A risk to a right? Beyond data protection risk assessments

The proposal for a new European Data Protection Regulation introduces the novel obligation of performing data protection assessments. Since these assessments will become a mandatory exercise for those in control of data processing systems, they will become an important apparatus for the governance o...

Full description

Saved in:
Bibliographic Details
Published inComputer law & security review Vol. 32; no. 2; pp. 286 - 306
Main Authors van Dijk, Niels, Gellert, Raphaël, Rommetveit, Kjetil
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.04.2016
Subjects
Online AccessGet full text
ISSN2212-473X
2212-4748
DOI10.1016/j.clsr.2015.12.017

Cover

Abstract The proposal for a new European Data Protection Regulation introduces the novel obligation of performing data protection assessments. Since these assessments will become a mandatory exercise for those in control of data processing systems, they will become an important apparatus for the governance of new and emerging information technologies. This tool, and in particular the notion of “risks to the rights and freedoms of data subjects” which is at its core, epitomises the shift from classical legal practice to more risk-based approaches. Merging risks and rights in the proposed fashion could change their meanings into something hardly predictable. This contribution proposes to explore the nature of the relation between both concepts within the assessment of a “risk to a right”. It will start by mapping out the various relations that exist between risks and rights in different practices. This should serve to identify gaps in the way DPIAs are currently operationalised and might well determine whether the introduction of this methodology in its current form might itself pose a risk to the rights of privacy and data protection. In turn however, it can provide opportunities for improvement and for lessons to be drawn from other practices and expertise that strike different relations between risks and rights, like the ones found in environmental governance and courts.
AbstractList The proposal for a new European Data Protection Regulation introduces the novel obligation of performing data protection assessments. Since these assessments will become a mandatory exercise for those in control of data processing systems, they will become an important apparatus for the governance of new and emerging information technologies. This tool, and in particular the notion of "risks to the rights and freedoms of data subjects" which is at its core, epitomises the shift from classical legal practice to more risk-based approaches. Merging risks and rights in the proposed fashion could change their meanings into something hardly predictable. This contribution proposes to explore the nature of the relation between both concepts within the assessment of a "risk to a right". It will start by mapping out the various relations that exist between risks and rights in different practices. This should serve to identify gaps in the way DPIAs are currently operationalised and might well determine whether the introduction of this methodology in its current form might itself pose a risk to the rights of privacy and data protection. In turn however, it can provide opportunities for improvement and for lessons to be drawn from other practices and expertise that strike different relations between risks and rights, like the ones found in environmental governance and courts.
Author van Dijk, Niels
Rommetveit, Kjetil
Gellert, Raphaël
Author_xml – sequence: 1
  givenname: Niels
  surname: van Dijk
  fullname: van Dijk, Niels
  email: nvdijk@vub.ac.be
  organization: Research Group on Law, Science, Technology & Society, Vrije Universiteit, Brussels, Belgium
– sequence: 2
  givenname: Raphaël
  surname: Gellert
  fullname: Gellert, Raphaël
  organization: Research Group on Law, Science, Technology & Society, Vrije Universiteit, Brussels, Belgium
