PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

NATIONAL INFORMATION GOVERNANCE BOARD
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
The European Union legal framework for clinical data access: The European Union legal framework for clinical data access: potential challenges and opportunities.
Legal and moral aspects English Nineteenth Century Philosopher, John Stuart Mill: ‘As soon as any part of a person’s conduct affects prejudicially the.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
INTERNET and CODE OF CONDUCT
Online Privacy Protection in China: Present and Future Yun ZHAO The University of Hong Kong.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
Standards and Guidelines for Web Page Publishing December 9, 2009.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Office of General Counsel Princeton University FERPA Issues for Princeton Administrators
1 When hate speech tangles privacy... When hate speech tangles privacy...
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Data protection supervision authority’s practice concerning exception provided in par. 2 of article 5 of Directive 2002/58/EC DIJANA ŠINKŪNIENĖ State Data.
Ioannis Iglezakis Directive on privacy and electronic communications.
“Freedom of Media and Data Protection” Workshop within Twinning Project “Implementation of Personal Data Protection Strategy” in Montenegro Hotel Podgorica,
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Ide kerülhet az előadás címe CCTV operation at work Belgrade, 11 th April 2013.
Privacy, Data Protection and Lex Informatica -- lecture 3 Dr. Lee A. Bygrave,
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
Presentation Vienna by Bushka Bryndova ENCOD Conference 2008.
The Bill of Rights The First Fundamental Changes of the Constitution.
TERENA Networking Conference 2005©The JNT Association, 2005 Network Performance Measurement: Privacy and Legal Issues Andrew Cormack, UKERNA
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data protection and European citizens’ initiatives
Directive on the Authorisation of electronic communications networks & Services Directive (2002/20/EC) Authorisation Directive Presented by: Nelisa Gwele.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Privacy and Data Protection in e-Communications Sector Legislation, Codes of Practice and Standards Privacy and Data Protection in e-Communications Sector.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
František Nonnemann Skopje, 9th October 2012 JHA DP aspects related to provision of information about public figures in CZ.
Tomball Independent School District Annual Confidentiality Training
National Electoral Register
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Issues of personal data protection in scientific research
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
Data Protection & Human Rights
The Future of Big Data, Equality and Privacy
FERPA For New Faculty Lawrence F. Glick Sr. Associate General Counsel
PROTECTION OF PRIVACY IN AN EMPLOYMENT RELATIONSHIP
Functional immunity (only for official acts)
Regulation in the Contsitution of the Republic of Poland
 The Executive President shall represent
Presentation transcript:

PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA

Privacy ?

LEGAL REGIME Constotution Art. 32. (1) The private life of citizens shall be inviolable. Everyone shall be entitled to protection against any illegal interference in his private or family affairs and against encroachments on his honour, dignity and reputation. (2) No one shall be followed, photographed, filmed, recorded or subjected to any other similar activity without his knowledge or despite his express disapproval, except when such actions are permitted by law. Art. 34. (1) The freedom and confidentiality of correspondence and all other communications shall be inviolable. (2) Exceptions to this provision shall be allowed only with the permission of the judicial authorities for the purpose of discovering or preventing a grave crime.

LEGAL REGIME Telecommunications Act Chapter fourteen. Confidentiality of Messages and Protection of Personal Data in Carrying out Telecommunications Section I. Confidentiality of Messages Section II. Protection of Personal Data and Data of End users of Telecommunication Services

LEGAL REGIME CONFIDENTIALITY covers the type of the service, the content of the communication and all data, concerning the provision of the service TA stipulates that public operators are obligated to: guarantee the confidentiality of communications by undertaking all necessary technical and administrative measures. not to reveal information or data that has become known to them in the course of the provision of telecommunication services (employees) in case of a hazard of violating the communication’s confidentiality the public operator must notify his subscribers for the presence of such a risk and for the means of its elimination including the expected costs.

LEGAL REGIME The tracing, recording and keeping of messages, designated to other persons is prohibited for the purpose of preserving the confidentiality. There are two exceptions to this rule as follows: when the prior and explicit consent of the persons concerned is obtained and in the cases stipulated by law.

LEGAL REGIME Data Protection Communications – (routing, interconnection, provision, billing) Content; Traffic Data; “Calling line identification" and "called line identification”; Value added services; Telephone Directories.