Privacy and border controls in the fight against terrorism : : a fundamental rights analysis of passenger data sharing / / Elif Mendos Kuskonmaz.

This book offers a legal analysis of sharing of passenger data from the EU to the US in light of the EU legal framework protecting individuals' privacy and personal data. It aims to situate this analysis with respect to the ever-growing policies of Global North countries to introduce pre-screen...

Full description

Saved in:
Bibliographic Details
Superior document:Immigration and Asylum Law and Policy in Europe ; Volume 48
VerfasserIn:
Place / Publishing House:Leiden ;, Boston : : Brill Nijhoff,, [2021]
©2021
Year of Publication:2021
Language:English
Series:Immigration and asylum law and policy in Europe ; Volume 48.
Physical Description:1 online resource.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993583062904498
ctrlnum (CKB)4100000011812054
(nllekb)BRILL9789004439498
(MiAaPQ)EBC6526826
(Au-PeEL)EBL6526826
(OCoLC)1226075716
(EXLCZ)994100000011812054
collection bib_alma
record_format marc
spelling Kuşkonmaz, Elif Mendos, author.
Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing / Elif Mendos Kuskonmaz.
Leiden ; Boston : Brill Nijhoff, [2021]
©2021
1 online resource.
text txt rdacontent
computer c rdamedia
online resource rdacarrier
Immigration and Asylum Law and Policy in Europe ; Volume 48
This book offers a legal analysis of sharing of passenger data from the EU to the US in light of the EU legal framework protecting individuals' privacy and personal data. It aims to situate this analysis with respect to the ever-growing policies of Global North countries to introduce pre-screening procedures in border control proceedings for the purpose of the fight against terrorism. By tracing the literature on the (in)securitisation and as such depoliticization of border controls through technology-led interventions, it explores the multiplicity of purposes that passenger data sharing entail and considers the question on the limitability of fundamental rights depending on its purpose.
Includes bibliographical references and index.
Acknowledgements -- Abbreviations -- Introduction -- 1 Putting PNR Data into Context -- Privacy and Personal Data Protection in the EU and in the US -- Introduction -- 1 Mapping Privacy and Protection of Personal Data -- 1.1 Façades of Privacy -- 1.2 Tracing Privacy from Antiquity to Modernity in the Doctrine -- 1.3 Protection of Personal Data: Intersection of Technology and Information -- 2 Privacy and Personal Data Protection Regimes in the EU and in the US -- 2.1 Privacy and Protection of Personal Data in the EU -- 2.1.1 Protections under the ECHR -- 2.1.1.1 Privacy and the ECHR -- 2.1.1.2 Personal Data Protection and the ECHR -- 2.1.2 Protections under the Charter -- 2.1.2.1 Privacy and the Charter -- 2.1.2.2 Personal Data Protection and the Charter -- 2.1.2.2.1 The Fundamental Right to Data Protection -- 2.1.2.2.2 What Qualifies as an Interference with the Fundamental Right of Data Protection? -- 2.2 Privacy and Protection of Personal Data in the US -- 2.2.1 Privacy Protection under the Fourth Amendment -- 2.2.2 Privacy Protection under Federal Statutes -- Conclusion -- 2 Right to Privacy and Right to Protection of Personal Data under the ECHR and the Charter -- Introduction -- 1 Judicial Assessment by the European Court of Human Rights -- 1.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 1.1.1 Interception of Electronic Communications -- 1.1.1.1 Interception of Electronic Communications for National Security Purposes -- 1.1.1.2 Interception of Electronic Communications in the Context of Prevention and Investigations of Crimes -- 1.1.2 Information Collection -- 1.1.2.1 Information Collection for National Security Purposes -- 1.1.2.2 Information Collection in the Context of Prevention and Investigations of Crimes -- 1.1.3 Information Transfer -- 1.2 Compatibility with the Right to Privacy -- 1.2.1 In Accordance with the Law -- 1.2.1.1 Foreseeability Requirement for the Telecommunications Interception in the Context of Criminal Investigations.
