{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:59:43Z","timestamp":1743094783154},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319447599"},{"type":"electronic","value":"9783319447605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44760-5_2","type":"book-chapter","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T23:06:18Z","timestamp":1472857578000},"page":"21-37","source":"Crossref","is-referenced-by-count":49,"title":["A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation"],"prefix":"10.1007","author":[{"given":"Felix","family":"Bieker","sequence":"first","affiliation":[]},{"given":"Michael","family":"Friedewald","sequence":"additional","affiliation":[]},{"given":"Marit","family":"Hansen","sequence":"additional","affiliation":[]},{"given":"Hannah","family":"Obersteller","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Rost","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,3]]},"reference":[{"key":"2_CR1","unstructured":"European Commission: Recommendation of 12 May 2009 on the implementation of privacy and data protection principles in applications supported by radio-frequency identification. OJ L 122\/47 of 16 May 2009. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32009H0387&from=EN"},{"key":"2_CR2","unstructured":"European Commission: Recommendation of 9 March 2012 on preparations for the roll-out of smart metering systems. OJ L 73\/9 of 13 March 2012. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32012H0148&from=EN"},{"key":"2_CR3","unstructured":"Article 29 Working Party: Opinion 5\/2010 on the Industry Proposal for a Privacy and Data Protection Impact Assessment Framework for RFID Applications. WP 175 (2010). http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2010\/wp175_en.pdf"},{"key":"2_CR4","unstructured":"Article 29 Working Party: Opinion 07\/2013 on the Data Protection Impact Assessment Template for Smart Grid and Smart Metering Systems (\u2018DPIA Template\u2019) prepared by Expert Group 2 of the Commission\u2019s Smart Grid Task Force. WP 209 (2013). http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp209_en.pdf"},{"volume-title":"Privacy Impact Assessment","year":"2012","key":"2_CR5","unstructured":"Wright, D., De Hert, P. (eds.): Privacy Impact Assessment. Springer, Heidelberg (2012)"},{"key":"2_CR6","unstructured":"ISO\/IEC 29134: Information technology \u2013 Security techniques \u2013 Privacy impact assessment \u2013 Guidelines. ISO\/IEC, International Organization for Standardization (2016)"},{"key":"2_CR7","unstructured":"ICO (Information Commissioner\u2019s Office): Conducting privacy impact assessments code of practice. ICO (2014). https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1595\/pia-code-of-practice.pdf"},{"key":"2_CR8","unstructured":"CNIL (Commission Nationale de l\u2019Informatique et des Libert\u00e9s): Privacy Impact Assessment: Methodology (how to carry out a PIA). CNIL (2015). http:\/\/www.cnil.fr\/fileadmin\/documents\/en\/CNIL-PIA-1-Methodology.pdf"},{"key":"2_CR9","unstructured":"Friedewald, M., Bieker, F., Nebel, M., Obersteller, H., Rost, M.: Datenschutz-Folgenabsch\u00e4tzung - Ein Werkzeug f\u00fcr einen besseren Datenschutz. Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt, Karlsruhe (2016). https:\/\/www.forum-privatheit.de"},{"key":"2_CR10","unstructured":"Wright, D., Gellert, R., Bellanova, R., Gutwirth, S., Langheinrich, M., Friedewald, M., Hallinan, D., Venier, S., Mordini, E.: Privacy Impact Assessment and Smart Surveillance: A State of the Art Report, Deliverable 3.1 SAPIENT Project (2013). http:\/\/www.sapient-project.eu"},{"issue":"1\u20132","key":"2_CR11","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/13511610.2013.761748","volume":"26","author":"K Wadhwa","year":"2013","unstructured":"Wadhwa, K., Rodrigues, R.: Evaluating privacy impact assessments. Innov. Eur. J. Soc. Sci. Res. 26(1\u20132), 161\u2013180 (2013)","journal-title":"Innov. Eur. J. Soc. Sci. Res."},{"issue":"1","key":"2_CR12","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1093\/idpl\/ipu027","volume":"5","author":"D Wright","year":"2015","unstructured":"Wright, D., Friedewald, M., Gellert, R.: Developing and testing a surveillance impact assessment methodology. Int. Data Priv. Law 5(1), 40\u201353 (2015)","journal-title":"Int. Data Priv. Law"},{"key":"2_CR13","unstructured":"AK Technik der Konferenz der Datenschutzbeauftragten des Bundes und der L\u00e4nder, Schulz, G., Rost, M.: Das Standard-Datenschutzmodell \u2013 der Weg vom Recht zur Technik: Ein Datenschutzwerkzeug f\u00fcr Aufsichtsbeh\u00f6rden und verantwortliche Stellen (2015). https:\/\/www.datenschutzzentrum.de\/uploads\/sdm\/SDM_Tagungsband2015_Hannover.pdf"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 International Workshop on Privacy Engineering (IWPE), Security and Privacy Workshops (SPW), pp. 159\u2013166. IEEE (2015)","DOI":"10.1109\/SPW.2015.13"},{"key":"2_CR15","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/s11623-009-0072-9","volume":"33","author":"M Rost","year":"2009","unstructured":"Rost, M., Pfitzmann, A.: Datenschutz-Schutzziele - revisited. DuD - Datenschutz und Datensicherheit 33, 353\u2013358 (2009)","journal-title":"DuD - Datenschutz und Datensicherheit"},{"key":"2_CR16","unstructured":"Rost, M., Bock, K.: Privacy by Design and the New Protection Goals, EuroPriSe Whitepaper (2011). https:\/\/www.european-privacy-seal.eu\/AppFile\/GetFile\/ca6cdc46-d4dd-477d-9172-48ed5f54a99c"},{"key":"2_CR17","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-642-31668-5_2","volume-title":"Privacy and Identity Management for Life","author":"M Hansen","year":"2012","unstructured":"Hansen, M.: Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 14\u201331. Springer, Heidelberg (2012)"},{"key":"2_CR18","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le M\u00e9tayer, D., Tirtea, R., Schiffner, S.: Privacy and Data Protection by Design - from policy to engineering, ENISA (2014). https:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/privacy-and-data-protection-by-design\/at_download\/fullReport"},{"key":"2_CR19","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (Federal Office for Information Security): BSI-Standard 100-2, IT-Grundschutz Methodology (2008). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/BSIStandards\/standard_100-2_e_pdf.pdf"},{"key":"2_CR20","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/s11623-012-0154-y","volume":"36","author":"T Probst","year":"2012","unstructured":"Probst, T.: Generische Schutzma\u00dfnahmen f\u00fcr Datenschutz-Schutzziele. DuD - Datenschutz und Datensicherheit 36, 439\u2013444 (2012)","journal-title":"DuD - Datenschutz und Datensicherheit"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44760-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:56:10Z","timestamp":1498341370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44760-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319447599","9783319447605"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44760-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}