Privacy Protection in the Information and Communications Technology
Total Page:16
File Type:pdf, Size:1020Kb
University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2011 Privacy protection in the information and communications technology (ICT): a comparative analysis of the laws of the United States, European Union and Jordan Akram Almatarneh University of Wollongong, [email protected] Recommended Citation Almatarneh, Akram, Privacy protection in the information and communications technology (ICT): a comparative analysis of the laws of the United States, European Union and Jordan, Doctor of Philosophy thesis, Faculty of Law, University of Wollongong, 2011. http://ro.uow.edu.au/theses/3470 Research Online is the open access institutional repository for the University of Wollongong. For further information contact Manager Repository Services: [email protected]. Privacy Protection in the Information and Communications Technology (ICT): A Comparative Analysis of the Laws of the United States, European Union and Jordan A Thesis Submitted in Fulfilment of the Requirements for the Award of the Degree of Doctor of Philosophy From University of Wollongong By Akram Almatarneh LL.B (MU, Jordan) LL.M (UWS, Australia) M.Phil (Macquarie University, Australia) Faculty of Law 2011 SUMMARY OF CONTENTS CONTENTS………………………………………………….. ii LIST of FIGURES, TABLES and APPENDICES………….. viii ABBREVIATIONS…………………………………………... ix ACKNOWLEDGMENTS………………………………….... xi STATEMENT OF AUTHORSHIP……………………….... xiii AUTHOR’S PUBLICATIONS……………………………… xiv ABSTRACT………………………………………………….. xv CHAPTERS 1–9…………………………………………….... 1 BIBLIOGRAPHY……………………………………………. 447 APPEDNICES………………………………………………... 478 i CONTENTS Chapter One General Introduction 1.1 Background to the Research……………………………………………... 1 1.2 Statement of the Problem………………………………………………... 3 1.3 Research Questions……………………………………………………….. 8 1.4 Conceptual Framework…………………………………………………... 9 1.5 Aims and Objectives of the Research…………………………………… 17 1.6 Approach and Methodology……………………………………………... 19 1.7 Literature Review…………………………………………………………. 22 1.8 Chapter Outline…………………………………………………………… 33 Chapter Two The Concept of Privacy 2.1 Introduction……………………………………………………………….. 38 2.2 Definition of Privacy……………………………………………………... 39 2.3 Importance of Privacy…………………………………………………….. 46 2.4 Privacy as a Legal Concept: Property Right or Human Right?............. 56 2.5 Privacy and Other Concepts……………………………………………... 62 2.5.1 Privacy and Secrecy……………………………………………………. 62 2.5.2 Privacy and Confidentiality……………………………………………. 64 2.5.3 Privacy and Reputation………………………………………………... 66 2.5.4 Privacy and Security………………………………………………….... 67 2.6 International Recognition of the Right to Privacy……………………. 68 2.6.1 Universal Declaration on Human Rights (UDHR (1948), Article 12)...................................................................................................................................... 69 2.6.2 International Covenant on Civil and Political Rights (ICCPR (1976), Article 17)……………………………………………………………………. 70 2.6.3 European Convention on Human Rights (ECHR (1950), Article 8)……………………………………………………………………………... 72 2.6.4 American Convention on Human Rights (ACHR (1969), Article 11).......................................................................................................................... 75 2.6.5 Cairo Declaration on Human Rights in Islam (CDHR (1990), Article 18)……………………………………………………………………………. 76 2.7 International Standard of Privacy……………………………………….. 78 2.7.1 Organisation for Economic Cooperation and Development (OECD)… 78 ii 2.7.2 Asia-Pacific Economic Cooperation (APEC)………………………….. 83 2.8 Concluding Remarks……………………………………………………… 87 Chapter Three Privacy in Islam 3.1 Introduction……………………………………………………………….. 90 3.2 The Sources of Shari’ah (Islamic Law)………………………………….. 91 3.2.1 The Holy Qur’an………………………………………………………. 91 3.2.2 The Sunnah…………………………………………………………….. 94 3.3 Shari’ah and Some Aspects of Privacy…………………………………... 95 3.3.1 Privacy of the Home…………………………………………………… 95 3.3.2 Suspicion and Espionage………………………………………………. 99 3.3.3 Private Correspondence……………………………………………….. 103 3.3.4 Confidential Conversation……………………………………………... 104 3.4 The Privacy of Non-Muslim……………………………………………... 107 3.5 The Privacy of the Deceased Persons…………………………………... 108 3.6 The Role of Government………………………………………………… 110 3.7 Concluding Remarks……………………………………………………… 111 Chapter Four Privacy and Information and Communications Technology in Jordan: The Public Sector 4.1 Introduction……………………………………………………………….. 114 4.2 ICT and Its social, economical and political Impacts…………………. 114 4.3 ICT and Its impacts on Privacy………………………………………….. 117 4.4 ICT in Jordan……………………………………………………………… 120 4.4.1 Electronic Government in Jordan……………………………………... 125 4.4.2 E-Government Initiative and Individual Privacy Concerns………….. 