Copyright 1988-2006 1 Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.

Slides:



Advertisements
Similar presentations
MEDEFs View on Dot EU Domain Day – 5 novembre 2002 – Palazzo Stelline – Milano Catherine GABAY – Director Innovation and Research - Medef.
Advertisements

Unconventional Gas and EU Energy Policy
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Copyright, Issues from Internet Technologies 3 – Internet Governance Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow, Unis of.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian.
Copyright Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, A.N.U. & U.N.S.W.
Copyright A Perspective on The Future of the IS Discipline ACIS – 5 December 2013 Geelong Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Invitation to Research SCIENTIFIC RESEARCH TECHNIQUES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright, Invitation to Research NON-EMPIRICAL RESEARCH TECHNIQUES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni.
Copyright, Invitation to Research RESEARCH ETHICS Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright, Invitation to Research ALTERNATIVES TO SCIENCE Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright, Invitation to Research SYSTEMS THINKING Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright, Invitation to Research THE RESEARCH PRODUCT Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright National Identity Cards? Bust the Myth of Security über Alles Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis.
Copyright How Academe and Business Can Connect Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor in eCommerce, Uni. of Hong Kong;
Copyright, Invitation to Research RESEARCH TECHNIQUES – OVERVIEW Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright A 'Fair Go' for Creatives in a Digital Environment Roger Clarke Xamax Consultancy, Canberra Chair, AEShareNet Limited & Visiting.
Copyright, Invitation to Research THE SCIENTIFIC APPROACH Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright Paper Reviewing Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, U.N.S.W., A.N.U.
Copyright, A Pilot Study of the Effectiveness of Privacy Policy Statements Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor,
A strategy for a Secure Information Society –
1 THE WHITE PAPER ON SPORT THE EU AND SPORT: MATCHING EXPECTATIONS MICHELE COLUCCI Tilburg University, Spring semester 2012
1 The International Labour Standards Modena, february 2008 Michele Colucci
Implications for the Regions EU-Regional Policy 1 Governance White Paper Introduction Adoption of White Paper on European Governance, July 25, 2001 Aim:
The Human Right to Access Communications References and Principles. APT-ITU workshop on the International Telecommunications Regulations Bangkok, 6-8 February.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Data Protection Billy Hawkes Data Protection Commissioner Irish Human Rights Commission 20 November 2010.
The Looming Privacy Rights Debacle How EU Data Protection Law Will Shape Future Incident Response Team Activities Around The World Thomas Daemen FIRST.
Spamming in EC Law A Constitucional Approach Manuel David Masseno Beja Polytechnic - Portugal.
DR GEOFFREY SHANNON SPECIAL RAPPORTEUR ON CHILD PROTECTION Human Rights Standards Related to School Bullying 1.
Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms May 2013.
Council of the European Union Working Party on Data Protection
Right to an Effective Remedy:
Text Privacy and Data Protection in Sweden Christine Kirchberger.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
Operationalizing the Ruggie Framework Michael Auerbach, V.P., Social Risk Consulting.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
The digital economy: developments in participation and productivity Chris Chapman ACMA Digital Economy Workshop Wednesday 10 Sept 2008 Melbourne.
ISO and Consumers CI Congress sub-plenary 6c - How can ISO be used by consumer groups? Jens Henriksson Swedish Consumer Expert.
WIPO Copyright Sector 1.  Fundamental or constitutional rights or public interest: freedom of speech, access to information, right for education, enjoyment.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
UNECE Working Party on Rail Transport Workshop on Passenger Accessibility of Heavy Rail Systems Geneva 19 November 2009 Policy and Legislative Context.
MANIFESTO FOR RESPONSIBLE EUROPEAN MANAGEMENT EUROCADRES’ Conference Nov 2003 Dirk Ameel.
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
W-9 COMPUTERS AND THE LAW Contract Law Copyright Law Trademark Law Patent Law Tort Law Computer Crime Utility Law or Telecommunications Law Constitutional.
Data Protection Privacy in the Digital Age: the UN General Assembly Resolution Sophie Kwasny, 16 October th International Conference, Mauritius.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Legal Aspects of Ethical Conduct 1. As an IT professional your work is governed by a range of legislation and industry standards including:  Australian.
E-Transformation Turkey Project State Planning Organization March 17, 2005 Interoperability and Metadata Workshop Ankara, Turkey.
Peter Coroneos Chief Executive Internet Industry Association (IIA) AVAR Conference Sydney November 7, 2003.
Discrimination on the grounds of Nationality Ana Rita Gil FDUNL, 13 November 2013.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Briefing to Asian Data Privacy.
WHOIS Public safety and data protection requirements.
Copyright Public Policy is Within-Scope Roger Clarke Xamax Consultancy Pty Ltd Visiting Professor in Computer Science, ANU and in Cyberspace Law.
Doc.JUDr.Soňa Skulová, Ph.D. Principles of Good Governance.
František Nonnemann Skopje, 9th October 2012 JHA DP aspects related to provision of information about public figures in CZ.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy in the Digital Age: the UN General Assembly Resolution
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
The Legal Framework of the Digital Surveillance Economy Roger Clarke & Angela Daly APSN – Uni Hong Kong – 27 September 2017 Xamax Consultancy,
Right to an Effective Remedy:
European Administrative Space - EAS
Securing free and fair European elections
Right to an Effective Remedy:
SRO APPROACH TO REGULATION
Presentation transcript:

Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU {.html,.ppt} ACMA Information Communications Entertainment Conference, Canberra, November 2006

Copyright What is Privacy ? The interest that individuals have in sustaining a 'personal space', free from interference by other people and organisations Dimensions of Privacy The Physical Person Personal Behaviour Personal Communications Personal Data

Copyright Privacy is a Fundamental Human Right UDHR 1948 (Art. 12) ICCPR 1966 (Art. 17) Euro Convention on Human Rights (Art. 8) Charter of Fundamental Rights of the European Union (Arts. 7 and 8) National Constitutions and Bills of Rights Privacy is not an Optional Extra Privacy is not a Mere Economic Right

Copyright Why is Privacy ? Physical Needs Psychological Needs Social / Sociological Needs Economic Needs Political Needs The Philosophical Level

Copyright Privacy Protection Privacy can conflict with other interests: personal conflict of interests interests of another person interests of a group or community interests of an organisation interests of society as a whole Privacy Protection is a process of finding appropriate balances between privacy and multiple competing interests

Copyright The Elements of Effective Solutions Legal Frameworks Constructive Dialogues Codes Ongoing Consultative Processes Organisational Protections Technical Protections Laws Sanctions Enforcement Regimes

Copyright The Vacuousness of Data Protection Laws FIPs (Fair Information Practices) were designed for administrative convenience OECD Guidelines were designed to protect businesses from inconsistent national laws Exceptions, Exemptions, Loop-Holes Over-Rides and Small-Print Amendments 1980 Provisions for 1970s Computing

Copyright The Privacy Amendment (Private Sector) Act 2000 Ignored the Outcomes of Consultation 253 pages; > 3,000 words of 'Principles', containing 24 instances of 'reasonable' Full of exemptions and exceptions Far short of the OECD Guidelines of 1980 Thoroughly inadequate cf. the EU Directive A Poor Attempt at a 3Q 20th Century Law World's Worst Privacy Legislation, or, more simply, Anti-Privacy Legislation

Copyright Community Ethos >> Inter-Personal Communications Egalitarianness Openness Participation Mutual Service Community Freedoms Gratis Services Cyberculture Ethos Inter-Personal Communications Internationalism Egalitarianness Openness Participation Mutual Service Community Freedoms Gratis Services And the Impact of Digital?

Copyright Public Dissatisfactions Are Piling Up Spam and Telemarketing Abuse continue to be bad for eBusiness Malware has been bad for eBusinessand change is going to be slow Regulatory activity is near-non-existent (TIO, ACA/ACMA, OFPC) Employee Use of the Internet Many More Major Issues: cookies that breach the IETF standard web-bugs adware spyware silent numbers IPND ENUM RFID...

Copyright The Privacy Advocacy Core Privacy International – U.S.A. – many, including: ACLU – EPIC – U.K. – many, especially: SayNo2ID – Australia – many, especially: Aust Privacy Foundation – Electronic Frontiers Aust–

Copyright PRIVACY as a Strategic Factor Privacy is much more than mere Data Protection, and mere Fair Information Practices Elements of a Privacy Strategy A Proactive Stance An Express Strategy An Articulated Plan Resourcing Monitoring of Performance against the Plan