CHAPTER


DOI :10.26650/B/ET06.2020.011.12   IUP :10.26650/B/ET06.2020.011.12    Full Text (PDF)

Privacy for Enterprises in the Data Age

Bilgin MetinEnes YılmazErdi Şekerciler

The world we live in is now becoming increasingly virtual. We all interact with this new age which we can describe as the digital age. We shop online, we communicate with people via social media, we are informed at any time through the devices that are in our hands about goings-on, whether we like it or not, we have become a part of this globalized and digitalized world. Data can be described as the structure of the digitalized world. In each interaction between us and the tools which we use, we create data or we cause data transferring or we can be a small part of a large data collection because of our presence in a platform on the internet. Certainly, this close relationship can reveal our private life in some situations. Most of the time, we are exposed to situations where our private information is collected, used, and processed without our permission. Sometimes we cannot even notice the violation of one of the most fundamental rights and freedoms we can define as privacy. This literature survey study is based on the fundamentals of information security, and it seeks answers to these questions: Why does our personal information need protection? What kind of information should be protected? What is the situation regarding the data privacy in Turkish and world law? What kind of laws have been passed upon the privacy of tax from past to today? What are the perspectives, opinions on protection of personal data in Turkey and Europe? What is the importance of data privacy for the business sectors? We also believe that this study will raise awareness on this matter.



