Ce module est une ressource pour les enseignants
Références
Publications, articles et rapports
- Berlinger, Joshua, and Maegan Vazquez. (2018). US military reviewing security practices after fitness app reveals sensitive info. CNN, 29 January 2018.
- Bernal, Paul. (2016). Data gathering, surveillance and human rights: recasting the debate. Journal of Cyber Policy, Vol. 1(2), 243-264.
- Chatelain, Yannick. (2018a). Darknet: faut-il démanteler la revente illégale de la liberté de s'exprimer et de s'informer? The Conversation, 5 July 2018.
- Chatelain, Yannick. (2018b). Principles of hacktivism and hackers: ignorance and prejudices! The Conversation, 15 May 2018.
- Cooley, Thomas. (1907). A Treatise on the Law of Torts. Callaghan and Company.
- Council of Europe. (n.d.). Modernisation of Convention 108 .
- De Meyer, Jan. (1973). The Right to Respect for Private and Family Life, Home, and Communications in relations between individuals, and the Resulting Obligations for States Parties to the Convention. In A. H. Robertson, ed. Privacy and Human Rights. Manchester University Press.
- Douglas, Karen M., and Craig McGarty. (2001). Identifiability and Self-Presentation: Computer-Mediated Communication and Intergroup Interaction. British Journal of Social Psychology, Vol. 40(3), 399-416.
- Eissen, Marc-Andre. (1967). La protection internationale des droits de l'homme dans le cadre Européen. Dalloz.
- Fihlani, Pumza, (2017). Millions caught in South Africa's 'worst data breach'. BBC News, 20 October 2017.
- Finklea, Kristin. (2017). Dark Web. Congressional Research Service.
- Fleishman, Glenn. (2018). Milos Yiannopoulos. Jokes of Death Squads Murdering Journalists. Fortune, 26 June 2018.
- Fried, Charles. (1970). An Anatomy of Values. Harvard University Press.
- Global Partners Digital. (2017). Travel Guide to the Digital World: Encryption Policy for Human Rights Defenders .
- Gous, Nico. (2017). Top real estate company admits to being unwitting source of country's largest personal data breach. Sunday Times, 18 October 2017.
- Greenberg, Andy. (2016). Hack brief: Turkey breach spills info on more than half its citizens. Wired, 5 April 2016.
- Greenleaf, Graham. (2011). The Influence of European Data Privacy Standards Outside Europe: Implications for Globalisation of Convention 108. International Data Privacy Law, Vol. 2(2), 68-92.
- Haines, Russell, Hough, Jill, Cao, Lan, and Douglas Haines. (2014). Anonymity in computer-mediated communication: More contrarian ideas with less influence . Group Decision and Negotiation, Vol. 23(4), 765-786.
- Hern, Alex. (2018). Fitness tracking app Strava gives away location of secret army bases. The Guardian, 28 January 2018.
- HIPAA Journal. (2015). Summary of the HIPAA breach notification rule .
- Hopkins, Nick. (2017). Deloitte hack hit server containing emails from across US government. The Guardian, 10 October 2017.
- Janis, Mark, Richard Kay, and Anthony Bradley. (2000). European Human Rights Law: Text and Materials, 2 nd edition. Oxford University Press.
- Koops Bert-Jaap, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tomislav Chokrevski, and Maša Galič. (2017). A typology of privacy. University of Pennsylvania Journal of International Law, Vol. 38(2), 483-575.
- MacFarquhar, Neil. (2018). Russian court bans Telegram app after 18-minute hearing. The New York Times. 13 April 2018.
- Makulilo, Alex Boniface. (2013a). Data Protection Regimes in Africa: too far from the European 'adequacy' standard? International Data Privacy Law, Vol. 3(1), 42-50.
- Makulilo, Alex Boniface. (2013b). Mauritius Data Protection Commission: an analysis of its early decisions. International Data Privacy Law, Vol. 3(2), 131-139.
- Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
- Maras, Marie-Helen. (2009). From Targeted to Mass Surveillance: Is the EU Data Retention Directive a Necessary Measure or an Unjustified Threat to Privacy? In Ben Goold and Daniel Neyland, eds. New Directions in Surveillance and Privacy (pp. 74-103). Willan.