1.2.1.2 Foreseeability Requirement for the Telecommunications Interception for the Interests of National Security -- 1.2.1.2.1 Foreseeability in Relation to the Nature of Offences -- 1.2.1.2.2 Foreseeability in Relation to the Target Group -- 1.2.1.2.3 Foreseeability in Relation to the Procedural Safeguards -- 1.2.1.3 Foreseeability Requirement for Information Collection -- 1.2.2 Legitimate Aim -- 1.2.3 Requirement of Being Necessary in a Democratic Society -- 1.2.3.1 The 'Necessity' Test for Telecommunications Interception -- 1.2.3.2 The 'Necessity' Test for Information Collection -- 1.2.3.3 The 'Necessity' Test for Information Transfer -- 2 Judicial Assessment of the Court of Justice of the European Union -- 2.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 2.2 Nature of the Interference -- 2.3 Limitations under the Charter -- 2.3.1 Provided for by Law -- 2.3.2 The Respect of the Essence of the Rights -- 2.3.3 Objective of General Interest -- 2.3.4 Proportionality in View of the Objective -- 2.3.4.1 The Criterion of Appropriateness -- 2.3.4.2 The Criterion of Necessity -- 2.3.4.3 Proportionality in the Narrower Sense -- 2.3.4.3.1 Retention of Personal Data -- 2.3.4.3.2 Access to Personal Data -- 2.3.4.3.3 Use of Personal Data -- 2.3.4.3.4 Transfer of Personal Data -- 2.3.4.4 Proportionality with Respect to Data Security -- 2.3.4.5 Proportionality with Respect to the Rights of Individuals -- 2.3.4.6 Proportionality with Respect to the Oversight Mechanism -- Conclusion -- 3 Birth of PNR Data and the EU-US PNR Agreement -- Introduction -- 1 Genesis of PNR Data -- 2 PNR Data and Counter-Terrorism: The History behind the EU-US PNR Agreement -- 3 The EU-US PNR Agreement -- 3.1 Legal Basis of the EU-US PNR Agreement -- 3.2 Terms of the EU-US PNR Agreement -- 3.2.1 Scope of the EU-US PNR Agreement -- 3.2.2 Purpose of the EU-US PNR Agreement -- 3.2.3 PNR Data Transfers under the EU-US PNR Agreement -- 3.2.3.1 Method of Transfer -- 3.2.3.2 Categories of pnr Data to be Transferred -- 3.2.3.3 Sensitive Data -- 3.2.4 Retention Period -- 3.2.5 Recipients of PNR Data -- 3.2.6 Data Security -- 3.2.7 Rights of Individuals -- 3.2.7.1 Access -- 3.2.7.2 Rectification -- 3.2.7.3 Redress -- 3.2.7.4 Information -- 3.2.8 Oversight Mechanism -- 3.2.9 Review of the EU-US PNR Agreement -- Conclusion.
4 From Theory to Practice -- What Is the Added Value of PNR Data? -- Introduction -- 1 The Main Database for PNR Data: Automated Targeting System -- 1.1 Automated Targeting System and Data-Processing Techniques -- 1.1.1 An Overview of the Types of Data-Processing Techniques -- 1.1.2 Automated Targeting System and Data-Processing Techniques -- 1.2 Automated Targeting System Data Sources -- 2 System under which PNR Data Are Used -- 2.1 Processing of the PNR Data -- 2.1.1 Comparison -- 2.1.2 Risk Assessment -- 2.2 Users of the System -- 2.3 Access to PNR Data -- 2.4 Sharing PNR Data with Other US Agencies -- 2.5 Sharing PNR Data Internationally -- 3 Expertise of Automated Targeting System Users -- Conclusion -- 5 Evaluation of the EU-US PNR Agreement with the European and EU Legal Framework for Privacy and Personal Data Protection -- Introduction -- 1 Evaluation of the PNR Agreement with the Right to Privacy and Personal Data Protection -- 1.1 Attracting the Protection of the Right to Privacy and Data Protection -- 1.2 Nature of the Interference by the pnr Agreement -- 2 Justification of the Interference by the PNR Agreement -- 2.1 The Legal Ground -- 2.2 The Respect of Essence of the Rights -- 2.3 Objective of General Interest -- 2.4 Proportionality in View of the Objective 174 2.4.1 Appropriateness of the pnr Agreement with Respect to Counter-Terrorism -- 2.4.2 Necessity of the PNR Agreement with Respect to Counter-Terrorism -- 2.4.3 Proportionality in the Narrower Sense -- 2.4.3.1 Purposes of PNR Data Processing -- 2.4.3.2 Rules on the Transfer of PNR Data -- 2.4.3.2.1 Method of Transfer -- 2.4.3.2.2 Categories of PNR Data to be Transferred -- 2.4.3.3 Rules on the Use of PNR Data -- 2.4.3.3.1 Real-Time Use of pnr Data upon Arrival -- 2.4.3.3.2 Historical Use of pnr Data: From Arrival until After Departure -- 2.4.3.4 Rules on the Retention of pnr Data -- 2.4.3.5 Rules on Access to PNR Data -- 2.4.3.6 Onward Transfer of PNR Data -- 2.4.4 Proportionality with Respect to Rules on Data Security -- 2.4.5 Proportionality with Respect to Rights of Individuals -- 2.4.6 Proportionality with Respect to Oversight Mechanism -- Conclusion -- 6 The Border -- A Crossroads for Terrorists and Criminals? -- Introduction -- 1 The Border as the Reach of Criminal Jurisdiction -- 1.1 Substantive Cross-Border Crimes: Borrowing a Criminology Lexicon -- 1.1.1 EU Law and Cross-Border Crimes -- 1.1.2 US Law and Cross-Border Crimes -- 1.1.3 Conclusive Remarks on Cross-Border Crimes -- 1.2 Terrorism: Co-operation against an Unidentified Legal Phenomenon -- 1.2.1 Terrorism under EU Law.
1.2.2 Terrorism under US Law -- 1.2.3 Conclusive Remarks on the Definition of Terrorism -- 1.3 Enforcement against Cross-Border Criminality and Terrorism: EU-US Mutual Legal Assistance Agreement -- 2 The Border as the Making of States and Citizens -- 2.1 Containment of Cross-Border Crimes and Terrorism through Border Controls -- 2.1.1 EU Border Control: Wrapping Free Movement around Security Interests -- 2.1.2 US Border Control: The Coming of Homeland Security -- 2.1.3 Conclusive Remarks on Border Controls and Terrorism -- 2.2 Securing Borders through Virtual Identities -- Conclusion -- Conclusion -- 1 The EU-US PNR Agreement: The Story of a Cooperation Out of a Conflict of Laws -- 2 In Search of a Suspicion Requirement -- 3 Substantive Assessment of the EU-US PNR Agreement -- 4 Further Questions on the EU-US PNR Agreement as Part of Border Management -- Bibliography -- Index.
