<div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>The Future AI Act and Facial Recognition Technologies in Public Spaces: Nice to Have or Strictly Necessary?<em> European Data Protection Law Review, 2023,</em> vol. 9, issue 4, pp. 430-443 -DATAFACE</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Réutilisation des données personnelles par les autorités de police: articulation entre le règlement européen de la protection des données (RGPD) et la directive 2016/680<em> Revue du droit des technologies de l'information, 2020,</em> no. 3, pp. 43-60</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">A. Nautsch, C. Jasserand, E. Kindt, et al. </p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Preserving Privacy in Speaker and Speech Characterisation<em> , Computer Speech and Language, 2019,</em> Vol. 58, pp. 441-480. </p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Law Enforcement Access to Personal Data Originally Collected by Private Parties: Missing Data Subjects’ Safeguards in Directive 2016/680?<em> , Computer Law and Security Review, 2018,</em> Vol. 34, issue 1, pp. 154-165 </p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Subsequent Use of GDPR Data for a Law Enforcement Purpose: The Forgotten Principle of Purpose Limitation<em> , European Data Protection Law Review, 2018,</em> Vol. 4, issue 2, pp. 152-167 </p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Legal Nature of Biometric Data: From ‘Generic’ Personal Data to Sensitive Data<em> European Data Protection Law Review, 2016,</em> vol.2, issue 3, pp. 297-311</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Avoiding Terminological Confusion between the Notions of ‘Biometrics’ and ‘Biometric Data’<em> International Data Privacy Law, 2016,</em> vol.6, issue 1, pp. 63-76</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Critical Views on the French Approach to ‘Net Neutrality’<em> Journal of Internet Law, 2013,</em> vol.16, issue 9</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Hosting Providers’ Liability: Cour de Cassation Puts an End to the Notice and Stay Down Rule<em> , Journal of Intellectual Property Law and Practice, 2013,</em> issue 3, pp. 192-193</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content">
<div class="journal-papers-list">
<div class="journal-papers">
<div class="row">
<div class="col-sm-3">
<p class="jp-name">C. Jasserand</p>
</div>
<div class="col-sm-6">
<div class="journal-papers-meta">
<p>Régime français de la responsabilité des intermédiaires techniques<em> Cahiers de Propriété Intellectuelle, 2013,</em> vol. 25, issue 3, pp. 1135-1147</p>
</div>
</div></div>
</div><!-- /.journal-papers -->
</div></div></div>