorial Scope
6(3)
Introduction to Terminology
9(1)
Personal Data
10(7)
Processing
17(1)
Filing System
18(2)
Controller
20(2)
Processor
22(1)
Special Categories of Personal Data
22(2)
European Economic Area
24(1)
Main Establishment
24(1)
Data Subject
25(1)
Pseudonymization
26(1)
Profiling
27(1)
Personal Data Breach
27(1)
The Data Subject's Consent
28(1)
Children
28(1)
Genetic Data
29(1)
Biometric Data
29(1)
Recipient
30(1)
Data Protection by Design
30(1)
Data Protection by Default
30(1)
Codes of Conduct
31(1)
Joint Controllers
32(1)
European Data Protection Board
32(1)
Delegated Acts
32(1)
Certification
33(1)
One Stop Shop
34(1)
Directive on Security of Network and Information Systems
34(2)
Directive on Personal Data Processed for Criminal Law Enforcement
36(2)
2 Data Protection Principles
38(11)
Peter Carey
Introduction
38(1)
Lawfulness, Fairness, and Transparency
39(1)
Purpose Limitation
40(1)
Data Minimization
41(2)
Data Accuracy
43(1)
Storage Limitation
44(2)
Integrity, Confidentiality, and Security
46(1)
Exemptions
46(1)
Accountability
47(1)
Data Protection by Design and by Default
47(1)
Processors
47(2)
3 Fair, Lawful, and Transparent Processing
49(27)
Peter Carey
Introduction
49(1)
Obtaining Data---Duty Not to Mislead
50(1)
Obtaining Data in a Transparent Manner---Information to Be Supplied to the Data Subject
50(7)
Other Unfair Processing
57(1)
The Lawfulness Conditions
57(11)
Other Unlawful Processing
68(1)
Cases of Significance
69(5)
Monetary Penalties of Significance
74(1)
Summary
74(2)
4 Special Categories of Data
76(21)
Peter Carey
Introduction
76(3)
The Conditions for Processing
79(12)
Personal Data Relating to Criminal Convictions and Offences
91(3)
Advice on Processing Special Category Personal Data
94(3)
5 Data Security and Breach Notifications
97(22)
Ann Bevitt
Peter Carey
Introduction
97(5)
Obligations of the Controller and Processor
102(4)
Data Protection by Design and by Default
106(2)
Pseudonymization and Encryption
108(1)
Privacy Enhancing Technologies
108(1)
ISO 27001, 27002, and 27701
109(1)
Security and Outsourcing
110(1)
Security and Exports
111(1)
Security Breaches
112(1)
Notifying Security Breaches
112(5)
Advice on Breach Notification
117(1)
Additional Resources
118(1)
6 International Data Transfers
119(20)
Eduardo Ustaran
Introduction
119(2)
Examples of International Transfers
121(1)
Scope of Data Transfers
122(1)
Adequate Level of Protection
122(3)
Transfers to the United States---Privacy Shield
125(3)
Providing Adequacy Safeguards
128(1)
The Contractual Route
129(3)
Codes of Conduct and Certification Mechanisms
132(1)
Binding Corporate Rules
132(3)
The Derogations
135(2)
Non-repetitive Transfers
137(1)
Advice for Organizations
138(1)
7 The Rights of Individuals
139(40)
Kate Brimsted
Peter Carey
Introduction
139(1)
Responding to Individuals
140(4)
Exemptions
144(1)
The Right of Access
144(13)
Data Portability
157(3)
Rectification
160(1)
Rights to Object
161(1)
The Right to Object to Direct Marketing
161(3)
Right to Erasure
164(5)
Right to Restriction of Processing
169(1)
Automated Decision-taking
170(3)
Compensation
173(3)
Right to a Judicial Remedy
176(1)
Complaints to the Commissioner
176(2)
Additional Resources
178(1)
8 Enforcement and the Role of the Regulator
179(22)
Alison Deighton
Peter Carey
Introduction
179(1)