References

  • de Montjoye, Y. A., Wang, S. S., Pentland, A., Anh, D. T. T., & Datta, A. (2012). On the Trusted Use of LargeScale Personal Data. IEEE Data Eng. Bull., 35(4), 5-8. google scholar
  • Bignami, F. (2007). Privacy and law enforcement in the European union: the data retention directive. Chi. J. Int’l L., 8, 233. google scholar
  • Dumortier, J., & Goemans, C. (2000). Data privacy and standardization. In CEN/ISSS Open Seminar on Data Protection, disponible sur https://www. law. kuleuven. be/icri/publications/90CEN-Paper. pdf. google scholar
  • McFarland, M. “Definitions of Privacy.” Internet: www.scu.edu/ethics/focus-areas/internet-ethics/resources/ what-is-privacy/, Jun. 01, 2012 [Oct. 06, 2016]. google scholar
  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), pp. 27-41 google scholar
  • Wagner DeCew, J. (1986). The scope of privacy in law and ethics. Law and Philosophy, 5(2), 145-173. google scholar
  • Chiper Cloud, (2015). “Global guide to data protection”.Internet: http://pages.ciphercloud.com/global-guide-todata-protection-laws-landing-page.html, Nov. 20, 2015 [Oct. 02, 2016]. google scholar
  • Hoven, J. V. D., Blaauw M., Pieters W.& Warnier M. “Privacy and Information Technology.” Internet: http:// plato.stanford.edu/entries/it-privacy/ , Nov. 20, 2014 [Nov.. 02, 2019]. google scholar
  • Privacy International, (2016). “The Global Surveillance Industry”. Internet: https://privacyinternational.org/ explainer/1632/global-surveillance-industry, [Nov. 02, 2019]. google scholar
  • Allison, S. F., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19-29. google scholar
  • O’Brien, S (2019). “The Difference Between Data Privacy and Data Security”. Internet: https://blog.cygilant. com/blog/the-difference-between-data-privacy-and-data-security, Oct. 22, 2019 [Nov. 2 , 2019] google scholar
  • CBSnews (2019) https://www.cbsnews.com/news/millions-facebook-user-records-exposed-amazon-cloudserver/ [July 31, 2019] google scholar
  • International Telecommunication Union (2006) “Research on legislation in data privacy, security and the prevention of cybercrime” Place des Nations CH-1211 Geneva, Switzerland (p. 69) google scholar
  • Keser, L., Kaya, M. B., & Kınıkoğlu, B. (2014). Türkiye’de Kişisel Verilerin Korunmasının Hukuki ve Ekonomik Analizi. [Legal and Economic Analysis of the Personal Data Protection in Turkey] https://www. tepav.org.tr/upload/files/1421853130-9.Turkiyede_Kisisel_Verilerin_Korunmasinin_Ekonomik_ve_ Hukuki_Analizi.pdf [ Nov. 2, 2019] google scholar
  • Solove, D. J., & Hartzog, W. (2014). The FTC and the new common law of privacy. Columbia Law Review, pp. 583-676. google scholar
  • Ersoy, E. (2007). Gizlilik, Bireysel Haklar, Kişisel Verilerin Korunması [Privacy, Individual Rights, Protection of Personal Data]. Akademik Bilişim Konferansı 2007. google scholar
  • Turan M. (2016). Kişisel Verilerin Korunması [Protection of Personal Data] Türkiye Kalkınma Bankası Yayını, vol. 80, pp. 2-3 April-June, 2016 google scholar
  • Henkoğlu, T., & Yılmaz, B. (2013). Avrupa Birliği (AB) Bilgi Güvenliği Politikaları [European Union (EU) Information Security Policies]. Türk Kütüphaneciliği, 27(3), 451-471. google scholar
  • Dedeoğlu, G. (2004). Gözetleme, Mahremiyet ve İnsan Onuru [Surveillance, Privacy and Human Dignity]. TBD Bilişim, 89, 36. google scholar
  • KVKK (2016). Türkiye’de Kişisel Verilerin Korunmasının Hukuki ve Ekonomik Analizi [Legal and Economic Analysis of the Protection of Personal Data in Turkey] Internet:http://www.resmigazete.gov.tr/, Apr. 07, 2016 [Oct. 08, 2016]. google scholar
  • Çırakoğlu, M. (2016). Düzenleyici Ve Denetleyici Kurulların Denetlenme Şekillerinin İdari Vesayet Bakımından Değerlendirilmesi [Evaluation of the Ways of Inspection of Regulatory and Supervisory Boards in terms of Administrative Guardianship.]. Yıldırım Beyazıt Hukuk Dergisi, (2). google scholar
  • Strahilevitz, L. (2013). Toward a positive theory of privacy law. Harvard Law Review, 113(1). google scholar
  • Nissenbaum, H. (2014). Respect for Context as a Benchmark for Privacy Online: What it Is and Isn’t. Cahier de prospective, 19. google scholar
  • Schwartz, P. M. (2004). Property, privacy, and personal data. Harvard Law Review, 2056-2128. google scholar
  • Walch, D. (2011). Family Educational Rights and Privacy Act. Harmony, 503, 594-6000. google scholar
  • Code, U. S. (1999). Gramm-Leach-Bliley Act. Gramm-Leach-Bliley Act/AHIMA, American Health Information Management Association. google scholar
  • Stokes, R. (1999). Fair Credit Reporting Act., internet: https://www.consumer.ftc.gov/articles/pdf-0111-faircredit-reporting-act.pdf [Nov. 2, 2019] google scholar
  • Onur, A (2013). Impact of Telecominications Regulation on Data Protection. İstanbul Bilgi Üniversitesi Sosyal Bilimler Enstitüsü Bilişim ve Teknolojileri Hukuku. google scholar
  • Privacy Act, (1974).” Privacy Act of 1974”. Internet: https://foia.state.gov/Learn/PrivacyAct.aspx, Sep. 9, 2000 [Oct. 16 , 2016] google scholar
  • Küzeci, E. (2010). Kişisel Verilerin Korunması [Protection of Personal Data]. Turhan Kitabevi. google scholar
  • Kılınç, D. (2012). Anayasal Bir Hak Olarak Kişisel Verilerin Korunması [Protection of Personal Data as a Constitutional Right], Anakara Üniversitesi Hukuk Fakültesi Dergisi, 61 (3) 2012:1089-1169 google scholar
