1 Introduction |
|
1 | (12) |
|
1.1 Data Protection and the Issue of Data Processing |
|
|
1 | (3) |
|
|
4 | (2) |
|
1.3 EU Data Protection Legislation |
|
|
6 | (1) |
|
1.4 The Right to Data Protection: The Jurisprudence of the CJEU |
|
|
7 | (1) |
|
1.5 The Right to Data Protection: The Current Doctrinal Discourse |
|
|
8 | (1) |
|
1.6 The Right to Data Protection: The Dualistic Approach |
|
|
9 | (2) |
|
|
11 | (2) |
2 EU Data Protection Legislation |
|
13 | (34) |
|
|
14 | (1) |
|
2.2 Primary EU Data Protection Legislation |
|
|
14 | (5) |
|
2.2.1 Article 8 CFR: A Reverse-Engineered Fundamental Right of EU Law |
|
|
14 | (3) |
|
2.2.2 Article 16 TFEU and Article 39 TEU |
|
|
17 | (2) |
|
2.3 Secondary EU Data Protection Legislation |
|
|
19 | (23) |
|
2.3.1 Objective and Scope |
|
|
19 | (1) |
|
2.3.2 Principles of the EU Data Protection Legislation |
|
|
20 | (13) |
|
2.3.3 Further Provisions of the EU Data Protection Legislation |
|
|
33 | (9) |
|
2.4 Conclusions on the EU Data Protection Legislation |
|
|
42 | (1) |
|
|
43 | (4) |
3 The Right to Data Protection: The Jurisprudence of the CJEU |
|
47 | (96) |
|
|
48 | (1) |
|
3.2 Case Law on Article 8(1) and (2) CFR |
|
|
48 | (76) |
|
|
49 | (2) |
|
3.2.2 Article 8 ECHR with a Twist |
|
|
51 | (6) |
|
3.2.3 Moving Beyond the ECtHR |
|
|
57 | (6) |
|
3.2.4 Article 8 ECHR with Reference to the Charter: Promusicae |
|
|
63 | (2) |
|
3.2.5 Reference to Article 1 DPD |
|
|
65 | (4) |
|
3.2.6 The Charter as Standard: Schecke and Eifert and Deutsche Telekom AG |
|
|
69 | (4) |
|
3.2.7 Assessing Article 8 CFR Exclusively: The Internet-Monitoring Cases |
|
|
73 | (3) |
|
3.2.8 Frictions and Factions: The Recent Case Law |
|
|
76 | (44) |
|
3.2.9 Conclusions on the Case Law on Article 8(1) and (2) CFR |
|
|
120 | (4) |
|
3.3 Case Law on Article 8(1) and (3) CFR |
|
|
124 | (7) |
|
3.3.1 Independence of the Supervisory Authorities |
|
|
125 | (4) |
|
3.3.2 Substantive Right of Individuals |
|
|
129 | (2) |
|
3.3.3 Conclusions on the Case Law on Article 8(1) and (3) CFR |
|
|
131 | (1) |
|
3.4 Conclusions on the Case Law of the CJEU |
|
|
131 | (1) |
|
|
132 | (11) |
4 The Right to Data Protection: The Current Doctrinal Discourse |
|
143 | (32) |
|
|
144 | (2) |
|
4.2 The Transparency-Focused Approach |
|
|
146 | (3) |
|
4.3 The Narrow Self-determination Approach |
|
|
149 | (3) |
|
4.4 The Commodification Approach |
|
|
152 | (2) |
|
|
154 | (3) |
|
4.5.1 A Combined Right of Article 8 in Conjunction with Article 7 CFR |
|
|
154 | (2) |
|
4.5.2 Article 8 CFR as Right to Data Protection Legislation |
|
|
156 | (1) |
|
4.5.3 Horizontal Application of Article 8 CFR |
|
|
157 | (1) |
|
4.6 The Individualistic Approach |
|
|
157 | (3) |
|
4.6.1 The Rationale of Data Protection |
|
|
158 | (1) |
|
4.6.2 The Essence of the Right to Data Protection and its Balance with Other Rights |
|
|
159 | (1) |
|
4.7 The Top-Down Approach |
|
|
160 | (2) |
|
4.7.1 Interferences with the Right to Data Protection |
|
|
161 | (1) |
|
4.7.2 The Essence of the Right to Data Protection |
|
|
161 | (1) |
|
4.8 The Checks and Balances Approach |
|
|
162 | (8) |
|
4.8.1 The Rationale of Data Protection |
|
|
162 | (2) |
|
4.8.2 The Scope of the Right to Data Protection |
|
|
164 | (1) |
|
4.8.3 Interferences with the Right to Data Protection |
|
|
165 | (3) |
|
4.8.4 Justifications for Interferences |
|
|
168 | (1) |
|
4.8.5 Horizontal Application of the Right to Data Protection |
|
|
169 | (1) |
|
4.8.6 Conclusions on the Checks and Balances Approach |
|
|
169 | (1) |
|
4.9 Conclusions on the Current Doctrinal Discourse |
|
|
170 | (2) |
|
|
172 | (3) |
5 The Right to Data Protection: The Dualistic Approach |
|
175 | (102) |
|
|
176 | (2) |
|
5.2 The Dualistic Approach: Data Protection Law as Answer to the Issue of Data Processing |
|
|
178 | (16) |
|
5.2.1 Critique of Privacy and Need for Data Protection |
|
|
178 | (2) |
|
5.2.2 The Development of the Notion of Data Protection by Steinmuller, Podlech and Others |
|
|
180 | (6) |
|
5.2.3 The Duality of EU Data Protection Law: Individual and Structural Data Protection Law |
|
|
186 | (6) |
|
5.2.4 Interim Conclusions: A Dualistic Approach to Data Protection |
|
|
192 | (2) |
|
5.3 The Application of the Dualistic Approach to the Secondary EU Data Protection Legislation: Uncovering the Secondary EU Data Protection Law |
|
|
194 | (31) |
|
5.3.1 Rationales of the Secondary EU Data Protection Legislation: Data Protection Law and Beyond |
|
|
194 | (11) |
|
5.3.2 Deriving the Fundamental Principles from the Secondary EU Data Protection Law |
|
|
205 | (17) |
|
5.3.3 The Fundamental Principles of EU Data Protection Law |
|
|
222 | (3) |
|
5.4 The Application of the Dualistic Approach to the Primary EU Data Protection Legislation: Uncovering the EU Fundamental Right to Data Protection |
|
|
225 | (39) |
|
5.4.1 The Right to Data Protection as Part of a Value System |
|
|
226 | (3) |
|
5.4.2 The Rationale of the Right to Data Protection |
|
|
229 | (11) |
|
5.4.3 The Content of the Right to Data Protection |
|
|
240 | (14) |
|
5.4.4 The Horizontal Application of the Right to Data Protection |
|
|
254 | (4) |
|
5.4.5 Differentiating the Right to Data Protection from the Right to Privacy |
|
|
258 | (6) |
|
5.5 Conclusions on the Right to Data Protection in EU Law |
|
|
264 | (2) |
|
|
266 | (11) |
Bibliography |
|
277 | (20) |
Index |
|
297 | |