– sequence: 3
  givenname: Kjetil
  surname: Rommetveit
  fullname: Rommetveit, Kjetil
  organization: Centre for the Study of the Sciences and the Humanities, University of Bergen, Bergen, Norway
BookMark eNp9kE1Lw0AQhhepYK39A55y9NK4H2k2EUFq8QsKXhS8LZvdiW5Ns3VnK_TfmxDx4KFzmTm8zzDznJJR61sg5JzRlFGWX65T02BIOWXzlPGUMnlExpwzPstkVoz-ZvF2QqaIa9qVEIwW2ZhcLZLg8DOJPtHd9P4Rb5Jb2PvWJlZHnWyDj2Ci8-2Q04iAuIE24hk5rnWDMP3tE_J6f_eyfJytnh-elovVzIiSxRmrDUhe0VqUGZMcCllVtc1EKajQcm4thdJWRc4rCfOasiq3MtdaWFnRnGshJuRi2Nvd8rUDjGrj0EDT6Bb8DhUrWE6Lsiz7KB-iJnjEALXaBrfRYa8YVb0rtVa9K9W7UoyrzlUHFf8g46LuX45Bu-Ywej2g0P3_7SAoNA5aA9aFzpqy3h3CfwDq_oZi
CitedBy_id crossref_primary_10_1177_1461444818817519
crossref_primary_10_2139_ssrn_3456224
crossref_primary_10_5817_RPT2020_2_5
crossref_primary_10_3389_frsc_2022_977623
crossref_primary_10_1080_13600869_2022_2060471
crossref_primary_10_1016_j_cose_2023_103206
crossref_primary_10_1177_01622439211052867
crossref_primary_10_1016_j_cities_2020_102731
crossref_primary_10_1111_rego_12401
crossref_primary_10_1111_rego_12654
crossref_primary_10_15293_2226_3365_1806_05
crossref_primary_10_1177_03063127221119424
crossref_primary_10_1080_13600869_2018_1457002
crossref_primary_10_1017_err_2017_40
crossref_primary_10_2139_ssrn_3386914
crossref_primary_10_1080_1369118X_2021_1909095
crossref_primary_10_1109_MTS_2021_3056284
crossref_primary_10_1108_DPRG_11_2023_0159
crossref_primary_10_1109_ACCESS_2021_3078059
crossref_primary_10_15293_2226_3365_1803_06
crossref_primary_10_14763_2020_4_1537
Cites_doi 10.1080/13600869.2014.913874
10.1111/1467-9760.00174
10.1093/idpl/ipr002
10.2307/1321160
10.1016/j.clsr.2011.11.007
10.1504/IJSD.2013.053789
10.1145/572260.572264
10.1093/medlaw/fwp007
10.2307/40041279
10.1016/j.clsr.2013.07.005
10.1016/0959-3780(92)90017-2
10.1177/0011392102050003010
10.1177/0306312706053350
10.1215/s12280-007-9004-7
10.2307/1797144
10.1111/j.1467-923X.2011.02210.x
10.1080/136698798377204
10.1080/13876988.2011.555999
10.1016/j.clsr.2009.02.002
10.1177/0306312702032003002
ContentType Journal Article
Copyright 2016 Niels van Dijk
Copyright_xml – notice: 2016 Niels van Dijk
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.clsr.2015.12.017
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Law
EISSN 2212-4748
EndPage 306
ExternalDocumentID 10_1016_j_clsr_2015_12_017
S026736491500182X
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
9JN
9JO
AACTN
AAEDT
AAEDW
AAFJI
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXKI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABMMH
ABXDB
ACDAQ
ACGFS
ACHQT
ACNNM
ACRLP
ACZNC
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFJKZ
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIEXJ
AIKHN
AITUG
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AXJTR
BKOJK
BLXMC
CS3
DU5
EFJIC
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PRBVW
Q38
R2-
RIG
RPZ
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SSB
SSO
SSV
SSZ
T5K
UHS
WUQ
YK3
~G-
AATTM
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADBBV
ADCNI
ADNMO
AEUPX
AFPUW
AIALX
AIGII
AIIUN
AKBMS
AKYEP
AOMHK
ASPBG
AVARZ
AVWKF
AZFZN
CITATION
EBS
EJD
GBLVA
ROL
7SC
8FD
ABJNI
ACLOT
AEIPS
ANKPU
EFKBS
EFLBG
JQ2
L7M
L~C
L~D
~HD
ID FETCH-LOGICAL-c391t-1fce72b0f394172e87bbfd439303a75dd0e9db862b7e5f01b6d76aa3d7b062a33
IEDL.DBID .~1
ISSN 2212-473X
IngestDate Sun Sep 28 10:53:23 EDT 2025
Wed Oct 01 05:52:18 EDT 2025
Thu Apr 24 23:09:24 EDT 2025
Tue Dec 03 05:08:26 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Privacy
Rights
Risk assessment
Data protection
Public participation
Risk
Legal expertise
Data protection impact assessment
Privacy impact assessment
Risk management
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c391t-1fce72b0f394172e87bbfd439303a75dd0e9db862b7e5f01b6d76aa3d7b062a33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1816089993
PQPubID 23500
PageCount 21
ParticipantIDs proquest_miscellaneous_1816089993