Supervisory Authority Enforcement Role
180(6)
Other Remedies
186(1)
Consistency Mechanism
186(1)
Cross-border Processing and Appointing a Lead Authority
187(3)
UK Enforcement Action After Brexit
190(1)
UK Enforcement Procedures
191(1)
Information Notice
192(2)
Assessment Notice
194(1)
Enforcement Notice
195(1)
Monetary Penalty Notices
196(2)
Appeals
198(1)
Powers of Entry and Inspection
199(2)
9 Outsourcing Personal Data Processing
201(10)
John Fitzsimons
Peter Carey
Introduction
201(2)
The Nature of a Processor
203(1)
Obligations on Processors
204(1)
Choice of Processor
204(2)
Ongoing Assurance
206(1)
The Written Contract
206(2)
Sub-processors
208(1)
Processor or Controller
208(1)
Cloud Services
209(1)
Foreign Processors
210(1)
Additional Resources
210(1)
10 Electronic Communications
211(24)
Peter Given
Peter Carey
Introduction and Historical Background
211(3)
Definitions
214(3)
Email Marketing
217(6)
Text Message Marketing
223(1)
Telephone Marketing
223(2)
Fax Marketing
225(1)
Location Data
225(2)
Cookies and Similar Devices
227(2)
Limitations on Processing of Traffic Data
229(1)
Calling and Connected Line Identification
230(1)
Telephone Directories
231(1)
Non-itemized Bills
232(1)
Termination of Unwanted Call Forwarding
232(1)
Security
232(1)
Breach Notification
232(1)
Exemptions
233(1)
Enforcement
233(2)
11 Data Protection Impact Assessments
235(23)
Olivia Whitcroft
Introduction
235(1)
DPIA Guidance and Templates
236(1)
What Is a DPIA
237(1)
When to Carry Out a DPIA
238(5)
Identifying Whether a DPIA Is Required
243(1)
Who Should Carry Out a DPIA
244(1)
How to Conduct a DPIA
245(11)
Reporting and Publication of the DPIA
256(1)
Additional Resources
257(1)
12 Role of the Data Protection Officer
258(18)
Jenai Nissim
Introduction
258(1)
The Accountability Requirement
258(3)
Appointing a DPO
261(1)
When Is a DPO Mandatory?
261(5)
Accessibility
266(2)
Expertise and Skill of the DPO
268(2)
Involvement of the DPO
270(1)
Necessary Resources
271(1)
Independence
271(1)
Security of Tenure
272(1)
Conflict of Interest
273(1)
Data Protection Impact Assessments
274(1)
Record Keeping
274(1)
Policies and Procedures
275(1)
Additional Resources
275(1)
13 Creating a Data Protection Compliance Programme
276(13)
Jenai Nissim
Introduction
276(2)
Stage 1 Assessing Data Processing Activities
278(1)
Stage 2 Creating Data Protection Policies
279(2)
Stage 3 Data Protection Training and Raising Awareness
281(2)
Stage 4 Implementing Controls to Reduce and Monitor Risk
283(2)
Stage 5 Monitoring Compliance
285(1)
Stage 6 Reporting
286(1)
Stage 7 Annual Review Process
286(3)
Appendix 1 Regulation (EU) 2016/679 of the European Parliament and of the Council 289(98)
Appendix 2 Data Protection Act 2018 387(280)
Appendix 3 Addresses and Websites 667(4)
Index 671
Peter Carey is a Solicitor and Consultant to London law firm Charles Russell Speechleys, Visiting Fellow at the London School of Economics, and Senior Lecturer at PDP Training. He is described by the British Computer Society as 'one of Europe's leading data protection experts.' He advises on all aspects of data protection compliance and leads various public and bespoke training courses on data protection. Peter is Head of the Examination Board of the Practitioner Certificate in Data Protection (www.dataprotectionqualification.com)