Compliance, Ethics & Sustainability An international journal with a European focus 2025 nr. 3

Privacy vs. Whistleblowing: Can Data Breaches Be Justified During Public Disclosure?

Anastasia Avramenko1

Artikel kopen € 79,00 excl. BTW

In plaats van abonneren kunt u dit artikel ook afzonderlijk kopen.

Whistleblowing has recently been at the forefront of the public consciousness increasingly often. Wikileaks, Theranos, and Cambridge Analytics have become household names due to the efforts of internal whistleblowers. However, the history of whistleblowing stretches thousands of years into the past. Its first recorded instances occurred in Ancient Greece, where it was referred to as parrhesia, meaning "speak freely". Although it was not formally codified, parrhesia was extremely valued and considered a cornerstone of democratic society.2 Today, the role of whistleblowing is not less significant. Within the European Union, there has been an increased focus on protecting those who blow the whistle, which resulted in the introduction of the Directive (EU) 2019/1937, commonly known as the Whistleblowing Directive3 . While its main purpose is to "enhance the enforcement of Union law and policies in specific areas"4 , it also seeks to establish common sta...

U heeft op dit moment geen toegang tot de volledige inhoud van dit product. U kunt alleen de inleiding en hoofdstukindeling lezen.

Wanneer u volledige toegang wenst tot alle informatie kunt u zich abonneren of inloggen als abonnee.


Verder in dit artikel:

1. EU Legal Framework: Walking the Tightrope Between Disclosure and Data Privacy

1.1. The Whistleblowing Directive

1.2. The General Data Protection Regulation

2. Public Disclosure and Data Breaches: Assessing Justification

2.1. Conditions for Public Disclosure under the Whistleblowing Directive

2.2. Liability Exemption for Whistleblowers

2.3. The Public Interest vs. Harm from Data Breaches

3. The European Court of Human Rights: Balancing Fundamental Rights

4. Insights for Organisations and Potential Whistleblowers

5. Conclusion

Deel deze pagina:

Nog niet beoordeeld

Bijlage(n)

  • Bijlagen zijn alleen beschikbaar voor abonnees.

Artikel informatie

Type
Artikel
Auteurs
Anastasia Avramenko1
Auteursvermelding
Ik ben auteur van dit artikel
Datum artikel
Uniek Den Hollander publicatienummer
UDH:TvCo/18706

Verder in 2025 nr.3

 Public Data, Private Risks

How LLMs Might Reshape Compliance Investigations Since the explosion in use of generative AI tools in 2023, and more specifically, in the use of chatbots powered by Large Language Models ("LLMs"), ...

 Privacy vs. Whistleblowing: Can Data Breaches Be Justified During Public Disclosure?

Whistleblowing has recently been at the forefront of the public consciousness increasingly often. Wikileaks, Theranos, and Cambridge Analytics have become household names due to the efforts of inte...

 Europe’s Health Data Shift: Regulation, Anonymisation, and Security

The 2021 ransomware attack on Ireland's Health Service Executive[2], where attackers threatened to publish patient data, presaged a new era of healthcare vulnerability. As Europe implements ambitio...

 Uit de boekenkast van de bedrijfsethiek (94)

In de bedrijfsethiek is een groot aantal boeken en artikelen verschenen waarin op praktische wijze prangende vraagstukken worden behandeld en concrete aanbevelingen worden gedaan voor het bevordere...

 Editorial

Privacy, Data Protection and Cyber security will most likely be points, high on the agenda for most Risk Committee meetings. These are the themes for this, the third edition of the Compliance, Ethi...

 Apple Inc v Secretary of State for the Home Department: the latest iteration of the never-ending security versus privacy debate

The precise subject matter of the legal stand-off between international tech giant Apple and the UK Home Secretary, currently before the Investigatory Powers Tribunal (``IPT") in London, is unknown...

 Navigating a new era of reporting cyber incidents in the UK and EU

Cyber security continues to be an issue that gathers mainstream attention, and for good reason. Both the costs of, and length of time to recover from, a cyber incident are increasing. According to ...