crossref_primary_10_1016_j_clsr_2015_12_017
crossref_citationtrail_10_1016_j_clsr_2015_12_017
elsevier_sciencedirect_doi_10_1016_j_clsr_2015_12_017
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-04-01
PublicationDateYYYYMMDD 2016-04-01
PublicationDate_xml – month: 04
  year: 2016
  text: 2016-04-01
  day: 01
PublicationDecade 2010
PublicationTitle Computer law & security review
PublicationYear 2016
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References CNIL (10.1016/j.clsr.2015.12.017_bib0115) 2012
Jasanoff (10.1016/j.clsr.2015.12.017_bib0315) 1995
Article 29 Working Party (10.1016/j.clsr.2015.12.017_bib0030) 2014
De Hert (10.1016/j.clsr.2015.12.017_bib0140) 2012
Ewald (10.1016/j.clsr.2015.12.017_bib0235) 1991
Edmond (10.1016/j.clsr.2015.12.017_bib0175) 2002; 32
ENISA (10.1016/j.clsr.2015.12.017_bib0180) 2006
Goold (10.1016/j.clsr.2015.12.017_bib0265) 2007
Information and Privacy Commissioner Ontario (IPCO), Canada (10.1016/j.clsr.2015.12.017_bib0295)
Raab (10.1016/j.clsr.2015.12.017_bib0395) 2012
Wynne (10.1016/j.clsr.2015.12.017_bib0515) 2007; 1
Cavoukian (10.1016/j.clsr.2015.12.017_bib0100) 2011
Article 29 Working Party (10.1016/j.clsr.2015.12.017_bib0020) 2010
Wright (10.1016/j.clsr.2015.12.017_bib0485) 2014; 28
Felt (10.1016/j.clsr.2015.12.017_bib0240) 2007
Hunton & Williams (10.1016/j.clsr.2015.12.017_bib0290) 2013
Council of Europe (10.1016/j.clsr.2015.12.017_bib0125) 2006
ENISA (10.1016/j.clsr.2015.12.017_bib0185) 2010
Linden Consulting, Xama Consultancy, University of Bristol (10.1016/j.clsr.2015.12.017_bib0340) 2007
Clarke (10.1016/j.clsr.2015.12.017_bib0110) 2011; 1
Raab (10.1016/j.clsr.2015.12.017_bib0385) 2004
Power (10.1016/j.clsr.2015.12.017_bib0380) 2007
European Environment Agency (10.1016/j.clsr.2015.12.017_bib0230) 2013
Article 29 Working Party (10.1016/j.clsr.2015.12.017_bib0025) 2013
Westin (10.1016/j.clsr.2015.12.017_bib0470) 1967
Calo (10.1016/j.clsr.2015.12.017_bib0095) 2011; 86
Marres (10.1016/j.clsr.2015.12.017_bib0350) 2005
Wynne (10.1016/j.clsr.2015.12.017_bib0505) 1992; 2
Stirling (10.1016/j.clsr.2015.12.017_bib0445) 1998; 1
Rommetveit (10.1016/j.clsr.2015.12.017_bib0415) 2013; 16
(10.1016/j.clsr.2015.12.017_bib0035) 2006
Solove (10.1016/j.clsr.2015.12.017_bib0435) 2006
Jasanoff (10.1016/j.clsr.2015.12.017_bib0320) 2011
Poole (10.1016/j.clsr.2015.12.017_bib0375) 2008
Beck (10.1016/j.clsr.2015.12.017_bib0045) 2013
Boyle (10.1016/j.clsr.2015.12.017_bib0075) 2007; 18
Wynne (10.1016/j.clsr.2015.12.017_bib0495) 1989; 31
Irwin (10.1016/j.clsr.2015.12.017_bib0300) 2006; 36
Bennett (10.1016/j.clsr.2015.12.017_bib0050) 2010
Gellert (10.1016/j.clsr.2015.12.017_bib0260) 2013; 29
Schaub (10.1016/j.clsr.2015.12.017_bib0425) 2014
Hilson (10.1016/j.clsr.2015.12.017_bib0280) 2009
Murphy (10.1016/j.clsr.2015.12.017_bib0360) 2009; 17
High Court of Ireland (10.1016/j.clsr.2015.12.017_bib0275) 2014
ISO (10.1016/j.clsr.2015.12.017_bib0310) 2009
Bigo (10.1016/j.clsr.2015.12.017_bib0070) 2006
Foucault (10.1016/j.clsr.2015.12.017_bib0245) 1972
Adams (10.1016/j.clsr.2015.12.017_bib0010) 1971; 137
Decker (10.1016/j.clsr.2015.12.017_bib0160) 2001
Bunyan (10.1016/j.clsr.2015.12.017_bib0085) 2009
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0225) 2012
Raab (10.1016/j.clsr.2015.12.017_bib0390) 2011; 13
Court of Justice of the European Union (10.1016/j.clsr.2015.12.017_bib0130) 2015
Oh (10.1016/j.clsr.2015.12.017_bib0370) 2006
Wynne (10.1016/j.clsr.2015.12.017_bib0500) 1992
Spiekermann (10.1016/j.clsr.2015.12.017_bib0440) 2012
Wright (10.1016/j.clsr.2015.12.017_bib0475) 2012; 28
Friedewald (10.1016/j.clsr.2015.12.017_bib0250) 2006
Kloza (10.1016/j.clsr.2015.12.017_bib0330) 2013
Smith (10.1016/j.clsr.2015.12.017_bib0430) 1989
Warren (10.1016/j.clsr.2015.12.017_bib0465) 1890; 4
Waldron (10.1016/j.clsr.2015.12.017_bib0460) 2003; 11
De Vries (10.1016/j.clsr.2015.12.017_bib0155) 2013
Trilateral Research and Consulting (10.1016/j.clsr.2015.12.017_bib0455) 2013
