Peer reviewed

<div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>The Future AI Act and Facial Recognition Technologies in Public Spaces: Nice to Have or Strictly Necessary?<em> European Data Protection Law Review, 2023,</em> vol. 9, issue 4, pp. 430-443 -DATAFACE</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Réutilisation des données personnelles par les autorités de police: articulation entre le règlement européen de la protection des données (RGPD) et la directive 2016/680<em> Revue du droit des technologies de l'information, 2020,</em> no. 3, pp. 43-60</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">A. Nautsch, C. Jasserand, E. Kindt, et al. </p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Preserving Privacy in Speaker and Speech Characterisation<em> , Computer Speech and Language, 2019,</em> Vol. 58, pp. 441-480. </p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Law Enforcement Access to Personal Data Originally Collected by Private Parties: Missing Data Subjects’ Safeguards in Directive 2016/680?<em> , Computer Law and Security Review, 2018,</em> Vol. 34, issue 1, pp. 154-165 </p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Subsequent Use of GDPR Data for a Law Enforcement Purpose: The Forgotten Principle of Purpose Limitation<em> , European Data Protection Law Review, 2018,</em> Vol. 4, issue 2, pp. 152-167 </p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Legal Nature of Biometric Data: From ‘Generic’ Personal Data to Sensitive Data<em> European Data Protection Law Review, 2016,</em> vol.2, issue 3, pp. 297-311</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Avoiding Terminological Confusion between the Notions of ‘Biometrics’ and ‘Biometric Data’<em> International Data Privacy Law, 2016,</em> vol.6, issue 1, pp. 63-76</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Critical Views on the French Approach to ‘Net Neutrality’<em> Journal of Internet Law, 2013,</em> vol.16, issue 9</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Hosting Providers’ Liability: Cour de Cassation Puts an End to the Notice and Stay Down Rule<em> , Journal of Intellectual Property Law and Practice, 2013,</em> issue 3, pp. 192-193</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div><div class="rushmore-content-area section-journal-papers"><div class="journal-papers-mound-wrap tab-content"> <div class="journal-papers-list"> <div class="journal-papers"> <div class="row"> <div class="col-sm-3"> <p class="jp-name">C. Jasserand</p> </div> <div class="col-sm-6"> <div class="journal-papers-meta"> <p>Régime français de la responsabilité des intermédiaires techniques<em> Cahiers de Propriété Intellectuelle, 2013,</em> vol. 25, issue 3, pp. 1135-1147</p> </div> </div></div> </div><!-- /.journal-papers --> </div></div></div>