<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2594-0082</journal-id>
<journal-title><![CDATA[Estudios en derecho a la información]]></journal-title>
<abbrev-journal-title><![CDATA[Estud. derecho inf.]]></abbrev-journal-title>
<issn>2594-0082</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Investigaciones Jurídicas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2594-00822020000200003</article-id>
<article-id pub-id-type="doi">10.22201/iij.25940082e.2020.10.14658</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[&#8220;Naturaleza intrínseca&#8221;, &#8220;contexto&#8221; o &#8220;finalidad&#8221; en la determinación del carácter sensible de los datos personales]]></article-title>
<article-title xml:lang="en"><![CDATA[&#8220;Intrinsic nature&#8221;, &#8220;context&#8221; or &#8220;purpose&#8221; in the determination of the sensitive character of personal data]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Huerta Anguiano]]></surname>
<given-names><![CDATA[Julio A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Autónoma de México Facultad de Derecho ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<numero>10</numero>
<fpage>3</fpage>
<lpage>31</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2594-00822020000200003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2594-00822020000200003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2594-00822020000200003&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El presente artículo expone tres posibles respuestas a la pregunta de investigación siguiente: ¿qué hace que los datos personales sean considerados datos personales sensibles? Esta aportación tiene como objetivo contribuir a la revisión crítica del concepto de &#8220;datos personales sensibles&#8221; o &#8220;categorías especiales de datos&#8221;, destacando algunos de los problemas implícitos en la construcción e interpretación de su definición jurídica, teniendo como marco de referencia diversos ordenamientos internacionales de protección de datos personales. En particular, el texto analiza los enfoques siguientes: 1) la concepción de la naturaleza intrínsecamente sensible de los datos personales; 2) la aproximación del carácter sensible en función del contexto de su procesamiento, y 3) la propuesta que considera la finalidad del tratamiento de los datos personales.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This article explains three possible answers to the following research question: why is some personal information considered as sensitive personal data? This paper aims to contribute to the critical review of the concept of &#8220;sensitive personal data&#8221; or &#8220;special data categories&#8221;. It highlights some of the problems implied in the construction and interpretation of its legal definition, considering various international data protection laws. In particular, this text analyzes the following three approaches: 1) the conception of the intrinsically sensitive nature of personal data; 2) the approach of the sensitive character according to its context of processing; and 3) the thesis that considers the purpose of data processing.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Datos personales]]></kwd>
<kwd lng="es"><![CDATA[datos sensibles]]></kwd>
<kwd lng="es"><![CDATA[categorías especiales de datos]]></kwd>
<kwd lng="es"><![CDATA[privacidad]]></kwd>
<kwd lng="es"><![CDATA[autodeterminación informativa]]></kwd>
<kwd lng="en"><![CDATA[Personal data]]></kwd>
<kwd lng="en"><![CDATA[sensitive data]]></kwd>
<kwd lng="en"><![CDATA[special categories of data]]></kwd>
<kwd lng="en"><![CDATA[privacy]]></kwd>
<kwd lng="en"><![CDATA[informational self-determination]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Fedaghi]]></surname>
<given-names><![CDATA[Sabah]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How sensitive is your personal information?]]></article-title>
<source><![CDATA[Proceedings of the 2007 ACM Symposium on Applied Computing]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Nueva York, NY ]]></publisher-loc>
<publisher-name><![CDATA[Association for Computing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bobbio]]></surname>
<given-names><![CDATA[Norberto]]></given-names>
</name>
</person-group>
<source><![CDATA[Teoría general del derecho]]></source>
<year>2007</year>
<edition>3a. ed.</edition>
<publisher-loc><![CDATA[Colombia ]]></publisher-loc>
<publisher-name><![CDATA[Temis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carozza]]></surname>
<given-names><![CDATA[Paolo G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human Dignity and Judicial Interpretation of Human Rights: A Reply]]></article-title>
<source><![CDATA[The European Journal of International Law]]></source>
<year>2008</year>
<volume>19</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Etzioni]]></surname>
<given-names><![CDATA[Amitai]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A cyber age privacy doctrine: More coherent, less subjective, and operational]]></article-title>
<source><![CDATA[Brooklyn Law Review]]></source>
<year>2015</year>