Brey (10.1016/j.clsr.2015.12.017_bib0080) 2000; 30
Europe versus Facebook (10.1016/j.clsr.2015.12.017_bib9010)
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0210) 2008
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0220) 2009
Marres (10.1016/j.clsr.2015.12.017_bib0355) 2005
European Commission (10.1016/j.clsr.2015.12.017_bib0190) 2002
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0200) 2004
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0195) 2003
Coleman (10.1016/j.clsr.2015.12.017_bib0120) 2011; 82
Callon (10.1016/j.clsr.2015.12.017_bib0090) 2011
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0215) 2008
Rip (10.1016/j.clsr.2015.12.017_bib0410) 1986; 8
Keats Citron (10.1016/j.clsr.2015.12.017_bib0325) 2010; 98
De Hert (10.1016/j.clsr.2015.12.017_bib0145) 2006
Wright (10.1016/j.clsr.2015.12.017_bib0490) 2011
Article 29 Working Party (10.1016/j.clsr.2015.12.017_bib0015) 2007
(10.1016/j.clsr.2015.12.017_bib0305) 1996
Renn (10.1016/j.clsr.2015.12.017_bib0400) 2008
Bernstein (10.1016/j.clsr.2015.12.017_bib0060) 1998
Tribe (10.1016/j.clsr.2015.12.017_bib0450) 1972; 46
Beslay (10.1016/j.clsr.2015.12.017_bib0065) 2012
OECD (10.1016/j.clsr.2015.12.017_bib0365) 2013
Dewey (10.1016/j.clsr.2015.12.017_bib0165) 1957
Lippmann (10.1016/j.clsr.2015.12.017_bib0345) 2009
Gee (10.1016/j.clsr.2015.12.017_bib0255) 2009; 16
Clarke (10.1016/j.clsr.2015.12.017_bib0105) 2009; 25
Hoenkamp (10.1016/j.clsr.2015.12.017_bib0285) 2011
Richards (10.1016/j.clsr.2015.12.017_bib0405) 2010; 98
Davies (10.1016/j.clsr.2015.12.017_bib0135) 1998
European Court of Human Rights (10.1016/j.clsr.2015.12.017_bib0205) 2006
Wright (10.1016/j.clsr.2015.12.017_bib0480) 2012
Bennett (10.1016/j.clsr.2015.12.017_bib0055) 2006
Knox (10.1016/j.clsr.2015.12.017_bib0335) 2012
Beck (10.1016/j.clsr.2015.12.017_bib0040) 1992
De Schutter (10.1016/j.clsr.2015.12.017_bib0150) 2008
Harremoës (10.1016/j.clsr.2015.12.017_bib0270) 2002
Dratwa (10.1016/j.clsr.2015.12.017_bib0170) 2012
Wynne (10.1016/j.clsr.2015.12.017_bib0510) 2002; 50
Ruggie (10.1016/j.clsr.2015.12.017_bib0420) 2011; 29
References_xml – volume: 98
  start-page: 1805
  issue: 6
  year: 2010
  ident: 10.1016/j.clsr.2015.12.017_bib0325
  article-title: Mainstreaming privacy torts
  publication-title: Calif Law Rev
– volume: 28
  start-page: 1
  year: 2014
  ident: 10.1016/j.clsr.2015.12.017_bib0485
  article-title: Privacy principles, risks and harms
  publication-title: Int Rev Law Comput Technol
  doi: 10.1080/13600869.2014.913874
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0125
– year: 2015
  ident: 10.1016/j.clsr.2015.12.017_bib0130
– volume: 11
  start-page: 191
  year: 2003
  ident: 10.1016/j.clsr.2015.12.017_bib0460
  article-title: Security & liberty: the image of balance
  publication-title: J Polit Philos
  doi: 10.1111/1467-9760.00174
– start-page: 323
  year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0440
  article-title: The RFID PIA – developed by industry, endorsed by regulators
– year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0335
– volume: 1
  start-page: 111
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0110
  article-title: An evaluation of privacy impact assessment guidance documents
  publication-title: Int Data Priv Law
  doi: 10.1093/idpl/ipr002
– year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0380
– year: 2004
  ident: 10.1016/j.clsr.2015.12.017_bib0385
– volume: 86
  start-page: 1131
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0095
  article-title: The boundaries of privacy harm
  publication-title: Indiana Law J
– volume: 4
  start-page: 193
  issue: 5
  year: 1890
  ident: 10.1016/j.clsr.2015.12.017_bib0465
  article-title: The right to privacy
  publication-title: Harv Law Rev
  doi: 10.2307/1321160
– year: 2010
  ident: 10.1016/j.clsr.2015.12.017_bib0185
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0025
– volume: 28
  start-page: 54
