Online Privacy Protection in China: Present and Future Yun ZHAO The University of Hong Kong.

Slides:



Advertisements
Similar presentations
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Advertisements

Data privacy law in Asia-pacific -introduction to the privacy law in China (mainland China and Hong Kong) Yue Liu
Biomedical Ethics and Legal Principles
HIPAA Privacy Rule Training
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 Introduction  Reasons to study medical law and ethics Function at the highest professional.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
What You’ll Learn How to tell the difference between a crime and a tort (p. 80) How to explain the nature of tort law (p. 80) How various torts can be.
Legal Issues: Legal & Regulatory Environment of Business Class 29 Thursday 12/6/11.
Data Protection and Records Management
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
2/16/2010 The Family Educational Records and Privacy Act.
What if my organization conducts business across borders ? Your footnote Privacy and “Personal Information” have different meanings in different countries;
INTERNET and CODE OF CONDUCT
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Theme: Basics of administrative law.
1 WHY IS WHISTLEBLOWING IMPORTANT AND ON WHAT PRINCIPLES SHOULD PROTECTIVE LEGISLATION BE BASED? David Lewis, Professor of Employment Law, MiddlesexUniversity,
Class 13 Internet Privacy Law European Privacy.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Contract Services to Google/Microsoft James L. Turk CAUT Council November 27, 2011.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Trademark II Infringement. Article 57 Infringement Article 57 Any of the following conduct shall be an infringement upon the right to exclusively use.
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Chinese Tort Law: Theory and Practice Rui Liu associate professor Chinese Academy of Governance , (U.S)
HIPAA PRIVACY AND SECURITY AWARENESS.
Re – use of PSI in Slovenia Kristina Kotnik Šumah Deputy of the Information Commisoner.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
Chinese Foreign Trade Law Jiaxiang Hu Professor of Law, School of Law, SJTU.
Chapter 5 Torts and Civil Law.
Exploring Business © 2009 FlatWorld Knowledge 16-1 The Legal and Regulatory Environment of Business.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Product Recall Laws in China Xiangwen Liu Partner King & Wood PRC Lawyers.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Understanding Business and Personal Law Intentional Torts Section 4.1 The Law of Torts The Difference Between Criminal Law and Tort Law Intentional Torts.
Data protection—training materials [Name and details of speaker]
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
1 The balance between access to public information and personal data protection: The German Experience Sven Hermerschmidt, Office of the Federal Commissioner.
HIPAA Privacy Rule Training
The Data Protection Act 1998
Surveillance around the world
General Data Protection Regulation
The Data Protection Act 1998
Data Protection Legislation
G.D.P.R General Data Protection Regulations
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
The E-Commerce Act and the Right to Privacy
Intentional Torts Chapter 13.
Presentation transcript:

Online Privacy Protection in China: Present and Future Yun ZHAO The University of Hong Kong

Privacy An important right in modern society, but no clear definition for the concept Generally, a type of human right protecting citizens’ private information from unlawful interference, knowledge, use and disclosure Such private information include personal life, personal information, private communication

Challenges from Cyberspace Cyberspace: geographical boundaries not important Internet allowing corporation to collect, store and analyze personal information at a low cost; amount of personal information increased Boom of online sharing culture and citizen participation posed challenge –The contents of online privacy is expanding (not only data in the traditional sense, but also online personal information, such as IP address, user name, , online account) –Privacy right: more active (how to ensure legal and reasonable use of personal information) –Privacy right: both personal and economic terms: valuable as to consumer’s preference

Online privacy In Privacy and Human Rights Report 2006, privacy is divided into (a) information privacy; (b) bodily privacy; (c) privacy of communications (d) territorial privacy Online privacy: information privacy should be the primary concern—the right of an individual to control the collection, use and dissemination of information on the Internet

The Constitution Privacy right partly recognized –Article 38: personal dignity is inviolable (Insult, libel, false charge or frame-up is prohibited) –Article 39: residences not trespassed –Article 40: freedom and privacy of correspondence protected

General Principles of Civil Law Legal basis for civil rights protection, reputation as a general right, but privacy not an independent right –Article 99: right to name where false representation of personal names is prohibited –Article 100: right to portrait so that use of a citizen’s personal portrait for commercial purposes without consent is prohibited –Article 101: right to reputation; the personality protected; prohibition of libel, slander or other means to damage reputation –Article 120: compensation, stop the infringement, rehabilitate the reputation; an apology

General Principles of Civil Law –Judicial Interpretation (1988): privacy right is merged with reputation right (need to show damage to reputation) “any act, written or oral, that exposes another person’s private secrets to the public, that fabricates facts in order to defame publicly a person’s dignity, or that employs insult or defamation which clearly damages another person’s reputation, must be deemed an infringement of a citizen’s right to his reputation. Any act, written or oral, that damages or defames the reputation of a legal person, and that causes loss to the legal person, must be deemed an infringement of the right of a legal person to its reputation.”

General Principles of Civil Law –Judicial interpretation (1993): the right to reputation as the cause of action for an invasion of privacy “anyone who discloses the privacy materials of others without the consent of them, or promotes the privacy of others in writing or orally, which causes damages to the reputation of others, should be punished for infringing the reputation right of others.” Focus on right to reputation

General Principles of Civil Law –Judicial interpretation (2001): the plaintiff is entitled to compensation for distress (emotional damage) caused by the violation of privacy and the harm to reputation. (recognition of privacy as an independent personal right) “the people’s court shall accept according to law cases arising from the violation of societal public interests or societal morality by infringing upon a person’s privacy or other interests of personality, and brought to the court by the victim as a civil tort for claiming emotional damages” Identifying “the unlawful disclosure or use of a deceased’s privacy, or the infringement of the deceased’ privacy by means that violate societal public interests or other societal morality” as torts that entitle the deceased’s family to seek compensatory damages

Tort Law 2010 Tort liabilities in areas such as medical negligence, work- related injuries and product liabilities, and liabilities on Internet users and ISPs –Article 2 broadly defines “civil rights and interests” includes the right to privacy as an independent right –Article 22: possibility to claim compensation for mental distress and emotional damage (similar to Judicial interpretation 2001) –Article 36: a network user or network service provider who infringes upon the civil right or interest of another person through network shall assume the tort liability (notice and take down system) –Providing only for remedies when privacy has been intruded. But it does not deal with proper handling of personal information at all stage to ensure proper use and security.