Description based on print version record.
Data protection Law and legislation European Union countries.
Agreement between the United States of America and the European Union on the use and transfer of passenger name records to the United States Department of Homeland Security (2011 December 14)
Immigration and asylum law and policy in Europe ; Volume 48.
language English
format eBook
author Kuşkonmaz, Elif Mendos,
spellingShingle Kuşkonmaz, Elif Mendos,
Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing /
Immigration and Asylum Law and Policy in Europe ;
Acknowledgements -- Abbreviations -- Introduction -- 1 Putting PNR Data into Context -- Privacy and Personal Data Protection in the EU and in the US -- Introduction -- 1 Mapping Privacy and Protection of Personal Data -- 1.1 Façades of Privacy -- 1.2 Tracing Privacy from Antiquity to Modernity in the Doctrine -- 1.3 Protection of Personal Data: Intersection of Technology and Information -- 2 Privacy and Personal Data Protection Regimes in the EU and in the US -- 2.1 Privacy and Protection of Personal Data in the EU -- 2.1.1 Protections under the ECHR -- 2.1.1.1 Privacy and the ECHR -- 2.1.1.2 Personal Data Protection and the ECHR -- 2.1.2 Protections under the Charter -- 2.1.2.1 Privacy and the Charter -- 2.1.2.2 Personal Data Protection and the Charter -- 2.1.2.2.1 The Fundamental Right to Data Protection -- 2.1.2.2.2 What Qualifies as an Interference with the Fundamental Right of Data Protection? -- 2.2 Privacy and Protection of Personal Data in the US -- 2.2.1 Privacy Protection under the Fourth Amendment -- 2.2.2 Privacy Protection under Federal Statutes -- Conclusion -- 2 Right to Privacy and Right to Protection of Personal Data under the ECHR and the Charter -- Introduction -- 1 Judicial Assessment by the European Court of Human Rights -- 1.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 1.1.1 Interception of Electronic Communications -- 1.1.1.1 Interception of Electronic Communications for National Security Purposes -- 1.1.1.2 Interception of Electronic Communications in the Context of Prevention and Investigations of Crimes -- 1.1.2 Information Collection -- 1.1.2.1 Information Collection for National Security Purposes -- 1.1.2.2 Information Collection in the Context of Prevention and Investigations of Crimes -- 1.1.3 Information Transfer -- 1.2 Compatibility with the Right to Privacy -- 1.2.1 In Accordance with the Law -- 1.2.1.1 Foreseeability Requirement for the Telecommunications Interception in the Context of Criminal Investigations.
1.2.1.2 Foreseeability Requirement for the Telecommunications Interception for the Interests of National Security -- 1.2.1.2.1 Foreseeability in Relation to the Nature of Offences -- 1.2.1.2.2 Foreseeability in Relation to the Target Group -- 1.2.1.2.3 Foreseeability in Relation to the Procedural Safeguards -- 1.2.1.3 Foreseeability Requirement for Information Collection -- 1.2.2 Legitimate Aim -- 1.2.3 Requirement of Being Necessary in a Democratic Society -- 1.2.3.1 The 'Necessity' Test for Telecommunications Interception -- 1.2.3.2 The 'Necessity' Test for Information Collection -- 1.2.3.3 The 'Necessity' Test for Information Transfer -- 2 Judicial Assessment of the Court of Justice of the European Union -- 2.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 2.2 Nature of the Interference -- 2.3 Limitations under the Charter -- 2.3.1 Provided for by Law -- 2.3.2 The Respect of the Essence of the Rights -- 2.3.3 Objective of General Interest -- 2.3.4 Proportionality in View of the Objective -- 2.3.4.1 The Criterion of Appropriateness -- 2.3.4.2 The Criterion of Necessity -- 2.3.4.3 Proportionality in the Narrower Sense -- 2.3.4.3.1 Retention of Personal Data -- 2.3.4.3.2 Access to Personal Data -- 2.3.4.3.3 Use of Personal Data -- 2.3.4.3.4 Transfer of Personal Data -- 2.3.4.4 Proportionality with Respect to Data Security -- 2.3.4.5 Proportionality with Respect to the Rights of Individuals -- 2.3.4.6 Proportionality with Respect to the Oversight Mechanism -- Conclusion -- 3 Birth of PNR Data and the EU-US PNR Agreement -- Introduction -- 1 Genesis of PNR Data -- 2 PNR Data and Counter-Terrorism: The History behind the EU-US PNR Agreement -- 3 The EU-US PNR Agreement -- 3.1 Legal Basis of the EU-US PNR Agreement -- 3.2 Terms of the EU-US PNR Agreement -- 3.2.1 Scope of the EU-US PNR Agreement -- 3.2.2 Purpose of the EU-US PNR Agreement -- 3.2.3 PNR Data Transfers under the EU-US PNR Agreement -- 3.2.3.1 Method of Transfer -- 3.2.3.2 Categories of pnr Data to be Transferred -- 3.2.3.3 Sensitive Data -- 3.2.4 Retention Period -- 3.2.5 Recipients of PNR Data -- 3.2.6 Data Security -- 3.2.7 Rights of Individuals -- 3.2.7.1 Access -- 3.2.7.2 Rectification -- 3.2.7.3 Redress -- 3.2.7.4 Information -- 3.2.8 Oversight Mechanism -- 3.2.9 Review of the EU-US PNR Agreement -- Conclusion.