  year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0475
  article-title: The state of the art in privacy impact assessment
  publication-title: Comput Law Secur Rev
  doi: 10.1016/j.clsr.2011.11.007
– year: 2003
  ident: 10.1016/j.clsr.2015.12.017_bib0195
– year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0310
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0250
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0045
  article-title: The digital freedom risk: too fragile an acknowledgment
  publication-title: Open Democracy
– year: 1992
  ident: 10.1016/j.clsr.2015.12.017_bib0040
– volume: 46
  start-page: 617
  year: 1972
  ident: 10.1016/j.clsr.2015.12.017_bib0450
  article-title: Technology assessment and the fourth discontinuity: the limits of instrumental rationality
  publication-title: South Calif Law Rev
– year: 1998
  ident: 10.1016/j.clsr.2015.12.017_bib0135
  article-title: Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity
– start-page: 33
  year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0140
  article-title: A human rights perspective on privacy and data protection impact assessments
– volume: 16
  start-page: 23
  year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0415
  article-title: The Technolife project: an experimental approach to new ethical frameworks for emerging science and technology
  publication-title: Int J Sustain Dev
  doi: 10.1504/IJSD.2013.053789
– ident: 10.1016/j.clsr.2015.12.017_bib9010
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0035
– year: 2010
  ident: 10.1016/j.clsr.2015.12.017_bib0050
– year: 2014
  ident: 10.1016/j.clsr.2015.12.017_bib0425
– start-page: 1
  year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0370
  article-title: Personal environment service for mobile users
– year: 2005
  ident: 10.1016/j.clsr.2015.12.017_bib0355
  article-title: Recipe for tracing the fate of issues and their publics on the web
– volume: 30
  start-page: 10
  year: 2000
  ident: 10.1016/j.clsr.2015.12.017_bib0080
  article-title: Disclosive computer ethics
  publication-title: ACM SIGCAS Comput Soc
  doi: 10.1145/572260.572264
– year: 2014
  ident: 10.1016/j.clsr.2015.12.017_bib0030
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0365
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0330
  article-title: Public voice in privacy governance: lessons from environmental democracy
– year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0100
– year: 1995
  ident: 10.1016/j.clsr.2015.12.017_bib0315
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0290
  article-title: Irish presidency reports on progress of the proposed EU regulation
  publication-title: Priv Secur Law Blog
– year: 1998
  ident: 10.1016/j.clsr.2015.12.017_bib0060
– year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0225
– year: 2002
  ident: 10.1016/j.clsr.2015.12.017_bib0270
– year: 2008
  ident: 10.1016/j.clsr.2015.12.017_bib0400
– volume: 17
  start-page: 219
  year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0360
  article-title: Is human rights prepared? Risk, rights and public health emergencies
  publication-title: Med Law Rev
  doi: 10.1093/medlaw/fwp007
– year: 2002
  ident: 10.1016/j.clsr.2015.12.017_bib0190
– start-page: 1
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0320
  article-title: Introduction: rewriting life, reframing rights
– year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0115
– ident: 10.1016/j.clsr.2015.12.017_bib0295
– year: 1989
  ident: 10.1016/j.clsr.2015.12.017_bib0430
– start-page: 61
  year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0145
  article-title: Privacy, data protection and law enforcement. opacity of the individual and transparency of power
– volume: 16
  start-page: 217
  year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0255
  article-title: Late lessons from early warnings: towards realism and precaution with EMF?