- Maras, Marie-Helen.(2014). Inside Darknet: The Takedown of Silk Road. Criminal Justice Matters, Vol. 98(1), 22-23.
- Maras, Marie-Helen. (2015). The Internet of Things: Security and Privacy Implications. International Data Privacy Law, Vol. 5(2), 99-104.
- Maras, Marie-Helen. (2012). The Social Consequences of a Mass Surveillance Measure: What Happens When We Become the "Others"? International Journal of Law, Crime and Justice, Vol. 40(2), 65-81.
- Maras, Marie-Helen and Wandt, Adam. (2019). Enabling Mass Surveillance: Data Aggregation in the Age of Big Data and the Internet of Things. Journal of Cyber Policy.
- Maras, Marie-Helen and Wandt, Adam. (2018). IoT Data Collection and Analytics. Presentation for FBI, DHS, and Secret Service agents and members of the National Cyber-Forensics & Training Alliance, at John Jay College of Criminal Justice, City University of New York (2 May 2018).
- Meyer, David. (2018). Iran Bans Telegram, an App Used By Half the Country. Fortune, 1 May 2018.
- Newman, Lily Hay. (2017). Yahoo's 2013 email hack actually compromised three billion accounts. Wired, 3 October 2017.
- Orji, Uchenna Jerome. (2017). Regionalizing data protection law: a discourse on the status and implementation of the ECOWAS Data Protection Act. International Data Privacy Law, Vol. 7(3), 179-189.
- Radziwill, Nicole, Jessica Romano, Diane Shorter, and Morgan Benton. (2015). The Ethics of Hacking: Should It Be Taught? arXiv.
- Rodriguez, Philippe-André. (2015). Human dignity as an essentially contested concept. Cambridge Review of International Affairs, Vol. 28(4), 743-756.
- Rost, Katja, Stahel, Lea and Bruno S. Frey. (2016). Digital Social Norm Enforcement: Online Firestorms in Social Media. PLOS One, Vol. 11(6).
- Safi, Michael. (2018). Personal data of a billion Indians sold online for £6, report claims. The Guardian, 4 January, 2018.
- Schroeder, Doris. (2017). How to define dignity and its place in human rights - a philosopher's view. The Conversation, 9 August 2017.
- Shultztiner, Doron and Guy E. Carmi. (2014). Human Dignity in National Constitutions: Functions, Promises and Dangers. The American Journal of Comparative Law, Vol. 62(2), 461-490.
- Tan, Lara. (2016). 55M Filipino voters open to fraud after Comelec hack - int'l tech security firm. CNN Philippines, 8 April 2016.
- United Nations Conference on Trade and Development. (2016). Data protection regulations and international data flows: Implications for trade and development .
- Vidhi Doshi. (2018). A security breach in India has left a billion people at risk of identity theft. The Washington Post, 4 January 2018.
- Zetter, Kim. (2015). Hackers finally post stolen Ashley Madison data. Wired, 18 August 2015.
Arrêts
- Escher et al. v. Brazil. Inter-American Court of Human Rights (Preliminary Objections, Merits, Reparations, and Costs). Judgment of 6 July 2009. Series C No. 200 (2009).
- Fontevecchia and D'Amico v. Argentina. Inter-American Court of Human Rights (Merits, Reparations and Costs). Judgment, I/A Court H.R., Series C No. 238 (2011).
- Google Spain SL, Google Inc. v. Agencia Española de Protección de Datos, Mario Costeja
- González Case C-131/12 [ECR, 13 May 2014].
- Ituango Massacres v. Colombia. Inter-American Court of Human Rights (Preliminary Objections, Merits, Reparations and Costs). Judgment of 1 July 2006. Series C No. 148 (2006).
- Kopp v. Switzerland (App No. 23224/94) [1998] ECHR 18.
- Pretty v. United Kingdom (App 2346/02) [2002] ECHR 423.
- Roman Zakharov v. Russia (App No. 47143/06) [2015] ECHR 1065.
- Rotaru v. Romania (App No. 28341/95) [2000] ECHR 192.