<volume>80</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gavison]]></surname>
<given-names><![CDATA[Ruth]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy and the Limits of Law]]></article-title>
<source><![CDATA[Yale Law Journal]]></source>
<year>1980</year>
<volume>89</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gellert]]></surname>
<given-names><![CDATA[Raphaël]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the notion of risk in the General Data Protection Regulation]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2018</year>
<volume>34</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[King]]></surname>
<given-names><![CDATA[Nancy J.]]></given-names>
</name>
<name>
<surname><![CDATA[Raja]]></surname>
<given-names><![CDATA[V. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Protecting the privacy and security of sensitive customer data in the cloud]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2012</year>
<volume>28</volume>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuner]]></surname>
<given-names><![CDATA[Christopher]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk management in data protection]]></article-title>
<source><![CDATA[International Data Privacy Law]]></source>
<year>2015</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mccullagh]]></surname>
<given-names><![CDATA[Karen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data sensitivity: proposals for resolving the conundrum]]></article-title>
<source><![CDATA[International Commercial Law and Technology]]></source>
<year>2007</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neal]]></surname>
<given-names><![CDATA[Mary]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Respect for human dignity as «substantive basic norm»]]></article-title>
<source><![CDATA[International Journal of Law in Context]]></source>
<year>2014</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nissenbaum]]></surname>
<given-names><![CDATA[Helen]]></given-names>
</name>
</person-group>
<source><![CDATA[Privacy in Context: Technology, Policy, and the Integrity of Social Life]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Stanford California ]]></publisher-loc>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parent]]></surname>
<given-names><![CDATA[William A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy, morality, and the law]]></article-title>
<source><![CDATA[Philosophy and Public Affairs]]></source>
<year>1983</year>
<volume>12</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simitis]]></surname>
<given-names><![CDATA[Spiros]]></given-names>
</name>
</person-group>
<source><![CDATA[Revisiting Sensitive Data]]></source>
<year>1999</year>
<publisher-name><![CDATA[Consejo de Europa]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Von Grafenstein]]></surname>
<given-names><![CDATA[Maximilian]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Principle of Purpose Limitation in Data Protection Laws: The Risk-based Approach, Principles, and Private Standards as Elements for Regulating Innovation]]></article-title>
<source><![CDATA[]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Baden-Baden, Alemania ]]></publisher-loc>
<publisher-name><![CDATA[Nomos Verlagsgesellschaft mb]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Min]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[Zuosu]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Defining Approaches and Practical Paradox of Sensitive Data: An Investigation of Data Protection Laws in 92 Countries and Regions and 200 Data Breaches in the World]]></article-title>
<source><![CDATA[International Journal of Communication]]></source>
<year>2017</year>
<volume>11</volume>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[Rebecca]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Alternative Approaches to Sensitive Data?]]></article-title>
<source><![CDATA[Journal of International Commercial Law and Technology]]></source>
<year>2007</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[&#381;liobaite]]></surname>
<given-names><![CDATA[Indre]]></given-names>
</name>
<name>
<surname><![CDATA[Custers]]></surname>
<given-names><![CDATA[Bart]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using sensitive personal data may be necessary for avoiding discrimination in data-driven decision models]]></article-title>
<source><![CDATA[Artificial Intelligence and Law]]></source>
<year>2016</year>
<volume>24</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>Agencia Española de Protección de Datos</collab>
<article-title xml:lang=""><![CDATA[Datos de salud de personas fallecidas]]></article-title>
<source><![CDATA[]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>Agencia Española de Protección de Datos</collab>
<article-title xml:lang=""><![CDATA[Naturaleza del dato de fumador como dato de salud]]></article-title>
<source><![CDATA[]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Agencia Española de Protección de Datos</collab>
<article-title xml:lang=""><![CDATA[Carácter del dato de profesión de sacerdote]]></article-title>
<source><![CDATA[]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>Agencia Española de Protección de Datos</collab>