  publication-title: Pathophysiol Off J Int Soc Pathophysiol ISP
– start-page: 477
  year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0435
  article-title: A taxonomy of privacy
  publication-title: Univ PA Law Rev
  doi: 10.2307/40041279
– start-page: 234
  year: 2008
  ident: 10.1016/j.clsr.2015.12.017_bib0375
  article-title: Courts and conditions of uncertainty in “times of crisis.”
  publication-title: Public Law Summer
– volume: 29
  start-page: 522
  year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0260
  article-title: The legal construction of privacy and data protection
  publication-title: Comput Law Secur Rev
  doi: 10.1016/j.clsr.2013.07.005
– start-page: 169
  year: 2008
  ident: 10.1016/j.clsr.2015.12.017_bib0150
  article-title: Rights in conflict: the European court of human rights as a pragmatic institution
– volume: 2
  start-page: 111
  year: 1992
  ident: 10.1016/j.clsr.2015.12.017_bib0505
  article-title: Uncertainty and environmental learning – reconceiving science and policy in the preventive paradigm
  publication-title: Glob Environ Change
  doi: 10.1016/0959-3780(92)90017-2
– start-page: 347
  year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0065
  article-title: Double-take: getting to the RFID PIA framework
– volume: 50
  start-page: 459
  year: 2002
  ident: 10.1016/j.clsr.2015.12.017_bib0510
  article-title: Risk and environment as legitimatory discourses of technology: reflexivity inside-out
  publication-title: Curr Sociol
  doi: 10.1177/0011392102050003010
– volume: 36
  start-page: 299
  year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0300
  article-title: The politics of talk coming to terms with the “new” scientific governance
  publication-title: Soc Stud Sci
  doi: 10.1177/0306312706053350
– volume: 1
  start-page: 99
  year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0515
  article-title: Public participation in science and technology: performing and obscuring a political–conceptual category mistake
  publication-title: East Asian Sci Technol Soc Int J
  doi: 10.1215/s12280-007-9004-7
– year: 2010
  ident: 10.1016/j.clsr.2015.12.017_bib0020
– start-page: 197
  year: 1991
  ident: 10.1016/j.clsr.2015.12.017_bib0235
  article-title: Insurance and risk
– year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0340
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0180
– start-page: 239
  year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0170
  article-title: Europe's collective experiment with nanotechnologies as a construction of possible futures: political and ethical stakes
– year: 1996
  ident: 10.1016/j.clsr.2015.12.017_bib0305
– year: 1972
  ident: 10.1016/j.clsr.2015.12.017_bib0245
– year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0090
– year: 2014
  ident: 10.1016/j.clsr.2015.12.017_bib0275
– year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0220
– year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0265
– volume: 8
  start-page: 349
  year: 1986
  ident: 10.1016/j.clsr.2015.12.017_bib0410
  article-title: Controversies as informal technology assessment
  publication-title: Sci Commun
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0070
  article-title: Liberty, who's liberty? The Hague programme and the conception of freedom
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0230
– year: 2008
  ident: 10.1016/j.clsr.2015.12.017_bib0210
– volume: 137
  start-page: 468
  issue: 4
  year: 1971
  ident: 10.1016/j.clsr.2015.12.017_bib0010