Criminal Protection Criminal Law –Art. 252: whoever conceals, destroys or unlawfully opens another person’s letter, thereby infringing upon right to correspondence, shall be held liable –Art. 253: any postal worker opening without authorization or concealing or destroying mail or telegrams shall be held liable –Amendment VII (2009): any staff member of a state organ or an entity in such a field as finance, telecoms, transportation, education or medical treatment, selling, or illegally providing personal information on citizens, which is obtained during the organ’s or entity’s performance of duties or provision of services, to others, shall be liable. Whoever illegally obtain the above information by stealing or any other means shall be liable Where any entity commits either of the above crimes shall be fined, and the direct liable person in charge and other directly liable persons shall be punished.

Specific regulations for Internet privacy (I) Administrative Measures for Security Protection of the International networking of Computer Information Networks (1997) (art. 7): the users’ freedom of communication and communications secrecy are protected. (Ministry of Public Security) NPCSC Decisions in Safeguarding Internet Security (2000): it is a crime to illegally intercept, tamper with, delete other people’s or other data and violate citizens’ freedom and privacy of correspondence. Provisions on the Technical Measures for the Protection of the Security of the Internet (2006): ISPs and entity users of the Internet shall be responsible for carrying into effect the technical measure for the protection of the Internet security and they should guarantee the normal functioning of the technical measure for the protection of the Internet security. (Ministry of Public Security)

Specific regulations for Internet privacy (II) 2000 MIIT Administrative Measures for Internet Electronic Messaging Services Provisions: providers of Internet electronic messaging services should keep the personal data of their users confidential, no disclosure without the users’ consent 2006 MIIT Administrative Measures for Internet Services (Art.3): keeping users’ personal information and address confidential; protecting citizens’ privacy of correspondence in using Internet services. Unless the public security organ or procuratorial organ makes an inspection on the contents of the correspondence according to law when required by national security or investigation of crimes, no infringement shall be allowed.

Specific regulations for Internet privacy (III) 2010 Ministry of Culture Interim Measures for the Administration of Online Games: online game operators should keep user registration data, operation data, maintenance logs, etc in accordance with the law to protect state secret, commercial secrets, etc SAIC Tentative Measures for the Administration of Online Commodity Transactions and Related Services: online commodity business operators and online service operators have certain obligations towards consumers in relation to the collected data from them, including safe custody, reasonable use, limited retention period, etc Ministry of Commerce Regulation on Administration of Platforms for Online Transactions with Third Parties: without the users’ consent, the platform operators shall not disclose or transfer to any third party the user list, transaction records and other data.

Problem with privacy protection Scope of privacy? –Balancing of public interests: value of information, the motivation, the status of the subject, the place and availability of less invasive alternatives, etc. –Information: personal identifying data (name, ID, address, etc.) and non-identifying data (age, gender, hobbies) –Cookies (detecting browsing patterns) and personalized services (registration for free ) Determination of damage? –Reflecting the harm caused by the defendant

Data Protection 2012 Draft on Information Security Technology—Guide of Personal Information Protection (MIIT for comment), recognizing five user rights: –Right of security: necessary measures to protect against unauthorized disclosure –Right of notice: informed of being collected and privacy policies –Right of choice: right to agree or refuse collection –Right of rectification: maintain completeness and accuracy –Right of objection: right to request stopping handling –First of its kind in China—a draft set of national standards on a comprehensive basis. However, this is only a guideline, not a law

Internet Information Services 2012 MIIT Several Provisions on Regulating the Market Order of Internet Information Services –First time elaboration of “personal data”: information relating to an online platform user which, when used either alone or in combination with other information, can identify that person.-- “personal identifier”

Internet Information Services 2012 Five fundamental data protection principles –Consent principle: duty to obtain users’ consent for collecting data and providing such data to a third party; –Purpose specification: duty to stipulate the manner, purpose and scope of collecting and processing data and not to use for any purpose beyond those consented to by the user –Collection limitation: duty to only collect data that is essential for providing the services –Security safeguard: duty to keep data in safe custody and take immediate remedial measures to safeguard the data in case of a leakage or potential leakage –Use limitation: duty not to use the data other than for the purpose of providing the services

Internet Information Services Regulations (Consultation) 2000 State Council Administrative Regulations on Internet Information Services Duty of confidentiality on the part of an ISP and interconnection service provider towards users in respect of personal data, including identity and log record, is explicitly spelt out New provisions on government’s enforcement against offenders (rectification order, confiscation of profits, fines, termination of license)

Future China cautious in comprehensive regulation of online privacy Privacy protection and Chinese ideologies and values –Ethical standards? Respect for the right to privacy in networks Informed consent for collection of personal information Equilibrium between the safety of personal privacy and the safety of society Social rectification for any infringement upon the right to privacy in networks

Future Possible supervisory authority? International cooperation: data transfers across border (minimum standards?) Comprehensive Data Protection Law? –Technology neutrality –“privacy”; “personal data” or “personal information” –Scope of “sensitive information”? –Exemptions –Enforcement and education (public awareness)