حق بر تبادل داده های خصوصی و راه‌کارهای رفع چالش‌های آن در سازوکار عملکرد ابزارهای اینترنت اشیا

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشیار دانشگاه علوم قضایی

2 دانشجوی دکترای حقوق خصوصی دانشگاه علوم قضایی

چکیده

هدف از پژوهش حاضر تحلیل یکی از حقوق بیان شده با عنوان «حق بر تبادل دادههای خصوصی» است. سوال اصلی پژوهش بررسی چیستیشناسی این حق و چالشهای اجرای آن است. فرضیه این پژوهش بر این امر استوار است که مطابق با مفاد ماده (20) آییننامه عمومی حفاظت از اطلاعات اتحادیه اروپا مصوب 2016 حق بر تبادل دادههای خصوصی بهمنزله انتقال حق نظارت و کنترل اطلاعات جمعآوری شده از سوی ابزار اینترنت اشیا از کنترلکننده اولیه به ثانویه است. اجرای این حق با چالشهایی از جمله محدوده اجرای مقررات حق مزبور، استثنائات حاکم بر اصول مقدماتی اجرای حق مزبور و سازوکار تبادل بدون بازگشت پردازش دادههای خصوصی اشخاص از یک کنترلکننده به کنترلکننده دیگر استوار است. اجرای این حق در نظام حقوقی ایران منوط به اجرای برخی سیاستگذاریهای تقنینی از جمله اصلاح قوانین موجود، پیادهسازی زیرساختهای بهکارگیری ابزارهای اینترنت اشیا، آگاهی بخشی به مردم و نظارت مراجع صلاحیتدار میباشد.

کلیدواژه‌ها


عنوان مقاله [English]

The Right to Private Data Portability and Solutions to Challenges in the Mechanism of Functioning of IoT Tools

نویسندگان [English]

  • Aliakbar Farahzadi 1
  • Mahdi Naser 2
1 Associate Professor of University of Judicial Sciences
2 PhD Student in Private Law In University of Judicial Sciences and Administrative Services
چکیده [English]

IoT is the technology of connecting electronic devices to each other or to the human agent. These tools perform tasks in various sectors of industry and commerce in accordance with the protocols given to their processor. But the mechanism of action of these tools sometimes faces challenges related to private information of individuals. Accordingly, laws enacted in developed legal systems, including the European Union, provide for rights for information holders. The purpose of this study is to analyze one of the rights expressed as "the right to exchange private data". The main question of the present study is to answer the nature of this right and the challenges of its implementation. The hypothesis of this study is that in accordance with the provisions of Article 20 of the EU General Data Protection Regulation adopted in 2016, the right to exchange private data constitutes the transfer of the right to monitor and control information collected by IoT tools from the primary controller. Is secondary. The exercise of this right is fraught with challenges, including the scope of the provisions of the right, the exceptions to the basic principles of the exercise of the right, and the mechanism of non-return processing of private data from one controller to another. The implementation of this right in the Iranian legal system is subject to the implementation of some legislative policies, including the reform of existing laws, the implementation of the infrastructure for the use of IoT tools, public awareness and supervision of competent authorities.
 

کلیدواژه‌ها [English]

  • IOT Tools / Right to Data Portability / EU General Data Protection Regulation 2016 / Challenges and Solutions
صادقی، حسین و مهدی ناصر (1397)، «واکاوی نقش قراردادهای هوشمند در توسعه نظام ثبت الکترونیکی اسناد»، فصلنامه دیدگاه‌های حقوق قضایی، دوره 23، شماره 84، صص 101-124.
اسلامی تبار، امیر و مهدی ناصر (1399)، «کارکرد بلاک چین در حمایت از کپی رایت»، فصلنامه پژوهش حقوق خصوصی، دوره 8، شماره 30، صص 9-38.
Eugenia Politou, Efthimios Alepis and Constantinos Patsakis,(2018), Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions, Journal of Cybersecurity, 1-20
European Commission, (accessed 13 Nov2019) The Article 29 Working Party Ceased to Exist as of 25 May 2018, https://ec.europa.eu/newsroom/article29/item detail. Cfm ? item id=629492,
Finck Michèle,Pallas Frank,(2020),They who must not be identified—distinguishing personal from non-personal data under the GDPR«,International Data Privacy Law,Volume10,Issue1,February,pp11-36
GRAEF, I, (2015),Mandating Portability and Interoperability in Online Social Networks: Regulatory and Competition Law Issues in the European Union (22 July 2013).Telecommunications Policy, Vol. 39, No. 6, p. 502-514.
Gymrek M, McGuire AL, Golan D,(2013). Identifying personal genomes by surname inference. Science ;339 :321-4
Hari Gottipati, (Last Visited 22 July 2019) With iBeacon, Apple is going to dump NFC and embrace the Internet of Things, Gigaom, available at https://gigaom.com/2013/09/10/with-ibeacon-apple-is-going-to-dump-on-nfc-andembrace-the-internet-of-things
Ingrid Lunden, (Last Visited 8 July 2019) ARM Acquires Internet of Things Startup Sensinode to Move Beyond Tablets and Phones, Techcrunch ,http://techcrunch.com/2013/08/27/arm-acquires-internet-of-things-startup-sensinodeto-move-beyond-tablets-and-phones
Introna LD.(1997), Privacy and the computer: why we need privacy in the information society. Metaphilosophy; 28:259-75.
Lindqvist Jenna,(2017), New challenges to personal data processingagreements: is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things?, International Journal of Law and Information Technology, Downloaded from https://academic.oup.com/ijlit/advance-article-abstract/doi/10.1093/ijlit/eax024/4769343
Nest.com web page(accessed 18 June 2019) <https://nest.com/uk/thermostat/meet-nest-thermostat/
Swire P,.Lagos,Y (2013), Why the Right to Data Portability Likely Reduces ConsumerWelfare: Antitrust and Privacy, Critique Public Law and LegalTheoryWorking,Paper Series No.204,May 31 , 347.
Rubinstein IS. (2013) Big data: the end of privacy or a new beginning? Int Data Privacy L; 3:74-87
Top-10 blockchain protocols changing the world in 2019 http://risingblockchain.com/top10-blockchain-protocols-2019/
van der Sloot, Bart,(2017) ‘Do Privacy and Data Protection Rules Apply to Legal Persons and Should They? A Proposal for a Two-tiered System’, 31 Computer Law and Security Review, Volume 13, Issue 8, pp 18-34