SlideShare a Scribd company logo
1 of 18
Privacy in a Human Rights and
    Social Justice Context
  Privacy, Security and Forensics in the Digital Age
  NLW/AU event
  6th September 2012
Digital Ecology
What is meant by Privacy?
The right to be let alone. (Brandeis, 1890)
Privacy is an interest of the human personality. It protects the
inviolate personality, the individual's independence, dignity and
integrity. (Bloustein 1964)
The desire of people to choose freely under what circumstances and
to what extent they will expose themselves, their attitudes and their
behaviour to others. (Westin, 1968)
The state of desired inaccess or freedom from unwanted access, with
access meaning perceiving a person with one’s senses (ie seeing,
hearing or touching him or her), obtaining physical proximity to him or
her and/or obtaining information about him or her. (Gavison 1980,
Moreham, 2005)
Types of Privacy
 Information privacy
 Bodily privacy
 Privacy of communication
 Territorial privacy
Why is privacy important?
   Privacy as the right to be let alone – “a man’s
    home is his castle”
   Privacy as an aspect of personhood
   Privacy as control over information
   Privacy as limited access to the self
   Privacy as secrecy
   Privacy as a social and political value
Privacy & Data Protection – Twins
                   but not identical
   Privacy covers issues relating to the protection of an
    individual’s personal space – covering issues such as
    private communication, unwarranted investigation,
    physical integrity, protection of family life etc.
   Data protection– To organise and control the way
    personal data are processed. Focuses on the
    informational rather than spatial or physical
    dimensions of privacy. Right of information self-
    determination – the right to have a say in how data
    relating to oneself are processed by others.
Relevant Legislation: International
Customary International Law
     Universal Declaration of Human Rights – Article 12
     No one shall be subjected to arbitrary interference with his privacy, family, home
     or correspondence, nor to attacks upon his honour or reputation. Everyone has the
     right to the protection of the law against such interference or attacks for the
     protection of the rights and freedoms of others.

Treaties and Covenants
     International Covenant on Civil and Political Rights 1966 - Article 17
   1. No one shall be subjected to arbitrary or unlawful interference with his privacy,
   family, home or correspondence, nor to unlawful attacks on his honour and
   reputation.
   2. Everyone has the right to the protection of the law against such interference or
   attacks.
Relevant Legislation: Regional
    American Convention on Human Rights
    Article 11. Right to Privacy
   1. Everyone has the right to have his honor respected and his dignity recognized.

   2. No one may be the object of arbitrary or abusive interference with his private life, his family,
    his home, or his correspondence, or of unlawful attacks on his honor or reputation.
    3. Everyone has the right to the protection of the law against such interference or attacks.



   European Convention of Human Rights – Article 8 Right to respect for private and family life
    1. Everyone has the right to respect for his private and family life, his home and his
    correspondence.
   2. There shall be no interference by a public authority with the exercise of this right except such
    as is in accordance with the law and is necessary in a democratic society in the interests of
    national security, public safety or the economic well-being of the country, for the prevention of
    disorder or crime, for the protection of health or morals, or for the protection of the rights and
    freedoms of others.
Relevant Legislation – Data Protection
    Data Protection Directive 95/46 EC - was
     adopted in 1995 with two objectives in mind:
        to protect the fundamental right to data
         protection and
         to guarantee the free flow of personal data
         between Member States.
    New draft European Data Protection
     regulation released 25 Jan 2012 –
     harmonisation of laws on data protection.
     One single European Law
State/Government threats to Privacy
   Expansion of government online surveillance powers - threat to the
    individual’s right to privacy?

   USA- Stop Online Privacy Act, Protect IP Act, Trans Pacific Partnership
    Agreement IP Charter




   EU – Anti Counterfeiting Trade Agreement, Council of Europe’s
    Convention on Cyber crime
   Australia – Cybercrime Legislation Amendment Bill 2011
   Egypt/Syria – Arab Spring

   Access to Internet as basic human right – Frank La Rue UN Report
Business Threats to Privacy
Informational Privacy

Information Management/
                            Passive
Governance Sense Making
                            Digital Footprints
                            Digital Exhaust

                            Active
                            Data Mining
                            Data Analytics
                            Computer Assisted Review
GNI: leading
information and
communication
companies,
major HR
organisations,
academics,
investors and
technology
leaders
#11 DP
Protection of Personal
data
Obligations of data
collectors
Minimum Standards on
Use of Personal Data
Monitoring by
Independent Data
Protection Authorities
STAKEHOLDERS


   Pluricentric (not unicentric)
   networks (inter- or intraorganisational
   the processes of governing or functions
   specific risks and uncertainties
   normative

    Van Kersbergen and Van Waarden 2004,
Spectrum not Dichotomy
   Individual autonomy      Law enforcement
   Empowering               Cybercrime;
                              network security;
                              child crime, ID
                              theft; access
                              classified
                              information; hate
                              speech
   Non-disclosure           Sharing
Spectrum not Dichotomy
   Open government         Closed government
   FoI                     DP
   Rights of the           Profit-driven data
    Individual               demands
   Private sector-led      Government
    self regulation          regulation
   Soft law                Hard law
   Global                  Regional
   Minimum standard        Beyond national
                             standards
   Rights , duties         Responsibilities
Contact details
   Kirsten Ferguson-Boucher
    Department of Information Studies,
    knb@aber.ac.uk


