1. The legal domain of privacy and data protection requires compliance with a series of legal requirements for the development, design, default settings, and employment of computer architectures.
2. Human rights law has evolved from protecting individual citizens against powerful states to include social and economic rights and group identities.
3. Privacy is an elusive concept that can be defined in terms of family resemblance, encompassing categories such as the right to be let alone, limited access to self, secrecy, control over personal information, personhood protection, and intimacy.
The article "Privacy and Data Protection · Law for Computer Scientists" provides an overview of the legal requirements for privacy and data protection in the context of computing systems. While the article covers a broad range of topics, it suffers from several biases and omissions.
One potential bias is the author's focus on European Union (EU) law, which may not be applicable to readers outside of the EU. The article also assumes that readers are familiar with legal terminology and concepts, which may not be the case for computer scientists who lack a legal background.
The article's discussion of human rights law is informative but lacks depth. For example, it does not explore the tension between individual rights and state sovereignty or address criticisms of human rights as a Western construct that may not be applicable to non-Western cultures.
The section on privacy provides a useful overview of different conceptions of privacy but fails to acknowledge that these definitions are contested and culturally specific. The article also conflates privacy with digital security, which may lead readers to overlook other aspects of privacy such as bodily autonomy or freedom from surveillance.
The discussion of data protection law focuses primarily on EU law, which may not be relevant to readers outside of the EU. The article also presents data protection as a new fundamental right without acknowledging that this right has been contested by some scholars who argue that it conflicts with other fundamental rights such as freedom of expression.
Overall, while the article provides a useful introduction to privacy and data protection law for computer scientists, it suffers from biases and omissions that limit its usefulness for a broader audience.