Mark Burdon Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Mark Burdon Thesis THE CONCEPTUAL AND OPERATIONAL COMPATIBILITY OF DATA BREACH NOTIFICATION AND INFORMATION PRIVACY LAWS Mark Burdon M.Sc. (Econ) Public Policy (Lon), LLB (Hons) (London South Bank University, UK) Submitted in fulfilment of the requirements for the degree of PhD by publications Faculty of Law Queensland University of Technology 2011 Keywords Data Breach Notification Law – Information Privacy Law – Data Protection – Contextualisation - Information Security Law ii Abstract Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the iii framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation. iv Table of Contents CHAPTER 1 - INTRODCUTION ...................................................................................... 1 1.1 DESCRIPTION OF THE RESEARCH PROBLEM .......................................................... 1 1.2 OVERALL OBJECTIVE OF THE THESIS ..................................................................... 4 1.3 SPECIFIC AIMS OF THE THESIS ................................................................................ 5 1.4 THE SIX JOURNAL ARTICLES .................................................................................. 6 1.5 LINKING THE ARTICLES: PROGRESSION OF RESEARCH ........................................ 7 1.6 STRUCTURE OF THE THESIS .................................................................................... 9 1.7 CONCLUSION ........................................................................................................ 10 CHAPTER 2 - LITERATURE REVIEW .......................................................................... 11 2.1 INTRODUCTION ..................................................................................................... 11 2.2 DATA BREACH NOTIFICATION LAW ................................................................... 11 2.2.1 US Data Breach Notification Laws .................................................................... 13 2.2.2 Australian Data Breach Notification Developments ......................................... 33 2.2.3 Other Jurisdictional Developments ................................................................... 41 2.3 INFORMATION PRIVACY LAW .............................................................................. 47 2.3.1 Conceptual Underpinnings ............................................................................... 47 2.3.2 Founding Legal Instruments & Legislative Developments ............................... 53 2.3.3 Key Contemporary Analyses ............................................................................. 63 2.4 SUMMARY – GAPS IN THE LITERATURE ............................................................... 70 CHAPTER 3 - STAKEHOLDER PERSPECTIVES ....................................................... 72 CHAPTER 4 - MANDATORY NOTIFICATION ......................................................... 94 CHAPTER 5 - ENCRYPTION SAFE HARBOURS .................................................... 111 CHAPTER 6 - CONCEPTUAL BASIS .......................................................................... 129 CHAPTER 7 - FIRST GENERATION LAWS ............................................................. 158 CHAPTER 8 - CONTEXTUALIZING TENSIONS AND WEAKNESSES ............ 209 CHAPTER 9 - GENERAL DISCUSSION .................................................................... 278 9.1 LINKING THE ARTICLES: LOGICAL PROGRESSION ............................................ 278 9.1.1 Identification of Key Compatibility Issues ....................................................... 279 9.1.2 Investigation of Conceptual and Operational Foundations ............................. 281 9.1.2.1 Data Breach Notification Law ............................................................. 282 9.1.2.2 Information Privacy Law ..................................................................... 287 9.1.3 Synthesis of Findings ....................................................................................... 292 9.1.4 Summary - Assessment of Compatibility ........................................................ 298 9.2 SIGNIFICANCE OF THE RESEARCH ...................................................................... 300 9.3 LIMITATIONS OF THE RESEARCH........................................................................ 302 9.4 FUTURE RESEARCH DIRECTIONS........................................................................ 302 9.4.1 Revising Data Breach Notification Law .......................................................... 302 9.4.2 Contextualising Information Privacy Law ...................................................... 303 9.4.3 Recommendations for an Australian Data Breach Notification Law .............. 304 9.5 CONCLUDING REMARKS .................................................................................... 305 BIBLIOGRAPHY .............................................................................................................. 308 v List of Publications ♦ Lane B et al, 'Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches' (2010) 15(1) Media and Arts Law Review 149; ♦ Burdon, M, Lane, B and von Nessen, P, 'The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments' (2010) 26(2) Computer Law & Security Review 115; ♦ Burdon, M, Reid, J and Low, R, 'Encryption Safe Harbours and Data Breach Notification Laws’ (2010) 26(5) Computer
Recommended publications
  • Australian Political Writings 2009-10