129 4.4.2.1 Collection of Personal Information……………………………….. 135 4.4.2.2 Use and Disclosure of Personal Information……………………... 139 4.4.3 Privacy Impact Assessments (PIA) for the E-Government Initiative… 146 4.5 Concluding Remarks……………………………………………………… 149 iii Chapter Five Privacy and Information and Communications Technology in Jordan: The Private Sector 5.1ntroduction………………………………………………………………..... 151 5.2 Economic and trade liberalisation in Jordan…………………………… 154 5.2.1 Jordan and the World Trade Organisation (WTO)…………………... 156 5.2.1.1 Jordan’s Obligations in Telecommunications under WTO GATS……………………………………………………………………... 157 5.2.1.2 Jordan’s Obligations in Banking sector under WTO GATS…….. 160 5.2.2 The Jordan-US Free Trade Agreement (JUSFTA)…………………... 164 5.2.3 The Jordan-European Association Agreement………………………... 173 5.2.3.1 EU-Jordan Action Plan…………………………………………… 176 5.3 The Telecommunications Sector in Jordan…………………………….. 182 5.3.1 The Ministry of Information and Communications Technology (MoICT)……………………………………………………………………... 186 5.3.2 Telecommunications Regulatory Commission (TRC)………………... 187 5.3.3 The Privacy Implications of the Telecommunications Sector in Jordan………………………………………………………………………... 191 5.3.3.1 An Online Case Study…………………………………………….. 192 5.4 The Banking Sector in Jordan…………………………………………… 198 5.4.1 Introduction……………………………………………………………. 198 5.4.2 The Banking System in Jordan………………………………………... 200 5.4.3 The Banking System and the ICT in Jordan………………………….. 203 5.4.3.1 Automated Teller Machines (ATMs)…………………………….. 204 5.4.3.2 Internet Banking………………………………………………….. 205 5.4.3.3 Telephone Banking……………………………………………….. 207 5.4.3.4 Credit Cards………………………………………………………. 208 5.4.4 The Privacy Implications of e-Banking in Jordan…………………….. 208 5.4.5 The Extent of e-Banking Services in Jordan …………………………. 210 5.4.6 The Privacy Concerns of e-Banking in Jordan………………………... 212 5.4.6.1 Online Privacy Consent…………………………………………... 214 5.4.6.2 Transborder Data Flows (TDF)………………………………….. 216 5.4.7 The Privacy Implications of Foreign Banks in Jordan: A Case Study……………………………………………………………………………. 218 5.5 Concluding Remarks……………………………………………………… 221 iv Chapter Six The Legal Landscape of Privacy Protection in Jordan 6.1 Introduction……………………………………………………………….. 225 6.2 The Legal System in Jordan……………………………………………... 225 6.2.1 The Constitution of Jordan……………………………………………. 226 6.2.2 The Sources of Law in Jordan…………………………………………. 228 6.2.3 The Court System in Jordan…………………………………………... 229 6.3 Laws Applicable to Privacy Protection in Jordan……………………... 235 6.3.1 Major Laws……………………………………………………………. 236 6.3.1.1 The Jordanian Constitution and Privacy………………………… 236 6.3.1.2 The National Centre for Human Rights Law No 51 of 2006…… 240 6.3.1.3 The Civil Code No 43 of 1976……………………………………. 241 6.3.1.4 The Penal Code No 16 of 1960…………………………………… 244 6.3.1.5 The Law on Guaranteeing the Right of Access to Information No 47 of 2007……………………………………………………………... 247 6.3.2 Privacy Laws Concerning Jordan’s Telecommunications Sector... 250 6.3.2.1 The Telecommunications Law No 13 of 1995…………………… 250 6.3.2.2 The Postal Services Law No 34 of 2007………………………….. 254 6.3.3 Privacy Laws Concerning the Banking Sector in Jordan………… 255 6.3.3.1 The Banks Law No 28 of 2000…………………………………… 256 6.3.3.2 The Credit Information Law No 15 of 2010……………………... 259 6.3.3.3 The Anti-Money Laundering Laws and Regulations……………. 262 6.3.3.3.1 The Anti-Money Laundering Law No 46 of 2007………….. 263 6.3.3.3.2 Regulations of Anti-Money Laundering and Terrorism Financing Circular No 29 of 2006……………………………………... 265 6.4 Concluding Remarks……………………………………………………… 269 Chapter Seven The Legal Landscape of Privacy Protection in the United States 7.1 Introduction……………………………………………………………….. 271 7.2 Privacy as a Constitutional Right……………………………………….. 273 7.2.1 The First Amendment…………………………………………………. 274 7.2.2 The Fourth Amendment………………………………………………. 279 7.2.3 The Ninth Amendment………………………………………………... 283 v 7.3 US Privacy Torts Law……………………………………………………. 285 7.3.1 Intrusion upon Seclusion………………………………………………. 285 7.3.2 Public Disclosure of Private Facts…………………………………….. 287 7.3.3 False Light……………………………………………………………... 290 7.3.4 Appropriation………………………………………………………….. 289 7.4 US Federal Legislations Applicable to Privacy………………………... 294 7.4.1 Privacy Laws Concerning the Public Sector……………………….. 295 7.4.1.1 Privacy Act of 1974……………………………………………….. 295 7.4.1.2 Freedom of Information Act (FOIA) of 1966…………………….. 298 7.4.1.3 Electronic Freedom of Information Act Amendments (EFOIA) of 1996……………………………………………………………………….. 303 7.4.1.4 Computer Matching and Privacy Protection Act of 1988……….. 304 7.4.1.5 E-Government Act of 2002……………………………………….. 309 7.4.2 Privacy Laws Concerning US Telecommunications Sector………… 312 7.4.2.1 Electronic Communication