4 From Theory to Practice -- What Is the Added Value of PNR Data? -- Introduction -- 1 The Main Database for PNR Data: Automated Targeting System -- 1.1 Automated Targeting System and Data-Processing Techniques -- 1.1.1 An Overview of the Types of Data-Processing Techniques -- 1.1.2 Automated Targeting System and Data-Processing Techniques -- 1.2 Automated Targeting System Data Sources -- 2 System under which PNR Data Are Used -- 2.1 Processing of the PNR Data -- 2.1.1 Comparison -- 2.1.2 Risk Assessment -- 2.2 Users of the System -- 2.3 Access to PNR Data -- 2.4 Sharing PNR Data with Other US Agencies -- 2.5 Sharing PNR Data Internationally -- 3 Expertise of Automated Targeting System Users -- Conclusion -- 5 Evaluation of the EU-US PNR Agreement with the European and EU Legal Framework for Privacy and Personal Data Protection -- Introduction -- 1 Evaluation of the PNR Agreement with the Right to Privacy and Personal Data Protection -- 1.1 Attracting the Protection of the Right to Privacy and Data Protection -- 1.2 Nature of the Interference by the pnr Agreement -- 2 Justification of the Interference by the PNR Agreement -- 2.1 The Legal Ground -- 2.2 The Respect of Essence of the Rights -- 2.3 Objective of General Interest -- 2.4 Proportionality in View of the Objective 174 2.4.1 Appropriateness of the pnr Agreement with Respect to Counter-Terrorism -- 2.4.2 Necessity of the PNR Agreement with Respect to Counter-Terrorism -- 2.4.3 Proportionality in the Narrower Sense -- 2.4.3.1 Purposes of PNR Data Processing -- 2.4.3.2 Rules on the Transfer of PNR Data -- 2.4.3.2.1 Method of Transfer -- 2.4.3.2.2 Categories of PNR Data to be Transferred -- 2.4.3.3 Rules on the Use of PNR Data -- 2.4.3.3.1 Real-Time Use of pnr Data upon Arrival -- 2.4.3.3.2 Historical Use of pnr Data: From Arrival until After Departure -- 2.4.3.4 Rules on the Retention of pnr Data -- 2.4.3.5 Rules on Access to PNR Data -- 2.4.3.6 Onward Transfer of PNR Data -- 2.4.4 Proportionality with Respect to Rules on Data Security -- 2.4.5 Proportionality with Respect to Rights of Individuals -- 2.4.6 Proportionality with Respect to Oversight Mechanism -- Conclusion -- 6 The Border -- A Crossroads for Terrorists and Criminals? -- Introduction -- 1 The Border as the Reach of Criminal Jurisdiction -- 1.1 Substantive Cross-Border Crimes: Borrowing a Criminology Lexicon -- 1.1.1 EU Law and Cross-Border Crimes -- 1.1.2 US Law and Cross-Border Crimes -- 1.1.3 Conclusive Remarks on Cross-Border Crimes -- 1.2 Terrorism: Co-operation against an Unidentified Legal Phenomenon -- 1.2.1 Terrorism under EU Law.
1.2.2 Terrorism under US Law -- 1.2.3 Conclusive Remarks on the Definition of Terrorism -- 1.3 Enforcement against Cross-Border Criminality and Terrorism: EU-US Mutual Legal Assistance Agreement -- 2 The Border as the Making of States and Citizens -- 2.1 Containment of Cross-Border Crimes and Terrorism through Border Controls -- 2.1.1 EU Border Control: Wrapping Free Movement around Security Interests -- 2.1.2 US Border Control: The Coming of Homeland Security -- 2.1.3 Conclusive Remarks on Border Controls and Terrorism -- 2.2 Securing Borders through Virtual Identities -- Conclusion -- Conclusion -- 1 The EU-US PNR Agreement: The Story of a Cooperation Out of a Conflict of Laws -- 2 In Search of a Suspicion Requirement -- 3 Substantive Assessment of the EU-US PNR Agreement -- 4 Further Questions on the EU-US PNR Agreement as Part of Border Management -- Bibliography -- Index.
author_facet Kuşkonmaz, Elif Mendos,
author_variant e m k em emk
author_role VerfasserIn
author_sort Kuşkonmaz, Elif Mendos,
title Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing /
title_sub a fundamental rights analysis of passenger data sharing /
title_full Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing / Elif Mendos Kuskonmaz.
title_fullStr Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing / Elif Mendos Kuskonmaz.
title_full_unstemmed Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing / Elif Mendos Kuskonmaz.
title_auth Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing /
title_new Privacy and border controls in the fight against terrorism :
title_sort privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing /
series Immigration and Asylum Law and Policy in Europe ;
series2 Immigration and Asylum Law and Policy in Europe ;
publisher Brill Nijhoff,
publishDate 2021
physical 1 online resource.