    Parliament of Australia Department of Parliamentary Services Parliamentary Library Information, analysis and advice for the Parliament BIBLIOGRAPHY www.aph.gov.au/library Selected Australian political writings 2009‐10 Contents Biographies ............................................................................................................................. 2 Elections, electorate boundaries and electoral systems ......................................................... 3 Federalism .............................................................................................................................. 6 Human rights ........................................................................................................................... 6 Liberalism and neoliberalism .................................................................................................. 6 Members of Parliament and their staff .................................................................................... 7 Parliamentary issues ............................................................................................................... 7 Party politics .......................................................................................................................... 13 Party politics- Australian Greens ........................................................................................... 14 Party politics- Australian Labor Party .................................................................................... 14 Party politics-
    [Show full text]
  • Australia 2019
    Australia Free 77 100 A Obstacles to Access 23 25 B Limits on Content 29 35 C Violations of User Rights 25 40 Last Year's Score & Status 79 100 Free Overview Internet freedom in Australia declined during the coverage period. The country’s information and communication technology (ICT) infrastructure is well developed, and prices for connections are low, ensuring that much of the population enjoys access to the internet. However, a number of website restrictions, such as those related to online piracy or “abhorrent” content, limit the content available to users. The March 2019 terrorist attack on mosques in Christchurch, New Zealand, prompted internet service providers (ISPs) to block certain websites and the government subsequently introduced a new law that criminalized the failure to delete “abhorrent” content. Other legal changes—including court decisions expanding the country’s punitive defamation standards, an injunction silencing digital media coverage of a high-profile trial, and a problematic law that undermines encryption—shrunk the space for free online expression in Australia. Finally, an escalating series of cyberattacks sponsored by China profoundly challenged the security of Australia’s digital sphere. Australia is a democracy with a strong record of advancing and protecting political rights and civil liberties. Recent challenges to these freedoms have included the threat of foreign political influence, harsh policies toward asylum seekers, and ongoing disparities faced by indigenous Australians. Key Developments June 1, 2018 – May 31, 2019 After the March 2019 Christchurch attack, in which an Australian man who had espoused white supremacist views allegedly killed 51 people at two New Zealand mosques, ISPs acted independently to block access to more than 40 websites that hosted the attacker’s live-streamed video of his crimes.
    [Show full text]
  • Privacy and Data Protection in Australia: a Critical Overview (Extended Abstract)
    Privacy and Data Protection in Australia: a Critical overview (extended abstract) David Watts1, Pompeu Casanovas2,3 1 La Trobe Law School, La Trobe University, Melbourne, Australia 2 UAB Institute of Law and Technology, Universitat Autònoma de Barcelona, Spain Abstract. This extended abstract describes the regulation of privacy under Aus- tralian laws and policies. In the CRC D2D programme, we will develop a strategy to model legal requirements in a situation that is far from clear. Law enforcement agencies are facing big floods of data to be acquired, stored, assessed and used. We will propose in the final paper a linked data regulatory model to organise and set the legal and policy requirements to model privacy in this unstructured con- text. Keywords: Australian privacy law, legal requirements, privacy modelling 1 Introduction Australia has a federal system of government that embodies a number of the structural elements of the US Constitutional system but retains a Constitutional monarchy. It con- sists of a national government (the Commonwealth), six state governments (New South Wales, Victoria, Tasmania, Queensland, South Australia and Western Australia) as well as two Territories (the Australian Capital Territory and the Northern Territory). Under this system, specific Constitutional powers are conferred on the Common- wealth. Any other powers not specifically conferred on the Commonwealth are retained by the States (and, to a lesser extent, the Territories). There is no general law right to privacy in Australia. Although Australia is a signa- tory to the International Convention on Civil and Political Rights, the international law right to privacy conferred under Article 17 of the ICCPR has not been enacted into Australia’s domestic law.
    [Show full text]
  • Legitimacy in the New Regulatory State
    LEGITIMACY IN THE NEW REGULATORY STATE KAREN LEE A THESIS IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF LAW MARCH 2016 TABLE OF CONTENTS ACKNOWLEDGEMENTS ...................................................................................................... I PUBLICATIONS AND PRESENTATIONS ARISING FROM THE WRITING OF THE THESIS .. III GLOSSARY AND TABLE OF ABBREVIATIONS .................................................................. IV CHAPTER 1 INTRODUCTION ............................................................................................. 1 I JUSTIFICATION FOR RESEARCH AND ITS APPROACH .......................................... 4 A THE NEED FOR EMPIRICAL STUDY OF INDUSTRY RULE-MAKING ....................... 4 B PART 6 RULE-MAKING ....................................................................................... 7 1 THE COMMUNICATIONS ALLIANCE ................................................................ 8 2 CONSUMER CODES ....................................................................................... 10 C PROCEDURAL AND INSTITUTIONAL LEGITIMACY, RESPONSIVENESS AND THEIR CRITERIA ......................................................................................................... 11 II TERMINOLOGY ................................................................................................ 15 A CONSUMER AND PUBLIC INTERESTS................................................................. 15 1 CONSUMER INTEREST .................................................................................
