Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection & Privacy in the Information Age COMNET – Legal Frameworks for ICTs Malta 2013 Dr Antonio Ghio Dr Jeanine Rizzo.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
DR GEOFFREY SHANNON SPECIAL RAPPORTEUR ON CHILD PROTECTION Human Rights Standards Related to School Bullying 1.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Legal Aspect of IPv6 and of the IPv4 to IPv6 transition Ashok.B.RADHAKISSOON Legal Adviser/Policy&Regulatory Affairs Liaison.
Interface between patent and sui generis systems of protection of plant varieties The 1978 UPOV Act does not allow both systems to be applied to the same.
Signature (unit, name, etc.) Introduction to biometrics from a legal perspective Yue Liu Mar NRCCL, UIO.
The Price of Freedoms David DavenportDavid Grünberg Bilkent Computer Eng.METU Philosophy Ankara TurkeyAnkara Turkey
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Identity October 9, 2008.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
WP3 : Academic freedom and the changing conditions of academic work: legal and conceptual aspects.
National Smartcard Project Work Package 8 – Information Law Report.
Csc.ceceurope.org. Conference of European Churches Church & Society Commission csc.ceceurope.org TRAINING ON CHILDREN’S RIGHTS.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Main title Subheading Human rights and healthcare Ellie Keen 6 th October 2011.
HUMAN RIGHTS BASED APPROACH See Me Brewing Lab Cathy Asante.
Competition law and Article 8 ECHR VMR, 13 March 2008 Jolien Schukking.
WIPO Copyright Sector 1.  Fundamental or constitutional rights or public interest: freedom of speech, access to information, right for education, enjoyment.
1 When hate speech tangles privacy... When hate speech tangles privacy...
Privacy, Data Protection and Lex Informatica -- lecture 4 Dr. Lee A. Bygrave,
C4- Social, Legal, and Ethical Issues in the Digital Firm
Asian Perspective on Mobility Disabilities – ICTs and Policies Workshop on ICT and Persons with Disabilities Tunis, Tunisia, 16 November 2005 By Anuradha.
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
Personal data protection in criminal procedure International collaboration and principle of proportionality LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Searching for Vonnegut's Narrator: Freedom, Identity and Privacy in the Information Society Andrew Murray.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
The application of certain restrictions on access to environmental information in accordance with AC Personal Data Ana Barreira Instituto.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
Can there be privacy in networks ? Dr. Alexander Dix Berlin Commissioner for Data Protection and Freedom of Information Chairman of the International Working.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Data protection and European citizens’ initiatives
Digital Banking and Data Protection Achieving balance of compliance with customer experience and opportunity 30 September 2015 Paula Barrett Partner.
A QUESTION OF FAITH: RELIGION AND BELIEF IN EUROPE Equinet LWG 2011 Jayne Hardwick Moderator Equinet – Legal Working Group.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Data Protection Principles as Basic Foundation for Data Protection in EU/EEA Introduction to Data Protection Theory Seminar - AFIN Stephen.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
School of Law Reasonable Accommodation Education Lecturer: Shivaun Quinlivan
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Social networks and society All – Will be able to understand that Social Networking is a form of media and begin to make basic assessment about how they.
Concerns of Noncommercial Users Constituency Privacy Conference November 29, 2005 Kathryn A. Kleiman, Esq. Internet Law and Policy Specialist, McLeod,
Brussels Privacy Symposium on Identifiability
Brussels Privacy Symposium on Identifiability
Viewing the GDPR Through a De-Identification Lens
Amandine Jambert - IT Experts Department
Whistleblower Program
Data protection.
Data Protection & Human Rights
Learning Area 1 Information And Communication Technology and Society
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
Regulation and Digital Rights: The Big Picture
Is Data Protection a Fundamental Right Protecting the Individual?
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
Public Privacy: juridical & ethical perspective
EU Data Protection Legislation
Should we also regulate non-personal data?
Presentation transcript:

Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003

“An aggregation of unique characteristics” Use of an identity Real identity? Digital identity “The digital information that creates the image of an individually identifiable person”

Identifiable person “Who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, economic, physiological, mental, cultural or social identity.” “To determine whether a person is identifiable, account should be taken of all the means likely reasonably to be used either by the controller or by any other person to identify the said person.”

Multiple virtual identities Legal questions Identity management systems –Infomediaries or information brokers –Privacy tool kit –Profiling tool kit

Online anonymity Legal definition vs. technological concepts No legal answer to the taxonomy of technical properties and degrees of online anonymity (unlinkability, untraceability, unobservability, conditional/unconditional online anonymity)

Use of anonymity Protection of privacy Free speech without fear of retaliation Protection of possibly threatened interests of the user when completing certain legal acts Protection of interests of a party in a contracual environment

EU Data Protection Working Party: “The ability to remain anonymous – and consequently to have anonymous access to the internet – is essential if individuals are to preserve the same protection for their privacy online as they currently enjoy offline.”

Coucil of Europe: “In order to ensure protection against online surveillance and to enhance the free expression of information and ideas, MS should respect the will of users of the Internet not to disclose their identity.”

Examples of legitimated use of anonymity Anon. search of information Anon. correspondence Use of anon. self-help hotlines Use of anon. sources Whistle blowing through anon. hotlines Use of anon. informants, witnesses Use of anon. to conclude contracts Use of anon. payments for online purchases …

Restrictions Private law –Accountability in contractual and non- contractual environment Public law –Article 8 ECHR: interference is justified when necessary in a democratic society and provided by law –Controlled anonymity e.g. ‘trustee-controlled conditional anonymity’

ICRI-projects RAPID Roadmap for advanced research in privacy and Identity Management APES Anonymity and privacy in electronic services PRIME Privacy and identity management in Europe