contents Acknowledgements -- Abbreviations -- Introduction -- 1 Putting PNR Data into Context -- Privacy and Personal Data Protection in the EU and in the US -- Introduction -- 1 Mapping Privacy and Protection of Personal Data -- 1.1 Façades of Privacy -- 1.2 Tracing Privacy from Antiquity to Modernity in the Doctrine -- 1.3 Protection of Personal Data: Intersection of Technology and Information -- 2 Privacy and Personal Data Protection Regimes in the EU and in the US -- 2.1 Privacy and Protection of Personal Data in the EU -- 2.1.1 Protections under the ECHR -- 2.1.1.1 Privacy and the ECHR -- 2.1.1.2 Personal Data Protection and the ECHR -- 2.1.2 Protections under the Charter -- 2.1.2.1 Privacy and the Charter -- 2.1.2.2 Personal Data Protection and the Charter -- 2.1.2.2.1 The Fundamental Right to Data Protection -- 2.1.2.2.2 What Qualifies as an Interference with the Fundamental Right of Data Protection? -- 2.2 Privacy and Protection of Personal Data in the US -- 2.2.1 Privacy Protection under the Fourth Amendment -- 2.2.2 Privacy Protection under Federal Statutes -- Conclusion -- 2 Right to Privacy and Right to Protection of Personal Data under the ECHR and the Charter -- Introduction -- 1 Judicial Assessment by the European Court of Human Rights -- 1.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 1.1.1 Interception of Electronic Communications -- 1.1.1.1 Interception of Electronic Communications for National Security Purposes -- 1.1.1.2 Interception of Electronic Communications in the Context of Prevention and Investigations of Crimes -- 1.1.2 Information Collection -- 1.1.2.1 Information Collection for National Security Purposes -- 1.1.2.2 Information Collection in the Context of Prevention and Investigations of Crimes -- 1.1.3 Information Transfer -- 1.2 Compatibility with the Right to Privacy -- 1.2.1 In Accordance with the Law -- 1.2.1.1 Foreseeability Requirement for the Telecommunications Interception in the Context of Criminal Investigations.
1.2.1.2 Foreseeability Requirement for the Telecommunications Interception for the Interests of National Security -- 1.2.1.2.1 Foreseeability in Relation to the Nature of Offences -- 1.2.1.2.2 Foreseeability in Relation to the Target Group -- 1.2.1.2.3 Foreseeability in Relation to the Procedural Safeguards -- 1.2.1.3 Foreseeability Requirement for Information Collection -- 1.2.2 Legitimate Aim -- 1.2.3 Requirement of Being Necessary in a Democratic Society -- 1.2.3.1 The 'Necessity' Test for Telecommunications Interception -- 1.2.3.2 The 'Necessity' Test for Information Collection -- 1.2.3.3 The 'Necessity' Test for Information Transfer -- 2 Judicial Assessment of the Court of Justice of the European Union -- 2.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 2.2 Nature of the Interference -- 2.3 Limitations under the Charter -- 2.3.1 Provided for by Law -- 2.3.2 The Respect of the Essence of the Rights -- 2.3.3 Objective of General Interest -- 2.3.4 Proportionality in View of the Objective -- 2.3.4.1 The Criterion of Appropriateness -- 2.3.4.2 The Criterion of Necessity -- 2.3.4.3 Proportionality in the Narrower Sense -- 2.3.4.3.1 Retention of Personal Data -- 2.3.4.3.2 Access to Personal Data -- 2.3.4.3.3 Use of Personal Data -- 2.3.4.3.4 Transfer of Personal Data -- 2.3.4.4 Proportionality with Respect to Data Security -- 2.3.4.5 Proportionality with Respect to the Rights of Individuals -- 2.3.4.6 Proportionality with Respect to the Oversight Mechanism -- Conclusion -- 3 Birth of PNR Data and the EU-US PNR Agreement -- Introduction -- 1 Genesis of PNR Data -- 2 PNR Data and Counter-Terrorism: The History behind the EU-US PNR Agreement -- 3 The EU-US PNR Agreement -- 3.1 Legal Basis of the EU-US PNR Agreement -- 3.2 Terms of the EU-US PNR Agreement -- 3.2.1 Scope of the EU-US PNR Agreement -- 3.2.2 Purpose of the EU-US PNR Agreement -- 3.2.3 PNR Data Transfers under the EU-US PNR Agreement -- 3.2.3.1 Method of Transfer -- 3.2.3.2 Categories of pnr Data to be Transferred -- 3.2.3.3 Sensitive Data -- 3.2.4 Retention Period -- 3.2.5 Recipients of PNR Data -- 3.2.6 Data Security -- 3.2.7 Rights of Individuals -- 3.2.7.1 Access -- 3.2.7.2 Rectification -- 3.2.7.3 Redress -- 3.2.7.4 Information -- 3.2.8 Oversight Mechanism -- 3.2.9 Review of the EU-US PNR Agreement -- Conclusion.
