Foreword |
|
v | |
|
|
vii | |
|
|
xiii | |
Bibliography |
|
xvii | |
I Books, Journals and Website Materials |
|
xvii | |
II Statutes |
|
xxxi | |
|
|
1 | (15) |
|
A Trans-Atlantic Privacy Challenges |
|
|
1 | (2) |
|
B Characteristics of the Cloud Environment |
|
|
3 | (7) |
|
|
3 | (3) |
|
II Cloud Governance Approaches |
|
|
6 | (3) |
|
III Political Context of Regulating the Cloud |
|
|
9 | (1) |
|
C Functions of Technology and Law in the Context of Privacy |
|
|
10 | (6) |
|
|
10 | (3) |
|
II Flexible Laws and Regulations |
|
|
13 | (3) |
|
Part 2 Legal and Regulatory Framework |
|
|
16 | (46) |
|
A Regulatory Concepts for Data Privacy |
|
|
16 | (4) |
|
I Overview of Influencing Factors |
|
|
16 | (1) |
|
II Technology-Based Model |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
19 | (1) |
|
B Data Privacy as Policy and Regulatory Topic in the EU |
|
|
20 | (6) |
|
I Tensions between Fundamental Rights and Regulatory Frameworks |
|
|
20 | (2) |
|
II EU Digital Market Strategy |
|
|
22 | (2) |
|
III Data Protection Law Reform |
|
|
24 | (2) |
|
C Principles of Data Protection and Privacy in the US |
|
|
26 | (4) |
|
I Evolution of Data Protection in the US |
|
|
26 | (1) |
|
II Current Data Protection Framework |
|
|
27 | (3) |
|
D EU Data Protection Framework |
|
|
30 | (9) |
|
I Processing Authorization |
|
|
31 | (1) |
|
II Processor v. Controller |
|
|
32 | (3) |
|
III Data Transfers Outside the EU |
|
|
35 | (2) |
|
IV Information Requirements |
|
|
37 | (1) |
|
|
38 | (1) |
|
E US Data Protection Framework |
|
|
39 | (16) |
|
|
39 | (2) |
|
II Privacy Act and Wiretap Act |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
III US Surveillance Framework |
|
|
42 | (11) |
|
|
42 | (1) |
|
2 Foreign Intelligence Surveillance Act |
|
|
43 | (3) |
|
3 Cybersecurity Information Sharing Act (CISA) |
|
|
46 | (1) |
|
|
47 | (4) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
V Selected State Statutes |
|
|
54 | (1) |
|
F International Trade Law and Privacy |
|
|
55 | (7) |
|
I EU Data Protection Law and GATS |
|
|
55 | (4) |
|
1 General WTO Law Principles |
|
|
55 | (2) |
|
2 Grounds for Justification of Trade-Restricting Measures |
|
|
57 | (2) |
|
II Privacy-Related Plurilateral and Regional Trade Agreements |
|
|
59 | (3) |
|
Part 3 Practical Implementation of Data Protection Environment |
|
|
62 | (72) |
|
A Industry Feedback on Data Protection and Security Challenges |
|
|
62 | (9) |
|
|
62 | (1) |
|
II Cloud Trends and Challenges |
|
|
63 | (4) |
|
1 Introduction to Cloud Services |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
4 Identifying Personal Data |
|
|
66 | (1) |
|
|
66 | (1) |
|
III Unique Challenges of Start-Ups |
|
|
67 | (2) |
|
1 Key Challenge for Start-Ups |
|
|
67 | (1) |
|
|
68 | (1) |
|
IV Processing of Sector-Specific Health Data |
|
|
69 | (2) |
|
B Business to Business in the Cloud |
|
|
71 | (17) |
|
|
71 | (3) |
|
|
71 | (1) |
|
|
72 | (1) |
|
3 Challenges for Cloud Vendors |
|
|
73 | (1) |
|
4 Business Consultation Trends |
|
|
73 | (1) |
|
5 Transatlantic Cloud Data Centers |
|
|
74 | (1) |
|
II Ancillary Business Services |
|
|
74 | (14) |
|
1 SaaS Human Resource Tools |
|
|
75 | (2) |
|
2 SaaS Application Monitoring |
|
|
77 | (2) |
|
3 Customer Success in the Cloud |
|
|
79 | (1) |
|
4 SaaS Legal Services and Discovery |
|
|
80 | (1) |
|
|
81 | (2) |
|
4.2 Discovery in the Cloud |
|
|
83 | (2) |
|
4.3 Trends Identified by Law Firms |
|
|
85 | (1) |
|
5 SaaS Communication Tools |
|
|
86 | (2) |
|
6 Extension: Public Services in the Cloud |
|
|
88 | (1) |
|
C Business to Consumer in the Cloud |
|
|
88 | (3) |
|
I Data Protection Implications |
|
|
89 | (1) |
|
|
90 | (1) |
|
D Big Data Analytics Challenges |
|
|
91 | (10) |
|
|
92 | (3) |
|
1 University and Business Cooperation |
|
|
92 | (1) |
|
|
92 | (1) |
|
3 Anonymization and Big Data |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (2) |
|
IV Government Data Release |
|
|
97 | (4) |
|
|
97 | (1) |
|
1.1 Government Data Collection |
|
|
97 | (1) |
|
1.2 Freedom of Information |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
E Discrimination Based on Data |
|
|
101 | (8) |
|
|
101 | (5) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
II Use of Personal Data in Big Data Processing |
|
|
106 | (3) |
|
F Compliance and Risk Mitigating Measures |
|
|
109 | (11) |
|
I Privacy Management Programs |
|
|
110 | (8) |
|
1 Achieving Data Protection Compliance |
|
|
110 | (2) |
|
2 Privacy Operational Life Cycle |
|
|
112 | (1) |
|
3 Communication and Training |
|
|
113 | (1) |
|
4 Response to Data Protection Issues |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (2) |
|
II Non-disclosure Agreements and Internal Protocols |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (2) |
|
|
120 | (14) |
|
|
121 | (4) |
|
II Security and the Internet of Things |
|
|
125 | (6) |
|
III Labor Law Challenges of IT Sourcing |
|
|
131 | (3) |
|
Part 4 Outlook on Future Developments |
|
|
134 | (4) |
|
|
134 | (2) |
|
|
136 | (2) |
|
|
138 | |
|
A Comparative Table --- Government Access |
|
|
138 | (2) |
|
|
140 | |
|
|
140 | (3) |
|
II Interview 2 (Consulting) |
|
|
143 | (1) |
|
III Interview 3 (IT Security) |
|
|
144 | (1) |
|
|
145 | (3) |
|
V Interview 5 (Consulting) |
|
|
148 | (2) |
|
|
150 | (3) |
|
|
153 | (3) |
|
|
156 | (3) |
|
IX Interview 9 (IT Security) |
|
|
159 | (1) |
|
|
160 | (1) |
|
XI Interview 11 (Consulting & SaaS Development) |
|
|
161 | |