Jusletter

Globalization – Strategies for Data Protection

  • Autor/Autorin: Herbert Burkert
  • Rechtsgebiete: Datenschutz
  • Zitiervorschlag: Herbert Burkert, Globalization – Strategies for Data Protection, in: Jusletter 3. Oktober 2005
Data protection – by making use of epistemic communities, ensuring government support, profiting from reciprocal regulatory mechanisms and using international communication – has already applied successfully global strategies even before globalization became a general issue. However, current set backs for the role of data protection as well as the legitimacy crisis of globalization make it necessary to reflect on past strategies and to supplement them with new strategies to join forces with the private and the third sector, to keep a better track on technological developments internationally, and to improve training internationally. A renewed reflection on the basic role of data protection on the global scale should lead to joining forces with access to information institutions and lead to a renewed cross-cultural analysis of daily data protection practices.

Table of contents

  • I. Introduction
  • II. Data Protection As A Global Concept
  • 1. The Road to Success
  • 2. Strategies applied
  • a) Epistemic communities
  • b) The involvement of governments
  • c) The reciprocal adjustment technique
  • d) Webs of communication
  • e) A remark on windows of opportunity
  • 3. Conclusion
  • III. At A Turning Point?
  • IV. Carrying On A Global Task For A Universal Right : Future Strategies For Data Protection
  • 1. Re-examining old strategies
  • a) Epistemic communities
  • b) The involvement of governments
  • c) The reciprocal adjustment technique
  • d) Webs of communication
  • 2. Supplementary strategies
  • a) Looking for allies: a tripartite approach
  • b) Assessing the role of technology
  • c) Enhancing international training
  • 3. The core task: Strategies of substance
  • a) A globally integrated concept for data protection and access
  • b) Re-reflecting on Data Protection
  • V. Conclusion

0 Kommentare

Es gibt noch keine Kommentare

Ihr Kommentar zu diesem Beitrag

AbonnentInnen dieser Zeitschrift können sich an der Diskussion beteiligen. Bitte loggen Sie sich ein, um Kommentare verfassen zu können.