Limit this search to....

The Risk-Based Approach to Data Protection
Contributor(s): Gellert, Raphaël (Author)
ISBN: 0198837712     ISBN-13: 9780198837718
Publisher: Oxford University Press, USA
OUR PRICE:   $114.00  
Product Type: Hardcover - Other Formats
Published: December 2020
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Additional Information
BISAC Categories:
- Law | Computer & Internet
- Law | Communications
Dewey: 343.099
LCCN: 2020937905
Physical Information: 0.9" H x 6.2" W x 9.3" (1.40 lbs) 302 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The concept of a risk-based approach to data protection came to the fore during the overhaul process of the EU's General Data Protection Regulation (GDPR). At its core, it consists of endowing the regulated organizations that process personal data with increased responsibility for complying
with data protection mandates. Such increased compliance duties are performed through risk management tools. This book provides a comprehensive analysis of this legal and policy development, which considers a legal, historical, and theoretical perspective.

By framing the risk-based approach as a sui generis implementation of a specific regulation model known as meta regulation, this book provides a recollection of the policy developments that led to the adoption of the risk-based approach in light of regulation theory and debates. It also discusses a
number of salient issues pertaining to the risk-based approach, such as its rationale, scope, and meaning; the role for regulators; and its potential and limits. The book also looks at they way it has been undertaken in major statutes with a focus on key provisions, such as data protection impact
assessments or accountability.

Finally, the book devotes considerable attention to the notion of risk. It explains key terms such as risk assessment and management. It discusses in-depth the role of harms in data protection, the meaning of a data protection risk, and the difference between risks and harms. It also critically
analyses prevalent data protection risk management methodologies and explains the most important caveats for managing data protection risks.