Cybersecurity, Privacy and Data Protection in EU Law: A Law, Policy and Technology Analysis
In: Hart Studies in Information Law and Regulation Series
Intro -- Acknowledgements -- Contents -- Abbreviations -- Tables and Figures -- Table of Cases -- Table of Legislation -- Introduction -- I. Investigating the Relationship of the Triad -- II. Plan of the Book -- PART 1: INTRODUCING CYBERSECURITY, PRIVACY AND DATA PROTECTION LAW AND THEIR INTERPLAY -- 1. Cybersecurity, Privacy and Data Protection: An Analytical Framework -- I. Studying the Relationship between Cybersecurity, Privacy and Data Protection -- II. The Triad within the EU Constitutional Architecture: A Policy, Law and Technology Analysis -- III. Conclusion: An Analytical Framework to Study the Relationship of the Triad -- 2. The EU Cybersecurity Policy -- I. The Development of the EU Cybersecurity Policy -- II. The EU Cybersecurity Policy and Law Landscape -- III. Conclusion: Tensions within Cybersecurity and the Way Forward -- 3. Privacy: The Right to Respect for Private and Family Life -- I. Sources and Scope of Article 7 CFR -- II. Essential Components of Article 7 of the Charter -- III. Conclusion: Essential Components of Article 7 CFR, Essence -- 4. The Right to the Protection of Personal Data -- I. Sources of Article 8 CFR -- II. Essential Components of Article 8 CFR -- III. Conclusion: Essential Components of Article 8 CFR, Essence -- PART 2: TECHNOLOGY AND THE TRIAD IN THE DSM, THE AFSJ AND THE EA -- 5. Cybersecurity, Privacy and Data Protection as Techno-Legal Objects: Investigating the Role of Technology -- I. Leveraging Technology to Appraise the Reconciliation of the Triad -- II. Technology as a Regulatory Target: The Effacement of Technology from the Law and its Consequences -- III. Courts, the Effacement of Technology and the Indeterminacy Loop -- IV. Conclusion -- 6. The DSM: Network and Information Security (NIS), Privacy and Data Protection.