<?xml version="1.0" encoding="UTF-8"?>
<marc21:record xmlns:marc21="http://www.loc.gov/MARC21/slim">
  <marc21:leader>nam  22     uu 4500</marc21:leader>
  <marc21:controlfield tag="001">10.17176/20220421-182404-0</marc21:controlfield>
  <marc21:controlfield tag="003">DE-Verfassungsblog</marc21:controlfield>
  <marc21:controlfield tag="007">cr|||||</marc21:controlfield>
  <marc21:controlfield tag="008">220421s2022||||xx#|||||o|||| ||| 0|eng||</marc21:controlfield>
  <marc21:datafield tag="024" ind1="7" ind2=" ">
    <marc21:subfield code="a">10.17176/20220421-182404-0</marc21:subfield>
    <marc21:subfield code="2">doi</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="041" ind1=" " ind2=" ">
    <marc21:subfield code="a">eng</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="082" ind1="0" ind2="4">
    <marc21:subfield code="a">342</marc21:subfield>
    <marc21:subfield code="2">23</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="100" ind1="1" ind2=" ">
    <marc21:subfield code="a">Watt, Eliza</marc21:subfield>
    <marc21:subfield code="e">Author</marc21:subfield>
    <marc21:subfield code="4">aut</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="245" ind1="1" ind2="0">
    <marc21:subfield code="a">The legacy of the privacy versus security narrative in the ECtHR’s jurisprudence</marc21:subfield>
    <marc21:subfield code="c">Watt, Eliza</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="264" ind1=" " ind2="1">
    <marc21:subfield code="b">Verfassungsblog</marc21:subfield>
    <marc21:subfield code="c">2022-04-21</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="336" ind1=" " ind2=" ">
    <marc21:subfield code="a">Text</marc21:subfield>
    <marc21:subfield code="b">txt</marc21:subfield>
    <marc21:subfield code="2">rdacontent</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="337" ind1=" " ind2=" ">
    <marc21:subfield code="a">Computermedien</marc21:subfield>
    <marc21:subfield code="b">c</marc21:subfield>
    <marc21:subfield code="2">rdamedia</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="338" ind1=" " ind2=" ">
    <marc21:subfield code="a">Online-Ressource</marc21:subfield>
    <marc21:subfield code="b">cr</marc21:subfield>
    <marc21:subfield code="2">rdacarrier</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="520" ind1=" " ind2=" ">
    <marc21:subfield code="a">The past two decades of counterterrorism strategy attest to the fact that the security/privacy trade-off approach is not only outdated, but that it also amounts to a gross oversimplification of the complexities involved in the modern culture of surveillance. Nevertheless, the ECtHR's acceptance of bulk interception regimes as measures that in principle fall within states’ discretion seems to be predicated on this outdated trade-off.</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="540" ind1=" " ind2=" ">
    <marc21:subfield code="a">CC BY-SA 4.0</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="650" ind1="1" ind2="4">
    <marc21:subfield code="a">Right to Privacy</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="650" ind1="1" ind2="4">
    <marc21:subfield code="a">Securitization</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="650" ind1="1" ind2="4">
    <marc21:subfield code="a">surveillance</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="773" ind1="0" ind2=" ">
    <marc21:subfield code="a">Max Steinbeis Verfassungsblog gGmbH</marc21:subfield>
    <marc21:subfield code="t">Verfassungsblog</marc21:subfield>
    <marc21:subfield code="x">2366-7044</marc21:subfield>
  </marc21:datafield>
  <marc21:datafield tag="856" ind1="4" ind2="0">
    <marc21:subfield code="u">https://verfassungsblog.de/os6-privacy-vs-security/</marc21:subfield>
    <marc21:subfield code="y">raw object</marc21:subfield>
  </marc21:datafield>
</marc21:record>