4 From Theory to Practice -- What Is the Added Value of PNR Data? -- Introduction -- 1 The Main Database for PNR Data: Automated Targeting System -- 1.1 Automated Targeting System and Data-Processing Techniques -- 1.1.1 An Overview of the Types of Data-Processing Techniques -- 1.1.2 Automated Targeting System and Data-Processing Techniques -- 1.2 Automated Targeting System Data Sources -- 2 System under which PNR Data Are Used -- 2.1 Processing of the PNR Data -- 2.1.1 Comparison -- 2.1.2 Risk Assessment -- 2.2 Users of the System -- 2.3 Access to PNR Data -- 2.4 Sharing PNR Data with Other US Agencies -- 2.5 Sharing PNR Data Internationally -- 3 Expertise of Automated Targeting System Users -- Conclusion -- 5 Evaluation of the EU-US PNR Agreement with the European and EU Legal Framework for Privacy and Personal Data Protection -- Introduction -- 1 Evaluation of the PNR Agreement with the Right to Privacy and Personal Data Protection -- 1.1 Attracting the Protection of the Right to Privacy and Data Protection -- 1.2 Nature of the Interference by the pnr Agreement -- 2 Justification of the Interference by the PNR Agreement -- 2.1 The Legal Ground -- 2.2 The Respect of Essence of the Rights -- 2.3 Objective of General Interest -- 2.4 Proportionality in View of the Objective 174 2.4.1 Appropriateness of the pnr Agreement with Respect to Counter-Terrorism -- 2.4.2 Necessity of the PNR Agreement with Respect to Counter-Terrorism -- 2.4.3 Proportionality in the Narrower Sense -- 2.4.3.1 Purposes of PNR Data Processing -- 2.4.3.2 Rules on the Transfer of PNR Data -- 2.4.3.2.1 Method of Transfer -- 2.4.3.2.2 Categories of PNR Data to be Transferred -- 2.4.3.3 Rules on the Use of PNR Data -- 2.4.3.3.1 Real-Time Use of pnr Data upon Arrival -- 2.4.3.3.2 Historical Use of pnr Data: From Arrival until After Departure -- 2.4.3.4 Rules on the Retention of pnr Data -- 2.4.3.5 Rules on Access to PNR Data -- 2.4.3.6 Onward Transfer of PNR Data -- 2.4.4 Proportionality with Respect to Rules on Data Security -- 2.4.5 Proportionality with Respect to Rights of Individuals -- 2.4.6 Proportionality with Respect to Oversight Mechanism -- Conclusion -- 6 The Border -- A Crossroads for Terrorists and Criminals? -- Introduction -- 1 The Border as the Reach of Criminal Jurisdiction -- 1.1 Substantive Cross-Border Crimes: Borrowing a Criminology Lexicon -- 1.1.1 EU Law and Cross-Border Crimes -- 1.1.2 US Law and Cross-Border Crimes -- 1.1.3 Conclusive Remarks on Cross-Border Crimes -- 1.2 Terrorism: Co-operation against an Unidentified Legal Phenomenon -- 1.2.1 Terrorism under EU Law.
1.2.2 Terrorism under US Law -- 1.2.3 Conclusive Remarks on the Definition of Terrorism -- 1.3 Enforcement against Cross-Border Criminality and Terrorism: EU-US Mutual Legal Assistance Agreement -- 2 The Border as the Making of States and Citizens -- 2.1 Containment of Cross-Border Crimes and Terrorism through Border Controls -- 2.1.1 EU Border Control: Wrapping Free Movement around Security Interests -- 2.1.2 US Border Control: The Coming of Homeland Security -- 2.1.3 Conclusive Remarks on Border Controls and Terrorism -- 2.2 Securing Borders through Virtual Identities -- Conclusion -- Conclusion -- 1 The EU-US PNR Agreement: The Story of a Cooperation Out of a Conflict of Laws -- 2 In Search of a Suspicion Requirement -- 3 Substantive Assessment of the EU-US PNR Agreement -- 4 Further Questions on the EU-US PNR Agreement as Part of Border Management -- Bibliography -- Index.
isbn 90-04-43949-8
978-90-04-43949-8
90-04-43948-X
978-90-04-43948-1
callnumber-first K - Law
callnumber-label KJE6071
callnumber-sort KJE 46071 K875 42021
geographic_facet European Union countries.
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 340 - Law
dewey-ones 343 - Military, tax, trade & industrial law
dewey-full 343.240999
dewey-sort 3343.240999
dewey-raw 343.240999
dewey-search 343.240999
oclc_num 1226075716
work_keys_str_mv AT kuskonmazelifmendos privacyandbordercontrolsinthefightagainstterrorismafundamentalrightsanalysisofpassengerdatasharing
status_str n
ids_txt_mv (CKB)4100000011812054
(OCoLC)1204343504
(nllekb)BRILL9789004439498
(MiAaPQ)EBC6526826
(Au-PeEL)EBL6526826
(OCoLC)1226075716
(EXLCZ)994100000011812054
hierarchy_parent_title Immigration and Asylum Law and Policy in Europe ; Volume 48
hierarchy_sequence Volume 48.