    [Show full text]
  • Review of Secrecy Laws
    Review of Secrecy Laws ISSUES PAPER You are invited to provide a submission or comment on this Issues Paper ISSUES PAPER 34 December 2008 This Issues Paper reflects the law as at 1 November 2008. © Commonwealth of Australia 2008 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN-978-0-9804153-4-6 Commission Reference: IP 34 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by Ligare Making a submission Any public contribution to an inquiry is called a submission and these are actively sought by the ALRC from a broad cross-section of the community, as well as those with a special interest in the particular inquiry.
    [Show full text]
  • Telecommunications Act 1997
    Telecommunications Act 1997 Act No. 47 of 1997 as amended This compilation was prepared on 26 November 2008 taking into account amendments up to Act No. 117 of 2008 [Note: Subsections 531F(1) and (2) and paragraphs 531G(2)(e) and (3A)(e) cease to have effect on 27 May 2009, see subsections 531F(3), 531G(3) and (3B)] The text of any of those amendments not in force on that date is appended in the Notes section The operation of amendments that have been incorporated may be affected by application provisions that are set out in the Notes section Prepared by the Office of Legislative Drafting and Publishing, Attorney-General’s Department, Canberra Contents Part 1—Introduction 1 1 Short title [see Note 1].......................................................................1 2 Commencement [see Note 1].............................................................1 3 Objects...............................................................................................1 4 Regulatory policy ..............................................................................3 5 Simplified outline ..............................................................................3 6 Main index.........................................................................................7 7 Definitions.........................................................................................8 8 Crown to be bound ..........................................................................18 9 Extra-territorial application .............................................................18
    [Show full text]
  • Download PDF Read More
    This Issues Paper reflects the law as at 30 November 2006 © Commonwealth of Australia 2006 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN 0-9758213-7-7 Commission Reference: IP 32 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by Canprint Communications Pty Ltd Making a submission Any public contribution to an inquiry is called a submission and these are actively sought by the ALRC from a broad cross-section of the community, as well as those with a special interest in the inquiry.
    [Show full text]
  • Review of the Privacy Act 1993
    NZLC REPORT 123 E31(123) NovemberJune 2011, 2010, Wellington, Wellington, New New Zealand Zealand | | REPORT REPORT 123 119 REVIEW OF THE PRIVACY ACT 1993 REVIEW OF THE LAW OF PRIVACY STAGE 4 LAW COMMISSION E31 (123) June 2011, Wellington, New Zealand | REPORT 123 REVIEW OF THE PRIVACY ACT 1993 REVIEW OF THE LAW OF PRIVACY STAGE 4 The Law Commission is an independent, publicly funded, central advisory body established by statute to undertake the systematic review, reform and development of the law of New Zealand. Its purpose is to help achieve law that is just, principled, and accessible, and that reflects the heritage and aspirations of the peoples of New Zealand. The Commissioners are: Honourable Sir Grant Hammond KNZM – President Dr Warren Young – Deputy President Emeritus Professor John Burrows QC George Tanner QC Professor Geoff McLay The General Manager of the Law Commission is Brigid Corcoran The office of the Law Commission is at Level 19, HP Tower, 171 Featherston Street, Wellington Postal address: PO Box 2590, Wellington 6140, New Zealand Document Exchange Number: sp 23534 Telephone: (04) 473-3453, Facsimile: (04) 471-0959 Email: [email protected] Internet: www.lawcom.govt.nz National Library of New Zealand Cataloguing-in-Publication Data New Zealand. Law Commission. Review of the Privacy Act 1993 : review of the law of privacy, stage 4. (Law Commission report ; 123) ISBN 978-1-877569-14-2 (pbk.)—ISBN 978-1-877569-23-4 (internet) 1. New Zealand. Privacy Act 1993. 2. Privacy, Right of—New Zealand. I. Title. II. Series: New Zealand. Law Commission. Report ; no.
    [Show full text]
  • Secrecy Laws and Open Government in Australia
    Secrecy Laws and Open Government in Australia REPORT REPORT 112 December 2009 This Report reflects the law as at 11 November 2009 © Commonwealth of Australia 2009 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN- 978-0-9807194-0-6 Commission Reference: ALRC Report 112 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] Homepage: www.alrc.gov.au Printed by Ligare The Hon Robert McClelland MP Attorney-General of Australia Parliament House Canberra ACT 2600 11 December 2009 Dear Attorney-General Review of Secrecy Laws On 5 August 2008, you issued terms of reference for the ALRC to undertake a comprehensive review of secrecy laws and related issues.