- S and Marper v United Kingdom (App nos. 30562/04 and 30566/04) [2008] ECHR 1581.
- Tristán Donoso v. Panama. Inter-American Court of Human Rights (Preliminary objection, merits, reparations and costs). Judgment of 27 January 2009. Series C No. 193 (2009).
- Weltimmo s. r. o. v. Nemzeti Adatvédelmi és Információszabadság Hatóság (Weltimmo v. Hungarian Data Protection Authority) Case C-230/14 [ECR, 30 October 2015].
- Wieser and Bicos Beteiligungen GmbH v Austria (App no. 74336/01) [2007] ECHR 815.
Législation internationale / conventions
- Charte africaine des droits de l'homme et des peuples de 1981(1981)
- African Union. Convention on Cyber Security and Personal Data Protection (2014)
- Inter-American Commission on Human Rights. American Convention on Human Rights (1969)
- Conseil de l'Europe.
- Economic Community of West African States (ECOWAS). Supplementary Act A/SA.1/01/10 on Personal Data Protection within ECOWAS
- Union Européenne
- Directive (UE) 2016/680 du Parlement européen et du Conseil du 27 avril 2016 relative à la protection des personnes physiques à l'égard du traitement des données à caractère personnel par les autorités compétentes à des fins de prévention et de détection des infractions pénales, d'enquêtes et de poursuites en la matière ou d'exécution de sanctions pénales, et à la libre circulation de ces données ().
- Directive 95/46/CE du Parlement européen et du Conseil du 24 octobre 1995 relative à la protection des personnes physiques à l'égard du traitement des données à caractère personnel et à la libre circulation de ces données
- Règlement général sur la protection des données (RGPD)
- Règlement (CE) n° 45/2001 du Parlement européen et du Conseil du 18 décembre 2000 relatif à la protection des personnes physiques à l'égard du traitement des données à caractère personnel par les institutions et organes communautaires et à la libre circulation de ces données
- Traité sur le fonctionnement de l'Union européenne de 1957 (version consolidée, 2012)
Matériels des Nations Unies
- Convention relative aux droits des personnes handicapées de 2006 (2006))
- Convention des Nations unies sur les droits de l'enfant de 1989.
- Déclaration des Nations Unies sur l'élimination de toutes les formes de discrimination raciale de 1963
- Convention des Nations Unies sur l'élimination de toutes les formes de discrimination à l'égard des femmes de 1979
- Déclaration universelle des droits de l'homme de 1948
- Pacte international relatif aux droits civils et politiques de 1966
- Pacte international relatif aux droits économiques, sociaux et culturels de 1966
- Convention internationale sur la protection des droits de tous les travailleurs migrants et des membres de leur famille de 1990 (Nations unies)
- Assemblée Générale
- Assemblée Générales, Conseil des Droits Humains
- Résolution (A/HRC/RES/34/7)
- Résolution (A/HRC/RES/38/7)
- Résolution (A/HRC/RES/39/6)
- Joint report of the Special Rapporteur on the rights to freedom of peaceful assembly and of association and the Special Rapporteur on extrajudicial, summary or arbitrary executions on the proper management of assemblies (A/HRC/31/66)
- Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue (A/HRC/23/40)
- The right to privacy in the digital age: Report of the United Nations High Commissioner for Human Rights (A/HRC/39/29)
Législation nationale
- Philippines. Data Privacy Act (2012)
- Ghana. Data Protection Act (2012)
- Mexico. Federal Law on Protection of Personal Data Held by Private Parties (2010)
- Mexico. General Law for the Protection of Personal Data in Possession of Obliged Subjects (2017)
- United States of America. Health Insurance Portability and Accountability Act (HIPAA) (1996)
- Qatar. Law No. (13) Promulgating the Protection of the Privacy of Personal Data Law (2016)
- Australia. Privacy Act (1988)
- New Zealand. Privacy Act (1993)
- Indonesia. Regulation No. 20 regarding the Protection of Personal Data in an Electronic System (2016)
- Indonesia. Regulation No. 82 concerning Electronic System and Transaction Operation (2012)
Section suivante : Exercices
Haut de page