  article-title: London's third airport: from TLA to airstrip one
  publication-title: Geogr J
  doi: 10.2307/1797144
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0455
– volume: 18
  start-page: 471
  year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0075
  article-title: Human rights or environmental rights? A reassessment
  publication-title: Fordham Environ Law Rev
– year: 1967
  ident: 10.1016/j.clsr.2015.12.017_bib0470
– year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0345
– volume: 31
  year: 1989
  ident: 10.1016/j.clsr.2015.12.017_bib0495
  article-title: Sheepfarming after chernobyl. A case study in communicating scientific information
  publication-title: Environment
– volume: 82
  start-page: 355
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0120
  article-title: The wisdom of which crowd? On the pathology of a listening government
  publication-title: Polit Q
  doi: 10.1111/j.1467-923X.2011.02210.x
– year: 2005
  ident: 10.1016/j.clsr.2015.12.017_bib0350
  article-title: Issues spark a public into being
– volume: 98
  start-page: 1887
  issue: 6
  year: 2010
  ident: 10.1016/j.clsr.2015.12.017_bib0405
  article-title: Prosser' s privacy law: a mixed legacy
  publication-title: Calif Law Rev
– year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0085
– year: 2004
  ident: 10.1016/j.clsr.2015.12.017_bib0200
– year: 2001
  ident: 10.1016/j.clsr.2015.12.017_bib0160
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0055
– year: 1957
  ident: 10.1016/j.clsr.2015.12.017_bib0165
– year: 2008
  ident: 10.1016/j.clsr.2015.12.017_bib0215
– volume: 1
  start-page: 97
  year: 1998
  ident: 10.1016/j.clsr.2015.12.017_bib0445
  article-title: Risk at a turning point
  publication-title: J Risk Res
  doi: 10.1080/136698798377204
– year: 2006
  ident: 10.1016/j.clsr.2015.12.017_bib0205
– start-page: 269
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0285
– volume: 13
  start-page: 195
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0390
  article-title: Networks for regulation: privacy commissioners in a changing world
  publication-title: J Comp Policy Anal Res Pract
  doi: 10.1080/13876988.2011.555999
– start-page: 353
  year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0280
  article-title: Risk and the European convention on human rights. Towards a new approach
– year: 2013
  ident: 10.1016/j.clsr.2015.12.017_bib0155
  article-title: A bump in the road. Ruling out law from technology
– year: 1992
  ident: 10.1016/j.clsr.2015.12.017_bib0500
– year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0015
– volume: 25
  start-page: 123
  year: 2009
  ident: 10.1016/j.clsr.2015.12.017_bib0105
  article-title: Privacy impact assessment: its origins and development
  publication-title: Comput Law Secur Rev
  doi: 10.1016/j.clsr.2009.02.002
– year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0490
  article-title: Precaution and privacy impact assessment as modes towards risk governance
– year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0480
– year: 2012
  ident: 10.1016/j.clsr.2015.12.017_bib0395
  article-title: Surveillance: extending the limits of privacy impact assessment
– volume: 29
  start-page: 224
  year: 2011
  ident: 10.1016/j.clsr.2015.12.017_bib0420
  article-title: Report of the Special Representative of the Secretary-General on the issue of human rights and transnational corporations and other business enterprises
  publication-title: Neth Q Hum Rts
– volume: 32
  start-page: 371
  year: 2002
  ident: 10.1016/j.clsr.2015.12.017_bib0175
