Sylvia Kierkegaard

Last updated

Sylvia Mercado Kierkegaard
Born1952
Died2015
Scientific career
Institutions University of Southampton
Website www.kierkegaard.co.uk

Sylvia Mercado Kierkegaard was a Philippine jurist who specialized in computer law.

Contents

Her research covered a wide range of topics, including comparative contract law, alternative dispute resolution, intellectual property rights, European Union law, privacy, electronic commerce, cybersecurity, computer law, and data protection. She wrote and edited books and journal articles.

She was the president of the International Association of IT Lawyers (IAITL), an association of IT lawyers and legal scholars specializing in computer law, privacy, and security. [1]

In 2003, she finished an International Masters in European Business and Law at Aarhus University with the highest grade. [2]

Career

Kierkegaard was a professor at the Communications University of China, professor-research fellow at The Institute for Law and the Web (ILAWS; University of Southampton), and adjunct professor at Xi'an Jiaotong University. [3]

She was a frequent keynote speaker, invited expert, and panelist of various international workshops organised by international institutions, judiciary, European Union, television, and government bodies. [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17]

Community service

Kierkegaard served as chair of the Organizing Committee of the IAITL legal conference series [18] [19] [20] and is editor-in-chief of the Journal of International Commercial Law and Technology , International Journal of Private Law , and the International Journal of Public Law and Policy . [21] She serves also as associate editor of the International Journal of Intercultural Information Management , [22] and managing editor of the Journal of Legal Technology Risk and Management . [23]

Kierkegaard served as an expert adviser, [24] [25] [26] [27] [28] speaker, [29] [30] and member of various study groups and committees for the European Union and the Council of Europe, [31] which draft policies and proposals for legislative and regulatory policies on international level, [32] [33] [34] as well as international associations. [35] [36] [37]

Other activities included serving as a member of the Policy and Scientific Committee of the European Privacy Association. [38]

Publications

Articles

Books

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cyber security, digital security or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime is a type of crime involving a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances.

<span class="mw-page-title-main">Privacy International</span>

Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.

Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.

<span class="mw-page-title-main">IT security standards</span> Technology standards and techniques

IT security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access and control system attacks. There are numerous measures available to prevent cyberattacks.

<span class="mw-page-title-main">International Association of Privacy Professionals</span> Nonprofit membership association

The International Association of Privacy Professionals (IAPP) is a nonprofit, non-advocacy membership association founded in 2000. It provides a forum for privacy professionals to share best practices, track trends, advance privacy management issues, standardize the designations for privacy professionals, provide education and guidance on career opportunities in the field of information privacy. The IAPP offers a full suite of educational and professional development services, including privacy training, certification programs, publications and annual conferences. It is headquartered in Portsmouth, New Hampshire.

Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or private organisations, or other individuals. It also applies in the commercial sector to things like trade secrets and the liability that directors, officers, and employees have when handing sensitive information.

<span class="mw-page-title-main">Hugo Teufel III</span> American lawyer

Hugo Teufel III is an American lawyer and former government official.

<span class="mw-page-title-main">European Digital Rights</span> Advocacy group

European Digital Rights (EDRi) is an international advocacy group headquartered in Brussels, Belgium. EDRi is a network collective of non-profit organizations (NGO), experts, advocates and academics working to defend and advance digital rights across the continent. As of October 2022, EDRi is made of more than 40 NGOs, as well as experts, advocates and academics from all across Europe.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

<span class="mw-page-title-main">Anti-Counterfeiting Trade Agreement</span> Treaty on intellectual property

The Anti-Counterfeiting Trade Agreement (ACTA) is a multilateral treaty for the purpose of establishing international standards for intellectual property rights enforcement that did not enter into force. The agreement aims to establish an international legal framework for targeting counterfeit goods, generic medicines and copyright infringement on the Internet, and would create a new governing body outside existing forums, such as the World Trade Organization, the World Intellectual Property Organization, and the United Nations.

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

<span class="mw-page-title-main">General Data Protection Regulation</span> European Union regulation on personal data

The General Data Protection Regulation is a Regulation in EU law on data protection and privacy in the EU and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and of human rights law, in particular Article 8(1) of the Charter of Fundamental Rights of the European Union. It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR's primary aim is to enhance individuals' control and rights over their personal data and to simplify the regulatory environment for international business. Superseding the Data Protection Directive 95/46/EC, the regulation contains provisions and requirements related to the processing of personal data of individuals, formally called "data subjects", who are located in the EEA, and applies to any enterprise—regardless of its location and the data subjects' citizenship or residence—that is processing the personal information of individuals inside the EEA.

<span class="mw-page-title-main">Bill Buchanan (computer scientist)</span> Scottish computer scientist

William Johnston BuchananOBE FBCS CEng PFHEA is a Scottish computer scientist. Buchanan was born in Falkirk, Scotland in 1961. Buchanan is a professor in the School of Computing, Engineering and the Built Environment. He currently leads the Blockpass ID Lab and the Centre for Cybersecurity, IoT and Cyberphysical at Edinburgh Napier University.

<span class="mw-page-title-main">Solange Ghernaouti</span> Swiss academic, international expert in cybersecurity and cyber defence

Solange Ghernaouti is a professor at the University of Lausanne (UNIL) and an international expert on cybersecurity and cyberdefence. She regularly collaborates with various United Nations, European and government institutions as well as with private corporations.

Privacy engineering is an emerging field of engineering which aims to provide methodologies, tools, and techniques to ensure systems provide acceptable levels of privacy.

Sushil Jajodia is a computer scientist known for his work on cyber security and privacy, databases, and distributed systems.

