Search

Published After
Published Before

Search Results

  • Technology in Legal Regulation’s Service? Efforts in the Field of Data Protection
    33-45
    Views:
    184

    The interaction between technology and data protection is quite well-known and widely accepted in the legal literature concerning privacy protection. This essay tries to sum up the efforts to line up the technology itself to defend one’s privacy, often threated by technological development. The essay first shows the relevance of the Privacy Enhancing Technologies (PETs), and the basic concept of the Privacy by Design principle, and then analyses both the current and the proposed European legal regulation focusing on these issues.

  • Developing Blockchain-Based Distributed AI for Personal Data Protection
    9-27
    Views:
    535

    The aim of the paper is to present some of the general principles of data protection law that can be applied to automated decision-making built on blockchain-based data processing in order to comply with the provision of the European Union’s General Data Protection Regulation (GDPR). The analysis focuses on the applicability of the ‘data protection by design’ principle during the development of such systems. My hypothesis is that because blockchain-based networks are built on distributed data processing operations, therefore data controlling or processing of participating nodes should comply with some abstract data protection patterns predetermined and collectively built-in during the system’s development phase. For the sake of better understanding, I presented the human mind and its ‘uploading’ with conscious and unconscious content as an analogy to blockchain-based AI systems. My goal is to highlight that the fusion of blockchain and machine learning-based AI can be a suitable technology to develop serious automated decision-making systems (so-called ‘distributed AI’). The compliance of these distributed AI systems with data protection law principles is a key issue regarding the very serious risks posed by them.

  • Some Legal Challenges of Digital Inheritance with Special Regard to Privacy
    84-98
    Views:
    261

    Digital inheritance, because of its complexity, cannot be considered uniformly. The elements of digital inheritance which can be considered as property are regulated by the law of succession. The personal elements of the digital inheritance are regulated by the right in memoriam and data protection laws. In the current Hungarian legal system the amendment of Act no. CXII of 2011 on the Right of Informational Self-Determination put the post-mortem privacy principle into regulatory form, in addition to the right to respect for the deceased which provides legal protection against violation of the memory of a deceased person.

  • Certain Data Protection Issues of Innovations Affecting the Insurance Business in the Light of the GDPR
    62-83
    Views:
    115

    Technological innovations affect many sectors of the economy, including the insurance business. Among these innovations, IoT-based (Internet of Things) solutions can be highlighted, the main feature of which is that real-time and continuous data collection is performed using the Internet, thus optimizing the risk management of the insurer. Given that a significant part of the data thus collected constitutes personal data, so the rules of the General Data Protection Regulation (GDPR) should apply. The data protection examination of the technologies affecting the insurance institution raises several issues which, in my view, significantly impede the application of these technological achievements. The study aims to explore these problems and make an attempt to make proposals to solve them.

  • A Case Study on the Interaction Between the General Data Protection Regulation and Artificial Intelligence Technologies
    45-57
    Views:
    208

    This paper presents a general overview of the problems regarding the regulation of artificial intelligence (AI) raised in the official published works of the European Union (EU) and interprets these problems from the perspective of the Hungarian experts as a case study. Even though a new regulation on AI has already been proposed at the EU level, the paper evaluates specific rules and principles regarding data protection since data is the lifeblood of AI systems and the protection of such data is a fundamental right enshrined in the EU legislation via the General Data Protection Regulation (GDPR). The result of the study shows that the application of the GDPR on AI systems in an efficient and uniform way might be at stake since different outputs were generated by the experts to the same legal questions deriving from a scenario presented.

  • Personal data protection in the public sector in frame of the GDPR
    39-54
    Views:
    430

    The European Union has finished the reform of the European data protection rules, and the main result is the General Data Protection Regulation (GDPR), which entered into force after a two-year period on 25 May 2018. The GDPR draws special attention to the protection of personal data not only in the private-, but also in the public sector. It introduces several significant changes and restrictions, but after almost a year of being in force, there is still some uncertainty as to how we can apply its provisions, especially for public authorities and bodies. Therefore, the aim of this paper is to explore the relevant data protection provisions of GDPR regarding the public sector and to clarify any misunderstandings in this field.

  • Current Challenges of Confidentiality and Publicity in the View of Information Security
    24-41
    Views:
    150

    The paper analyses the issues of confidentiality and publicity, arising from current information security legislation in Hungary. First of all the information security as a state task is analyzed. In Hungary, the information security controls of state and local government entities are regulated. Afterward, on the one hand, the information security as a tool for data protection regulation, state secrets and freedom of information were discussed. On the other hand, information security can be an object of the law, when the protection of security controls is required. One of the main findings of the research was that the information security controls applied at state entities are generally public data (according to freedom of information regulation). Thus it might not stay confidential. We formed proposals to solve this issue.

  • Data Protection Requirements in the Relationship between Temporary-work Agency and User Undertaking
    70-82
    Views:
    141

    In temporary agency work the relationship between the temporary work agency and the user-undertaking is often not adequately or correctly understood in the context of the processing of personal data. This leads to a deterioration of protection of personal data as well as labour market rights and obligations. The purpose of this study is to explore when we can speak about a controller- processor, a joint controller or a controller- controller relationship, which will clarify who has to implement appropriate technical and organisational measures to ensure and to be able to demonstrate that the processing is performed in accordance with the Regulation.

  • Then and now: laws on first and second generation biometric systems
    78-90
    Views:
    201

    Although the security benefits these technologies offer security benefits to our society, their widespread application can involves and clearly leads to serious legal issues and concerns, including technological encounters, disputes and grave concerns for individual citizens’ rights of privacy. Various forms of identification, such as driving licenses, passports, and other identity cards, are progressively being combined with biometric information used by ever-changing and more advanced systems. With no doubts, it can stated as well that the use of them will be spread to other sectors too. Therefore, It safe to assume that this noticeable prosperity of personal information will involve and ache for more advanced data protection measures, encryption technologies, and other safeguarding measures, both to inspire their acceptance and use by the civilian population and to keep this critical information from falling into the wrong hands.