    [Show full text]
  • The Legal Protection of Personal Images Shared on Social Networks in Australia
    The Legal Protection of Personal Images Shared on Social Networks in Australia Author Georgiades, Eugenia Published 2017 Thesis Type Thesis (PhD Doctorate) School Griffith Law School DOI https://doi.org/10.25904/1912/3656 Copyright Statement The author owns the copyright in this thesis, unless stated otherwise. Downloaded from http://hdl.handle.net/10072/367723 Griffith Research Online https://research-repository.griffith.edu.au The Legal Protection of Personal Images Shared on Social Networks in Australia Eugenia Georgiades Bachelor of Arts (Hons), Bachelor of Laws, Graduate Diploma Legal Practice, Master of Laws School of Law, Griffith University This thesis is submitted in fulfilment of the requirements of the degree of Doctor of Philosophy December 2016 ii Abstract Social networks have changed the nature of communication in the modern world: they have changed how people communicate, the frequency and mode of communication, and how people relate to those communications. Social networks have also changed the type of information that is communicated. One of the notable developments has been a proliferation of the sharing of images that people have taken themselves. From the ubiquitous selfie through to group shots, personal images are now a key part of modern social communication. A number of problems have arisen as a consequence of the rapid increase in the sharing of personal images online. This is because personal images uploaded online are, more now than ever, prone to misuse. Third parties are easily able to reuse, distort and alter images that are uploaded on social networks. As a result, people are at risk of losing control over the images that they upload online.
    [Show full text]
  • Upholding the Australian Constitution Volume Fourteen
    Upholding the Australian Constitution Volume Fourteen Proceedings of the Fourteenth Conference of The Samuel Griffith Society Menzies Hotel, Carrington Street, Sydney, 14 – 16 June, 2002 © Copyright 2002 by The Samuel Griffith Society. All rights reserved. Table of Contents Foreword John Stone Dinner Address Hon Chief Justice Murray Gleeson, AC The Birth, Life and Death of Section 74 Introductory Remarks John Stone Chapter One Professor Geoffrey de Q Walker The Seven Pillars of Centralism: Federalism and the Engineers’ Case Chapter Two Dr Nicholas Aroney The Ghost in the Machine: Exorcising Engineers Chapter Three Hon Justice Kenneth Handley, AO When “Maybe” means “No” Chapter Four Professor David Flint, AM The Republic: Report from Corowa Chapter Five Professor John McMillan Immigration Law and the Courts Chapter Six Hon Philip Ruddock, MHR Immigration Policy and the Separation of Powers Chapter Seven Piers Akerman Immigration Policy, Sovereignty and the Media Chapter Eight Hon Justice Lloyd Waddy Memories of a Monarchist – now a Trappist Judge Chapter Nine Dr Stephen Hall September 11 and International Law Chapter Ten Dr Janet Albrechtsen National Interest versus International Law: The International Criminal Court Chapter Eleven Steven Franks, MP (NZ) Treaty of Waitangi: Only Good Intentions? Concluding Remarks Rt Hon Sir Harry Gibbs, GCMG, AC, KBE Appendix Contributors Foreword John Stone The fourteenth Conference of The Samuel Griffith Society, which was held in Sydney in June, 2002, was more than usually notable, for several reasons. This Volume of the Society’s Proceedings, Upholding the Australian Constitution, contains the papers, and Dinner Addresses, delivered to that Conference, together with the usual brief concluding remarks of our President, the Rt Hon Sir Harry Gibbs.
    [Show full text]
  • Michael Wilson Thesis
    THE POLITICS OF PRIVACY PROTECTION: AN ANALYSIS OF RESISTANCE TO METADATA RETENTION AND ENCRYPTION ACCESS LAWS Michael Peter Wilson Bachelor of Justice (Honours) Bachelor of Behavioural Science A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Justice, Faculty of Law Queensland University of Technology 2020 Abstract The politics of privacy protection are contested. In recent years, the Australian Government has justified the expansion of surveillance powers, under the Data Retention Act (2015) and Encryption Access Act (2018), by invoking the ‘problem of going dark’ – a claim that the investigative capabilities of law enforcement agencies are being undermined by the use of privacy-enhancing technologies. As such, the ‘problem of going dark’ draws a moral equivalence between privacy protection and methods of evading criminal investigations. This thesis examines the politics of privacy protection within the context of Australia’s national debates about digital surveillance powers, focusing on how privacy advocates contest this moral equivalence embedded within the ‘problem of going dark’. Specifically, this research involves a political discourse analysis (Laclau & Mouffe, 1985) of twenty-one (n=21) semi-structured interviews with Australian privacy advocates involved in campaigns opposing data retention and encryption access laws. Using the analytical constructs of signification, subjectivation, and identification, the research examines how privacy advocates challenge the ‘problem of going dark’, discursively position the subjects of surveillance laws, and mobilise through the construction of shared identities. This thesis argues that Australian privacy advocates contest the moral equivalence embedded within the ‘problem of going dark’ via the articulation of a civic duty to disrupt the relations of domination that enable ‘morally arbitrary’ surveillance under the Data Retention Act (2015) and Encryption Access Act (2018).
    [Show full text]