is_hierarchy_title Privacy and border controls in the fight against terrorism : a fundamental rights analysis of passenger data sharing /
container_title Immigration and Asylum Law and Policy in Europe ; Volume 48
_version_ 1796652886693773313
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10392nam a2200529 i 4500</leader><controlfield tag="001">993583062904498</controlfield><controlfield tag="005">20230630001829.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#un####uuuua</controlfield><controlfield tag="008">211015s2021 ne o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">90-04-43949-8</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">978-90-04-43949-8</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">90-04-43948-X</subfield><subfield code="q">hardback</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">978-90-04-43948-1</subfield><subfield code="q">hardback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1163/9789004439498</subfield><subfield code="2">DOI</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000011812054</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="z">(OCoLC)1204343504</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(nllekb)BRILL9789004439498</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6526826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6526826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1226075716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000011812054</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e------</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KJE6071</subfield><subfield code="b">.K875 2021</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LBBR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">051000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">035010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.240999</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kuşkonmaz, Elif Mendos,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy and border controls in the fight against terrorism :</subfield><subfield code="b">a fundamental rights analysis of passenger data sharing /</subfield><subfield code="c">Elif Mendos Kuskonmaz.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Leiden ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Brill Nijhoff,</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Immigration and Asylum Law and Policy in Europe ;</subfield><subfield code="v">Volume 48</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book offers a legal analysis of sharing of passenger data from the EU to the US in light of the EU legal framework protecting individuals' privacy and personal data. It aims to situate this analysis with respect to the ever-growing policies of Global North countries to introduce pre-screening procedures in border control proceedings for the purpose of the fight against terrorism. By tracing the literature on the (in)securitisation and as such depoliticization of border controls through technology-led interventions, it explores the multiplicity of purposes that passenger data sharing entail and considers the question on the limitability of fundamental rights depending on its purpose.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Acknowledgements -- Abbreviations -- Introduction -- 1 Putting PNR Data into Context -- Privacy and Personal Data Protection in the EU and in the US -- Introduction -- 1 Mapping Privacy and Protection of Personal Data -- 1.1 Façades of Privacy -- 1.2 Tracing Privacy from Antiquity to Modernity in the Doctrine -- 1.3 Protection of Personal Data: Intersection of Technology and Information -- 2 Privacy and Personal Data Protection Regimes in the EU and in the US -- 2.1 Privacy and Protection of Personal Data in the EU -- 2.1.1 Protections under the ECHR -- 2.1.1.1 Privacy and the ECHR -- 2.1.1.2 Personal Data Protection and the ECHR -- 2.1.2 Protections under the Charter -- 2.1.2.1 Privacy and the Charter -- 2.1.2.2 Personal Data Protection and the Charter -- 2.1.2.2.1 The Fundamental Right to Data Protection -- 2.1.2.2.2 What Qualifies as an Interference with the Fundamental Right of Data Protection? -- 2.2 Privacy and Protection of Personal Data in the US -- 2.2.1 Privacy Protection under the Fourth Amendment -- 2.2.2 Privacy Protection under Federal Statutes -- Conclusion -- 2 Right to Privacy and Right to Protection of Personal Data under the ECHR and the Charter -- Introduction -- 1 Judicial Assessment by the European Court of Human Rights -- 1.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 1.1.1 Interception of Electronic Communications -- 1.1.1.1 Interception of Electronic Communications for National Security Purposes -- 1.1.1.2 Interception of Electronic Communications in the Context of Prevention and Investigations of Crimes -- 1.1.2 Information Collection -- 1.1.2.1 Information Collection for National Security Purposes -- 1.1.2.2 Information Collection in the Context of Prevention and Investigations of Crimes -- 1.1.3 Information Transfer -- 1.2 Compatibility with the Right to Privacy -- 1.2.1 In Accordance with the Law -- 1.2.1.1 Foreseeability Requirement for the Telecommunications Interception in the Context of Criminal Investigations.