   Sofia Cavandoli
    Department of Law and Criminology
    sfc@aber.ac.uk

More Related Content

What's hot

Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute Aishwary Gawate
 
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideAmber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideThe Centre for Internet and Society
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewjoydev majumdar
 
Reporting and related issues
Reporting and related issuesReporting and related issues
Reporting and related issuesucdcompsci
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issuesGeritt Contillo
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Right to Information Act
Right to Information ActRight to Information Act
Right to Information ActMuktha Samrat
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...Duc Lai Trung Minh
 

What's hot (20)

Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideAmber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeview
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Reporting and related issues
Reporting and related issuesReporting and related issues
Reporting and related issues
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Right to Information Act
Right to Information ActRight to Information Act
Right to Information Act
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
 

Viewers also liked

How to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the PoliceHow to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the PoliceOludotun Babayemi
 
Human Rights Violations at Home
Human Rights Violations at HomeHuman Rights Violations at Home
Human Rights Violations at HomeAllison Reilly
 
Online Privacy - Survey Report
Online Privacy - Survey ReportOnline Privacy - Survey Report
Online Privacy - Survey ReportJAKPATAPP
 
Concept of CSR in islam
Concept of CSR in islamConcept of CSR in islam
Concept of CSR in islamFarhan Ahmad
 
stuys human rights powerpoint
stuys human rights powerpointstuys human rights powerpoint
stuys human rights powerpointstuyman
 
The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30David Morris
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social ResponsibilityAditi Upadhyay
 
The Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by ElyxThe Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by ElyxUnited Nations
 
intro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rightsintro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rightsverapax
 
Human rights and fundamental rights
Human rights and fundamental rightsHuman rights and fundamental rights
Human rights and fundamental rightsvishnugud
 
corporate social responsibility
corporate social responsibility corporate social responsibility
corporate social responsibility nehamodi274
 
Fundamental rights of indian constitution
Fundamental rights of indian constitutionFundamental rights of indian constitution
Fundamental rights of indian constitutionAryan Singh
 
The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009Naim Ahmed
 
Concept and theory of human right group 12
Concept and theory of human right group 12Concept and theory of human right group 12
Concept and theory of human right group 12Subaidah Abdullah
 
Article XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human RightsArticle XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human RightsRoxanne Jane Balladares
 
Introduction to csr
Introduction to csrIntroduction to csr
Introduction to csrViren Patel
 

Viewers also liked (20)

Human Rights
Human RightsHuman Rights
Human Rights
 
How to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the PoliceHow to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the Police
 
Human Rights Violations at Home
Human Rights Violations at HomeHuman Rights Violations at Home
Human Rights Violations at Home
 
Online Privacy - Survey Report
Online Privacy - Survey ReportOnline Privacy - Survey Report
Online Privacy - Survey Report
 
Mapping Opportunity for Advocacy and Social Justice
Mapping Opportunity for Advocacy and Social JusticeMapping Opportunity for Advocacy and Social Justice
Mapping Opportunity for Advocacy and Social Justice
 
Concept of CSR in islam
Concept of CSR in islamConcept of CSR in islam
Concept of CSR in islam
 
stuys human rights powerpoint
stuys human rights powerpointstuys human rights powerpoint
stuys human rights powerpoint
 
The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social Responsibility
 
The Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by ElyxThe Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by Elyx
 
intro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rightsintro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rights
 
Human rights and fundamental rights
Human rights and fundamental rightsHuman rights and fundamental rights
Human rights and fundamental rights
 
corporate social responsibility
corporate social responsibility corporate social responsibility
corporate social responsibility
 
Fundamental rights of indian constitution
Fundamental rights of indian constitutionFundamental rights of indian constitution
Fundamental rights of indian constitution
 
The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
 
Concept and theory of human right group 12
Concept and theory of human right group 12Concept and theory of human right group 12
Concept and theory of human right group 12
 
Article XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human RightsArticle XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human Rights
 
Introduction to csr
Introduction to csrIntroduction to csr
Introduction to csr
 
CSR Branding Survey 2010
CSR Branding Survey 2010 CSR Branding Survey 2010
CSR Branding Survey 2010
 

Similar to Privacy in Digital Age

Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...i_scienceEU
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor societyConsiderati
 
Privacy in the Virtually Legal Context
Privacy in the Virtually Legal ContextPrivacy in the Virtually Legal Context
Privacy in the Virtually Legal ContextBorislav Kiprin
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Human Rights And Internet Regulation
Human Rights And Internet RegulationHuman Rights And Internet Regulation
Human Rights And Internet Regulationblogzilla
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 

Similar to Privacy in Digital Age (20)

Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Vonnegut's Narrator
Vonnegut's NarratorVonnegut's Narrator
Vonnegut's Narrator
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
 
Privacy in the Virtually Legal Context
Privacy in the Virtually Legal ContextPrivacy in the Virtually Legal Context
Privacy in the Virtually Legal Context
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Human Rights And Internet Regulation
Human Rights And Internet RegulationHuman Rights And Internet Regulation
Human Rights And Internet Regulation
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Privacy in Digital Age

  • 1. Privacy in a Human Rights and Social Justice Context Privacy, Security and Forensics in the Digital Age NLW/AU event 6th September 2012
  • 3. What is meant by Privacy? The right to be let alone. (Brandeis, 1890) Privacy is an interest of the human personality. It protects the inviolate personality, the individual's independence, dignity and integrity. (Bloustein 1964) The desire of people to choose freely under what circumstances and to what extent they will expose themselves, their attitudes and their behaviour to others. (Westin, 1968) The state of desired inaccess or freedom from unwanted access, with access meaning perceiving a person with one’s senses (ie seeing, hearing or touching him or her), obtaining physical proximity to him or her and/or obtaining information about him or her. (Gavison 1980, Moreham, 2005)
  • 4. Types of Privacy  Information privacy  Bodily privacy  Privacy of communication  Territorial privacy
  • 5. Why is privacy important?  Privacy as the right to be let alone – “a man’s home is his castle”  Privacy as an aspect of personhood  Privacy as control over information  Privacy as limited access to the self  Privacy as secrecy  Privacy as a social and political value
  • 6. Privacy & Data Protection – Twins but not identical  Privacy covers issues relating to the protection of an individual’s personal space – covering issues such as private communication, unwarranted investigation, physical integrity, protection of family life etc.  Data protection– To organise and control the way personal data are processed. Focuses on the informational rather than spatial or physical dimensions of privacy. Right of information self- determination – the right to have a say in how data relating to oneself are processed by others.
  • 7. Relevant Legislation: International Customary International Law Universal Declaration of Human Rights – Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour or reputation. Everyone has the right to the protection of the law against such interference or attacks for the protection of the rights and freedoms of others. Treaties and Covenants International Covenant on Civil and Political Rights 1966 - Article 17 1. No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. 2. Everyone has the right to the protection of the law against such interference or attacks.
  • 8. Relevant Legislation: Regional American Convention on Human Rights Article 11. Right to Privacy  1. Everyone has the right to have his honor respected and his dignity recognized.  2. No one may be the object of arbitrary or abusive interference with his private life, his family, his home, or his correspondence, or of unlawful attacks on his honor or reputation. 3. Everyone has the right to the protection of the law against such interference or attacks.  European Convention of Human Rights – Article 8 Right to respect for private and family life 1. Everyone has the right to respect for his private and family life, his home and his correspondence.  2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.
  • 9. Relevant Legislation – Data Protection  Data Protection Directive 95/46 EC - was adopted in 1995 with two objectives in mind:  to protect the fundamental right to data protection and  to guarantee the free flow of personal data between Member States.  New draft European Data Protection regulation released 25 Jan 2012 – harmonisation of laws on data protection. One single European Law
  • 10. State/Government threats to Privacy  Expansion of government online surveillance powers - threat to the individual’s right to privacy?  USA- Stop Online Privacy Act, Protect IP Act, Trans Pacific Partnership Agreement IP Charter  EU – Anti Counterfeiting Trade Agreement, Council of Europe’s Convention on Cyber crime  Australia – Cybercrime Legislation Amendment Bill 2011  Egypt/Syria – Arab Spring  Access to Internet as basic human right – Frank La Rue UN Report
  • 11. Business Threats to Privacy Informational Privacy Information Management/ Passive Governance Sense Making Digital Footprints Digital Exhaust Active Data Mining Data Analytics Computer Assisted Review
  • 12. GNI: leading information and communication companies, major HR organisations, academics, investors and technology leaders
  • 13. #11 DP Protection of Personal data Obligations of data collectors Minimum Standards on Use of Personal Data Monitoring by Independent Data Protection Authorities
  • 14.
  • 15. STAKEHOLDERS  Pluricentric (not unicentric)  networks (inter- or intraorganisational  the processes of governing or functions  specific risks and uncertainties  normative  Van Kersbergen and Van Waarden 2004,
  • 16. Spectrum not Dichotomy  Individual autonomy  Law enforcement  Empowering  Cybercrime; network security; child crime, ID theft; access classified information; hate speech  Non-disclosure  Sharing
  • 17. Spectrum not Dichotomy  Open government  Closed government  FoI  DP  Rights of the  Profit-driven data Individual demands  Private sector-led  Government self regulation regulation  Soft law  Hard law  Global  Regional  Minimum standard  Beyond national standards  Rights , duties  Responsibilities
  • 18. Contact details  Kirsten Ferguson-Boucher Department of Information Studies, knb@aber.ac.uk  Sofia Cavandoli Department of Law and Criminology sfc@aber.ac.uk

Editor's Notes

  1. Information privacy