<article-title xml:lang=""><![CDATA[Tratamiento conforme a la legislación de prevención de riesgos laborales]]></article-title>
<source><![CDATA[]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>Agencia Española de Protección de Datos</collab>
<article-title xml:lang=""><![CDATA[Naturaleza de los datos psicológicos a efectos de su tratamiento]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Article 29 Working Party]]></article-title>
<source><![CDATA[Guidelines on Data Protection Impact Assessment [DPIA] and determining whether processing is &#8220;likely to result in a high risk&#8221; for the purposes of Regulation 2016/679]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Article 29 Working Party]]></article-title>
<source><![CDATA[[Carta para Madame le Bail], 20 de abril]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Article 29 Working Party]]></article-title>
<source><![CDATA[Advice paper on special categories of data (&#8220;sensitive data&#8221;)]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>Comité Europeo de Protección de Datos</collab>
<article-title xml:lang=""><![CDATA[Opinion 23/2018 on Commission proposals on European Production and Preservation Orders for electronic evidence in criminal matters (Art. 70.1.b)]]></article-title>
<source><![CDATA[]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>Conferencia Internacional de Comisionados de Protección de Datos y Privacidad</collab>
<article-title xml:lang=""><![CDATA[Declaration on ethics and data protection in Artificial Intelligence]]></article-title>
<source><![CDATA[]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Brussels ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<source><![CDATA[C-101/01 (Caso Bodil Lindqvist)]]></source>
<year>2003</year>
<publisher-name><![CDATA[Tribunal de Justicia de la Unión Europea]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<collab>Federal Communications Commission</collab>
<source><![CDATA[]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>Information Commissionaire&#8217;s Office</collab>
<article-title xml:lang=""><![CDATA[Proposed new EU General Data Protection Regulation Article-by-article analysis paper]]></article-title>
<source><![CDATA[]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<collab>Information Commissionaire&#8217;s Office</collab>
<article-title xml:lang=""><![CDATA[The Information Commissioner&#8217;s (United Kingdom) response to a comprehensive approach on personal data protection in the European Union. A Communication from the European Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions on 4 November 2010]]></article-title>
<source><![CDATA[]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>Supreme Court of the United States of America</collab>
<source><![CDATA[United States v. Jones]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<collab>Autoridades de Protección de Datos y Privacidad</collab>
<article-title xml:lang=""><![CDATA[Estándares Internacionales sobre Protección de Datos Personales y Privacidad]]></article-title>
<source><![CDATA[]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>Congreso Nacional de Chile</collab>
<article-title xml:lang=""><![CDATA[Ley 19628 sobre Protección de la Vida Privada]]></article-title>
<source><![CDATA[]]></source>
<year>1999</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="">
<collab>Congreso de la República de Colombia</collab>
<article-title xml:lang=""><![CDATA[Ley Estatutaria 1581, por la cual se dictan disposiciones generales para la protección de datos personales]]></article-title>
<source><![CDATA[]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="">
<collab>Council of Europe</collab>
<article-title xml:lang=""><![CDATA[Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data]]></article-title>
<source><![CDATA[]]></source>
<year>1981</year>
<numero>108</numero>
<issue>108</issue>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<collab>Council of Europe</collab>
<article-title xml:lang=""><![CDATA[Explanatory Report to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data]]></article-title>
<source><![CDATA[]]></source>
<year>1981</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="">
<collab>Organización para la Cooperación y el Desarrollo Económicos</collab>
<article-title xml:lang=""><![CDATA[Guidelines on the Protection of Privacy and Transborder Flows of Personal Data]]></article-title>
<source><![CDATA[]]></source>
<year>1980</year>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<collab>Organización de las Naciones Unidas</collab>
<article-title xml:lang=""><![CDATA[Resolución 45/95, 14 de diciembre]]></article-title>
<source><![CDATA[Principios rectores para la reglamentación de los ficheros computarizados de datos personales]]></source>
<year>1990</year>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="">
<source><![CDATA[Reglamento General de Protección de Datos]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="">
<source><![CDATA[Reglamento General de Protección de Datos]]></source>
<year>1995</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