References

  1. "The International Association of IT Lawyers (IAITL)". IAITL. Retrieved 27 February 2014.
  2. "Pressemeddelelser – Arkiv 2003, Nyhedsbrev nr. 15, 20. januar 2003". Aarhus University. Archived from the original on 12 March 2007. Retrieved 27 February 2014.
  3. "Academic Centre of Excellence in Cybersecurity". Academic Centre of Excellence in Cybersecurity. Retrieved 27 February 2014.
  4. "16th Eurasian Economic Summit". Hürriyet Daily News. 13 September 2011. Retrieved 5 February 2014.
  5. "Challenges in Cybersecurity – Risks, Strategies, and Confidence-Building International Conference" (PDF). B-ccentre.be. Archived from the original (PDF) on 29 October 2013. Retrieved 5 February 2012.
  6. "Advising world leaders on cybercrime". University of Southampton. 14 September 2013. Retrieved 5 February 2014.
  7. "1st International Workshop on Trans-Border Commercial Law" (PDF). Unisa.ac.za. Retrieved 5 February 2014.
  8. "Council of Europe Forum for the Future of Democracy". Coe.int. Retrieved 5 February 2014.
  9. "The 4th Regional Conference on Cybercrime" (PDF). Investigateway.com. Archived from the original (PDF) on 31 March 2012. Retrieved 5 February 2013.
  10. "Participants". CMCS. Archived from the original on 19 April 2012. Retrieved 18 October 2011.
  11. "I Conferência Nacional da ILA-Brasil". Iccrime.com.br. Retrieved 18 October 2011.[ permanent dead link ]
  12. "Events – UMCoRS". Umcors.um.edu.my. 27 April 2009. Archived from the original on 31 March 2012. Retrieved 18 October 2011.
  13. "Summer School on European Information Law | European Academy of Law and ICT". Lawandict.eu. 5 August 2011. Archived from the original on 31 March 2012. Retrieved 18 October 2011.
  14. Time(PDF) https://web.archive.org/web/20131029205850/http://www.screenreader4free.eu/downloads/Symposium%20Agenda%20-%2025%20February.pdf. Archived from the original (PDF) on 29 October 2013. Retrieved 5 February 2014.{{cite magazine}}: Missing or empty |title= (help)
  15. "Who is Who". Cpdpconferences.org. Archived from the original on 4 November 2011. Retrieved 18 October 2011.
  16. Archived 19 April 2012 at the Wayback Machine [ dead link ]
  17. "Turk.Internet.com". Turk.Internet.com. Retrieved 18 October 2011.
  18. "Global IT lawyers meet in Bangkok". Institute for Law and the Web (ILAWS). Retrieved 5 February 2014.
  19. "International Conference on Legal, Security and Privacy Issues in IT Law (LSPI), International Law and Trade Conference (ILTC), International Private Law Conference (IPL), International Public Law Conference (IPLC)". LSPI. Retrieved 5 February 2014.
  20. "id law partners". id law partners. Retrieved 5 February 2014.
  21. "International Journal of Public Law and Policy (IJPLAP)". Inderscience.com. Retrieved 18 October 2011.
  22. "International Journal of Intercultural Information Management (IJIIM) – Inderscience Publishers". Inderscience.com. Retrieved 5 February 2014.
  23. "Journal of Legal Technology Risk and Management". Ltrm.org. Archived from the original on 11 February 2009. Retrieved 18 October 2011.
  24. "Council of Europe Forum for the Future of Democracy" (PDF). Coe.int. Retrieved 5 February 2014.
  25. "European Commission". ec.europa.eu/. Retrieved 27 February 2014.
  26. "Forum Prog 2008 En" . Retrieved 18 October 2011 via Scribd.
  27. "Technology is Fast Changing and Legislation Can't Keep Up". Türk İnternet. Retrieved 27 February 2014.
  28. "Demo-Net Affiliated experts". DEMO-net – the eParticipation Network of Excellence. Archived from the original on 18 October 2010. Retrieved 27 February 2014.
  29. "Kierkegaard". 31 August 2010. Archived from the original on 31 August 2010. Retrieved 27 February 2014.
  30. "Außenministerium Österreich -> Botschaft -> Auslandsösterreicher -> Council of Europe (CAHDE)". Bmeia.gv.at. Retrieved 27 February 2014.
  31. "Council of Europe: Regulating eDemocracy: What preparations are being made for regulation in Europe?" . Retrieved 18 October 2011.
  32. http://www.eu-china-infso.org/Regulation/regulation101119@2008-01-10.html . Retrieved 22 March 2008.{{cite web}}: Missing or empty |title= (help)[ dead link ]
  33. Archived 25 March 2009 at the Wayback Machine
  34. "人文学院马民虎教授应邀参加"中欧信息安全立法研讨会"_交大新闻网". Xjtunews.xjtu.edu.cn. Archived from the original on 15 February 2008. Retrieved 18 October 2011.
  35. "Копирайт пакт: защита на съдържанието онлайн « [Медийно право][Нели Огнянова]". Nellyo.wordpress.com. 24 October 2007. Retrieved 18 October 2011.
  36. "Hukuk Kurultayı 2014 | 3. DAY 10 JANUARY 2014 FRIDAY VENUE 1". Archived from the original on 25 July 2014. Retrieved 27 February 2014.
  37. "EICAR Conference". Eicar.org. Retrieved 18 October 2011.
  38. "European Privacy Association". European Privacy Association (ABSL). Archived from the original on 5 October 2013. Retrieved 27 February 2014.