  • İzgi, M. C. (2014). Mahremiyet Kavramı Bağlamında Kişisel Sağlık Verileri [Personal Health Data in the Context of the Privacy Concept]. Türkiye Biyoetik Dergisi, 1(1). google scholar
  • Karaarslan, E., Koç, S., & Akın, G. (2010). Vatandaşlık Numarası Bazlı E-Devlet Sistemlerinde Kişisel Veri Mahremiyeti Durum Saptaması [Personal Data Privacy Status Determination in Citizenship Number Based E-Government Systems] İzmir Bilişim Hukuk Kurultayı, 1-8. google scholar
  • Kaya, C. (2011). Avrupa Birliği Veri Koruma Direktifi Ekseninde Hassas (Kişisel) Veriler ve İşlenmesi [Sensitive (Personal) Data and Processing on the Axis of the European Union Data Protection Directive]. İstanbul Üniversitesi Hukuk Fakültesi Mecmuası,vol. 69(1-2), 317-334. google scholar
  • Ketizmen, M., & Ülküderner, M. (2007). E-devlet uygulamalarında kişisel verilerin korun(ma)ması [protection (failure) of personal data in e-government applications]. XII.“Türkiye’de İnternet” Konferansı. google scholar
  • Ceran A. (2014). Kişisel Verilerin Korunması: Avrupa ve Türkiye [Personal Data Protection: Europe and Turkey]. Iktisadi Kalkınma Vakfı Değerlendirme Notu, vol.104. google scholar
  • Karimi, O. & Korkmaz, A. (2013). Kişisel Verilerin Korunmasi [Personal Data Protection]. 18. Türkiye’de İnternet Konferansı inet-tr’13, İstanbul Üniversitesi, 9-11 Aralık 2013, İstanbul, Türkiye. google scholar
  • OECD (2008). OECD Policy Guidance on Online Identity Theft, Internet: http://www.oecd.org/sti/ consumer/40879136.pdf , [Nov. 2, 2019] google scholar
  • ISO/IEC 29134 (2017), ISO/IEC 29134:2017, Guidelines for privacy impact assessment, internet: https://www. iso.org/obp/ui/#iso:std:iso-iec:29134:ed-1:v1:en google scholar
  • ICO (2015). Conducting privacy impact assessments code of practice. Internet: https://ico.org.uk/media/about-theico/consultations/2052/draft-conducting-privacy-impact-assessments-code-of-practice.pdf [Oct. 02 , 2019] google scholar
  • SEC (2007). Privacy Impact Assessment (PIA) Guide. Privacy Office of Information Technology. Internet: https://www.sec.gov/about/privacy/piaguide.pdf [Nov. 2, 2019] google scholar
  • IPC (2015). “ Information and Privacy Commissioner of Ontario: “, Planning-for-Success Privacy Impact Assessment Guide, Internet: https://www.ipc.on.ca/wp-content/uploads/2015/05/Planning-for-SuccessPIA-Guide.pdf [02 Nov. 2019] google scholar
  • HIQA (2017). Guidance on Privacy Impact Assessment in health and social care, Health Information and Quality Authority, Internet: https://www.hiqa.ie/sites/default/files/2017-10/Guidance-on-Privacy-ImpactAssessment-in-health-and-social-care.pdf, Oct. 2017 [Nov. 02 , 2019] google scholar
  • GDPR (2016). Regulatıon (Eu) 2016/679 Of The European Parliament And Of The Council Act. Official Journal Of European Union, (65). google scholar
  • CSX (2015). “ Cyber Security Nexus Cyber Security Fundamentals”. Internet: https://www.isaca.org/cyber, Jan. 1, 2015 [Oct. 28 , 2016], pp 77-82. google scholar
  • New York Times (2018), https://www.nytimes.com/2018/12/11/us/politics/trump-china-trade.html, New York Times, Dec. 11, 2018, [july 31 2019] google scholar
  • Pascual A., Marchini K. & Miller S. “2016 Identity Fraud: Fraud Hits an Inflection Point.” Internet:www. javelinstrategy.com/coverage-area/2016-identity-fraud-fraud-hits-inflection-point , Feb. 02, 2016 [Oct. 02, 2016]. google scholar
  • Lindén, F. (2009). epsos, smart open services for European patients from strategies to services health as the enabler for cross-border healthcare. Infrastructures for Health Care, 23. google scholar
  • Dülger, M.V. (2019a). Kişisel Verilerin Korunması Hukuku [Personal Data Protection Law]. İstanbul: Hukuk Akademisi Yayıncılık google scholar
  • Dülger, M. V. (2019b). First Major Breach of the GDPR: France Fined Google€ 50.000. 000. Available at SSRN 3331321. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3331321 google scholar
  • Dülger, M. V. (2018) İnsan Hakları ve Temel Hak ve Özgürlükler Bağlamında Kişisel Verilerin Korunması [Protection of Personal Data in the Context of Human Rights and Fundamental Rights and Freedoms]. İstanbul Medipol Üniversitesi Hukuk Fakültesi Dergisi 5 (1), Bahar 2018 google scholar
  • Kayyali, B., Knott, D., & van Kuiken S. (2013), The ‘big data’ revolution in healthcare: Accelerating value and innovation, McKinsey Global Institute Report, https://www.mckinsey.com/industries/healthcare-systemsand-services/our-insights/the-big-data-revolution-in-us-health-care [Nov. 02, 2019]. google scholar
  • Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations. Technological Forecasting and Social Change, 126, 3-13. google scholar
  • Yu, K. H., Beam, A. L., & Kohane, I. S. (2018). Artificial intelligence in healthcare. Nature biomedical engineering, 2(10), 719-731. google scholar
  • Pendley, J. A. (2018). Finance and Accounting Professionals and Cybersecurity Awareness. Journal of Corporate Accounting & Finance, 29(1), 53-58. google scholar
  • Aggarwal, A. K. (2019). Opportunities and challenges of big data in public sector. In Web Services: Concepts, Methodologies, Tools, and Applications (pp. 1749-1761). IGI Global. google scholar


SHARE




Istanbul University Press aims to contribute to the dissemination of ever growing scientific knowledge through publication of high quality scientific journals and books in accordance with the international publishing standards and ethics. Istanbul University Press follows an open access, non-commercial, scholarly publishing.