  article-title: Legal engineering: contested representations of law, science (and non-science) and society
  publication-title: Soc Stud Sci
  doi: 10.1177/0306312702032003002
– year: 2007
  ident: 10.1016/j.clsr.2015.12.017_bib0240
SSID ssj0000331084
ssj0016986
Score 2.2544796
Snippet The proposal for a new European Data Protection Regulation introduces the novel obligation of performing data protection assessments. Since these assessments...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 286
SubjectTerms Assessments
Control
Data processing
Data protection
Data protection impact assessment
Information technology
Legal expertise
Merging
Privacy
Privacy impact assessment
Public participation
Rights
Risk
Risk assessment
Risk management
Strikes
Title A risk to a right? Beyond data protection risk assessments
URI https://dx.doi.org/10.1016/j.clsr.2015.12.017
https://www.proquest.com/docview/1816089993
Volume 32
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000331084
  issn: 2212-473X
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016986
  issn: 2212-473X
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000331084
  issn: 2212-473X
  databaseCode: ACRLP
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000331084
  issn: 2212-473X
  databaseCode: AIKHN
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  customDbUrl:
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000331084
  issn: 2212-473X
  databaseCode: .~1
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 2212-4748
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016986
  issn: 2212-473X
  databaseCode: AKRWK
  dateStart: 19850501
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9zXryInzg_RgRvUpc0bdJ4kTEc82sXHewWkiaBydiG6_Dm327SpgNFdvDYkpTyS_LyS97vvQfAVc6szCg3kbGaRInRyK25FEUxtjTHSNqM-EDhlyEdjJLHcTpugF4dC-NllcH2Vza9tNbhTSeg2VlMJp1XXzuJ0IQ7SoMcSx77CPaE-SoGN194fc-CiCMwPhYzeBYoL6s_xs5kRwkj4xBIU2m-8unS5wjFaXlFWBYx-3Oz-mW2y72ovwd2A4mE3eo_90HDzA7A1rP8PAS3XejV4rCYQwnLk_cdrKJUoBeDwpCXwY1G1U6uM3Muj8Cof__WG0ShPkKUE46LCNvcsFghS3jieIjJmFJWO4bhtiXJUq2R4Vq5I4tiJrUIK6oZlZJophCNJSHHoDmbz8wJgJk1mnKiZC4TT-EkkxzxLOY4Rooo1AK4BkLkIXm4r2ExFbVK7F148IQHT-BYOPBa4HrdZ1GlztjYOq3xFT8mgHC2fWO_y3owhFsZ3t0hZ2a-WgrHXah3anJy-s9vn4Ed90Qroc45aBYfK3PhOEih2uUka4Pt7sPTYPgNXF7YRQ
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9OD3oRP_HbCN6kLmnapPEiYyhT5y5u0FtImgQm0omrePNvN2nTgSIevLZJKb8k7_1e3hcA5wWzMqPcRMZqEiVGI3fmUhTF2NICI2kz4hOFH0d0MEnu8zRfAv02F8aHVQbZ38j0WlqHJ92AZvd1Ou0--d5JhCbcURrkWHLeAStJGjNvgV1-4sVFCyKOwfhkzOBaoLxu_xg7mR0ljOQhk6YJ-ipe5r5IKE7rO8K6i9mv2uqH3K6V0e0GWA8sEvaaH90ES6bcAp2h_NgGVz3ow8VhNYMS1qb3NWzSVKCPBoWhMINbjmacXJTmnO-Aye3NuD-IQoOEqCAcVxG2hWGxQpbwxBERkzGlrHYUw-klyVKtkeFaOZtFMZNahBXVjEpJNFOIxpKQXbBczkqzB2BmjaacKFnIxHM4ySRHPIs5jpEiCu0D3AIhilA93DexeBFtmNiz8OAJD57AsXDg7YOLxZzXpnbGn6PTFl_xbQcIJ9z_nHfWLoZwR8P7O2RpZu9z4cgL9V5NTg7--e1TsDoYPw7F8G70cAjW3BvaRO0cgeXq7d0cO0JSqZN6w30BhGLZ2g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+risk+to+a+right%3F+Beyond+data+protection+risk+assessments&rft.jtitle=The+computer+law+and+security+report&rft.au=van+Dijk%2C+Niels&rft.au=Gellert%2C+Rapha%C3%ABl&rft.au=Rommetveit%2C+Kjetil&rft.date=2016-04-01&rft.pub=Elsevier+Ltd&rft.issn=2212-473X&rft.eissn=2212-4748&rft.volume=32&rft.issue=2&rft.spage=286&rft.epage=306&rft_id=info:doi/10.1016%2Fj.clsr.2015.12.017&rft.externalDocID=S026736491500182X
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2212-473X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2212-473X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2212-473X&client=summon