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1.2.1.2 Foreseeability Requirement for the Telecommunications Interception for the Interests of National Security -- 1.2.1.2.1 Foreseeability in Relation to the Nature of Offences -- 1.2.1.2.2 Foreseeability in Relation to the Target Group -- 1.2.1.2.3 Foreseeability in Relation to the Procedural Safeguards -- 1.2.1.3 Foreseeability Requirement for Information Collection -- 1.2.2 Legitimate Aim -- 1.2.3 Requirement of Being Necessary in a Democratic Society -- 1.2.3.1 The 'Necessity' Test for Telecommunications Interception -- 1.2.3.2 The 'Necessity' Test for Information Collection -- 1.2.3.3 The 'Necessity' Test for Information Transfer -- 2 Judicial Assessment of the Court of Justice of the European Union -- 2.1 Interferences by Measures to Counter Terrorism and Serious Crime -- 2.2 Nature of the Interference -- 2.3 Limitations under the Charter -- 2.3.1 Provided for by Law -- 2.3.2 The Respect of the Essence of the Rights -- 2.3.3 Objective of General Interest -- 2.3.4 Proportionality in View of the Objective -- 2.3.4.1 The Criterion of Appropriateness -- 2.3.4.2 The Criterion of Necessity -- 2.3.4.3 Proportionality in the Narrower Sense -- 2.3.4.3.1 Retention of Personal Data -- 2.3.4.3.2 Access to Personal Data -- 2.3.4.3.3 Use of Personal Data -- 2.3.4.3.4 Transfer of Personal Data -- 2.3.4.4 Proportionality with Respect to Data Security -- 2.3.4.5 Proportionality with Respect to the Rights of Individuals -- 2.3.4.6 Proportionality with Respect to the Oversight Mechanism -- Conclusion -- 3 Birth of PNR Data and the EU-US PNR Agreement -- Introduction -- 1 Genesis of PNR Data -- 2 PNR Data and Counter-Terrorism: The History behind the EU-US PNR Agreement -- 3 The EU-US PNR Agreement -- 3.1 Legal Basis of the EU-US PNR Agreement -- 3.2 Terms of the EU-US PNR Agreement -- 3.2.1 Scope of the EU-US PNR Agreement -- 3.2.2 Purpose of the EU-US PNR Agreement -- 3.2.3 PNR Data Transfers under the EU-US PNR Agreement -- 3.2.3.1 Method of Transfer -- 3.2.3.2 Categories of pnr Data to be Transferred -- 3.2.3.3 Sensitive Data -- 3.2.4 Retention Period -- 3.2.5 Recipients of PNR Data -- 3.2.6 Data Security -- 3.2.7 Rights of Individuals -- 3.2.7.1 Access -- 3.2.7.2 Rectification -- 3.2.7.3 Redress -- 3.2.7.4 Information -- 3.2.8 Oversight Mechanism -- 3.2.9 Review of the EU-US PNR Agreement -- Conclusion.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">4 From Theory to Practice -- What Is the Added Value of PNR Data? -- Introduction -- 1 The Main Database for PNR Data: Automated Targeting System -- 1.1 Automated Targeting System and Data-Processing Techniques -- 1.1.1 An Overview of the Types of Data-Processing Techniques -- 1.1.2 Automated Targeting System and Data-Processing Techniques -- 1.2 Automated Targeting System Data Sources -- 2 System under which PNR Data Are Used -- 2.1 Processing of the PNR Data -- 2.1.1 Comparison -- 2.1.2 Risk Assessment -- 2.2 Users of the System -- 2.3 Access to PNR Data -- 2.4 Sharing PNR Data with Other US Agencies -- 2.5 Sharing PNR Data Internationally -- 3 Expertise of Automated Targeting System Users -- Conclusion -- 5 Evaluation of the EU-US PNR Agreement with the European and EU Legal Framework for Privacy and Personal Data Protection -- Introduction -- 1 Evaluation of the PNR Agreement with the Right to Privacy and Personal Data Protection -- 1.1 Attracting the Protection of the Right to Privacy and Data Protection -- 1.2 Nature of the Interference by the pnr Agreement -- 2 Justification of the Interference by the PNR Agreement -- 2.1 The Legal Ground -- 2.2 The Respect of Essence of the Rights -- 2.3 Objective of General Interest -- 2.4 Proportionality in View of the Objective 174 2.4.1 Appropriateness of the pnr Agreement with Respect to Counter-Terrorism -- 2.4.2 Necessity of the PNR Agreement with Respect to Counter-Terrorism -- 2.4.3 Proportionality in the Narrower Sense -- 2.4.3.1 Purposes of PNR Data Processing -- 2.4.3.2 Rules on the Transfer of PNR Data -- 2.4.3.2.1 Method of Transfer -- 2.4.3.2.2 Categories of PNR Data to be Transferred -- 2.4.3.3 Rules on the Use of PNR Data -- 2.4.3.3.1 Real-Time Use of pnr Data upon Arrival -- 2.4.3.3.2 Historical Use of pnr Data: From Arrival until After Departure -- 2.4.3.4 Rules on the Retention of pnr Data -- 2.4.3.5 Rules on Access to PNR Data -- 2.4.3.6 Onward Transfer of PNR Data -- 2.4.4 Proportionality with Respect to Rules on Data Security -- 2.4.5 Proportionality with Respect to Rights of Individuals -- 2.4.6 Proportionality with Respect to Oversight Mechanism -- Conclusion -- 6 The Border -- A Crossroads for Terrorists and Criminals? -- Introduction -- 1 The Border as the Reach of Criminal Jurisdiction -- 1.1 Substantive Cross-Border Crimes: Borrowing a Criminology Lexicon -- 1.1.1 EU Law and Cross-Border Crimes -- 1.1.2 US Law and Cross-Border Crimes -- 1.1.3 Conclusive Remarks on Cross-Border Crimes -- 1.2 Terrorism: Co-operation against an Unidentified Legal Phenomenon -- 1.2.1 Terrorism under EU Law.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1.2.2 Terrorism under US Law -- 1.2.3 Conclusive Remarks on the Definition of Terrorism -- 1.3 Enforcement against Cross-Border Criminality and Terrorism: EU-US Mutual Legal Assistance Agreement -- 2 The Border as the Making of States and Citizens -- 2.1 Containment of Cross-Border Crimes and Terrorism through Border Controls -- 2.1.1 EU Border Control: Wrapping Free Movement around Security Interests -- 2.1.2 US Border Control: The Coming of Homeland Security -- 2.1.3 Conclusive Remarks on Border Controls and Terrorism -- 2.2 Securing Borders through Virtual Identities -- Conclusion -- Conclusion -- 1 The EU-US PNR Agreement: The Story of a Cooperation Out of a Conflict of Laws -- 2 In Search of a Suspicion Requirement -- 3 Substantive Assessment of the EU-US PNR Agreement -- 4 Further Questions on the EU-US PNR Agreement as Part of Border Management -- Bibliography -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">European Union countries.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Agreement between the United States of America and the European Union on the use and transfer of passenger name records to the United States Department of Homeland Security</subfield><subfield code="d">(2011 December 14)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Immigration and asylum law and policy in Europe ;</subfield><subfield code="v">Volume 48.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-20 03:16:34 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-04-03 23:05:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">Brill</subfield><subfield code="P">EBA Brill All</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5343446720004498&amp;Force_direct=true</subfield><subfield code="Z">5343446720004498</subfield><subfield code="b">Available</subfield><subfield code="8">5343446720004498</subfield></datafield></record></collection>