Show Less
You do not have access to this content

Information Sovereignty

Data Privacy, Sovereign Powers and the Rule of Law

Radim Polcak and Dan J.B. Svantesson

This thought-provoking work elaborates on the assumption that information privacy is, in its essence, comparable to information sovereignty. This seemingly rudimentary observation serves as the basis for an analysis of various information instruments in domestic and international law. It also provides for the method to resolve situations where informational domains of individuals and/or states collide. Information Sovereignty combines a philosophical and methodological analysis of the phenomena of information, sovereignty and privacy. It also encompasses more practical discussions of cybersecurity and cross-border processing of personal data, including in the context of cross-border discovery of digital evidence.
Show Summary Details
You do not have access to this content

Chapter 4: Private information sovereignty

Data Privacy, Sovereign Powers and the Rule of Law

Radim Polcak and Dan J.B. Svantesson

Extract

Chapter 4 discusses the concept of information privacy and compares it with information sovereignty. It focuses on similar grounds of both concepts and on their practical implications. It also argues that a right to be let alone does not mean a right (or a must) to be left lonely. Consequently, the chapter highlights some possibilities of using one concept to resolve emerging problems of the other. Key words: information privacy, data privacy, right to be let alone, consent

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.