Commission Nationale De L'informatique ET Des Libertés

Total Page:16

File Type:pdf, Size:1020Kb

Commission Nationale De L'informatique ET Des Libertés activity report COMMISSION NATIONALE DE L’INFORMATIQUE ET DES LIBERTÉS coMMISSioN NatioNALE DE L’INForMatiQUE et DES LIBertÉS ACTIVITY REPORT 2011 As provided by Article 11 of the Law of 6 January 1978, amended by the Law of 6 August 2004 In pursuance with the Law of 11 March 1957 (Article 41) and the Code of Intellectual Property of 1 July 1992, any reproduction, whether wholly or partially, of this publication for collective usage is strictly prohibited without the express authorization of the publisher. As a reminder, the abusive and collective use of photocopies jeopardizes the economic balance of the book publishing industry. © Direction de l’information légale et administrative – Paris, 2012 ISBN 78-2-11-008039-4 DECISIONS AND DELIBERATIONS 11 2 REJECTED WAIVERS OF AUTHORIZATIONS NOTIFICATION 1,969 249 93 1 DECISIONS & AUTHORIZATIONS, OPINIONS ISSUED, RECOMMENDATION DELIBERATIONS INCLUDING 6 SINGLE INCLUDING ON POLITICAL ADOPTED AUTHORIZATIONS 1 OPINION ON A COMMUNICATION (+ 25.5% versus 2010) SINGLE REGULATION 2011 KEY FIGURES NOTICES TO COMPLY & SANCTIONS PRIOR FORMALITIES 65 5 5,993 4,483 NOTICES TO COMPLY FINANCIAL FINES NOTIFICATIONS ON NOTIFICATIONS ON VIDEO-SURVEILLANCE GEOLOCATION SYSTEMS SYSTEMS (+33.5 versus 2010) 13 2 (+37% versus 2010) WARNINGS ACQUITTALS 744 AUTHORIZATIONS ON BIOMETRIC DEVICES (+5.4% versus 2010) COMPLAINTS & REQUESTS FOR INDIRECT RIGHT OF ACCESS CONTROLS & AUDITS 5,738 2,099 COMPLAINTS REQUESTS FOR INDIRECT 385 151 (+19% versus 2010) ACCESS TO POLICE AND AUDITS VIDEOPROTECTION INTELLIGENCE RECORDS (+25% versus 2010) AUDITS (+12% versus 2010) CORRESPONDENTS 8,635 ORGANIZATIONS HAVE APPOINTED A DATA PROTECTION OFFICER (CIL) (+25% versus 2010) TABLE OF COntents Foreword for the President A word from the Secretary General 1. NEW Missions Vidéo-surveillance audits: status assessment and action plan 10 5. CONSULT AND INNOVATE CNIL certification labels 13 WiFi, iPhone and geolocation 50 Notification of personal ZOOM data breaches 16 Consultation on Strategic forward-planning at CNIL: Cloud Computing 51 initial work, first publications 19 ZOOM Smartphone and privacy: 6. ProtECT AND INSPECT a priority for analysis and action 23 Record number of complaints 58 Right of indirect access 59 2. INFORM Audits 63 The CNIL informs you daily 30 Replies to public enquiries 34 7. SAnction Data protection officer 35 Summary report on the 2011 activity of the Sanction Select Committee 66 3. ADvice AND PROPose National Consumer Credit Register 38 8. TOPics OF investigAtion ZOOM Comments on the bill relative to IN 2012 identity protection 40 Revision of EU Directive: A successful data protection Union 70 4. REGULATE ZOOM APPENDICES Ethical Business Alert CNIL membership 76 (Whistleblowing) 46 CNIL: Means & Resources 77 4 activitY repOrt 2011 Faced with the complexity of the “digital ecosystem, the regulator’s challenge is to build relays ” FOrewORD FROM THE President THE CNIL READY FOR COMBAT oday, the CNIL has reached a decisive step in It is true that our powers of regulation and sanction T its development. Confronted to structural muta- are indeed mighty, and we shall not hesitate to use them tions linked to the growth of the digital society, the as needed. Nevertheless, these enforcement instruments Commission sits at the core of the international debate will not be sufficient to establish a rule of law in this on data protection in the 21st century; a unique era that new digital universe. Indeed, we can no longer afford to invites us to revisit our action. simply issue general guidelines and verify their applica- Structural changes first and foremost, as this is indeed tion a posteriori. Confronted with the complexity of the a change of era driven by the digital age. Within just a few digital ecosystem, the regulator’s challenge consists in years, the digital world has become pervasive: with the building relays; relays allowing for the engagement and increasing dematerialization of industries and services, we accountability of all stakeholders, whether public, private have shifted from a rather static, domestic world of physical or individual, in order to ultimately share the burden of records to an international, fluctuating universe of virtual regulation with them. data with multiple players involved. Data are pervasive and omnipres- ent everywhere, produced and con- sumed by individuals, enterprises and public authorities alike; and tomorrow, these data will increas- ingly deal with objects. They now represent a considerable merchant worth, at the heart of the economic challenges of the 21st century. Confronted to this new ecosys- tem, my priority consists in con- solidating the adjustments already initiated, and ensuring that the CNIL enters the digital era on a solid footing. This new environ- ment can no longer be regulated the same way as in the past. We therefore need to rethink our action and revisit our operational tools in order to process these data flows and address increasingly Isabelle Falque-Pierrotin, diversified stakeholders. CNIL President Foreword 5 To this purpose, we need to work closer to the field, to Gradually, the issue of data protection is overstep- the various players and their specific business features. ping the mere scope of legal or IT corporate departments Such a novel approach will require making new tools to invest the dimensions of marketing, sales or human available to them, to help them implement in practice and resources. as early as possible the principles of the “Informatique & Yet it should also start spreading to the level of top Libertés” Act on Privacy and Data Protection. A tool box corporate management since tomorrow’s innovations and already exists, but we need to supplement and refresh it, growth are increasingly linked to data processing issues. in cooperation with professionals. Whether Codes of Good Just think about automobiles, smart meters or home Conduct, Charters, Certification Labels or Data Protection automation... many business sectors will need to take into Officers or Correspondents (“CIL” or “Correspondants consideration the issue of personal data management as a Informatique & Libertés” in France), all such levers must tool for customers to take ownership of their products and be in the service of corporate compliance with the Privacy services, and therefore a means conducive to the sustain- & Data Protection Act. able development of their business activities. Enforcement and oversight of compliance will lie at the Similarly, consumers have matured: even though many core of the CNIL’s actions over the coming years. still fail to understand how and by whom their personal data are actually used, both consumers and web users, This evolution also corresponds, I believe, to a new who represent a volatile but hard-to-please population, phase in the maturity of the stakeholders themselves. are demanding more transparency from businesses. They Under pressure from consumers and youngsters, data want to know about or even control such uses! protection is starting to be perceived not just from the Businesses, and more generally digital-related players simplistic prism of a legal constraint, but rather as a com- are confronted to these new demands; they cannot afford petitive edge, or even a social advantage. Enterprises are to disappoint them, at the risk of losing their customers’ of course concerned with limiting the legal risk, but they contact and trust. also wish to arouse trust from their target public, whether internal (employees) or external (customers, web users) The CNIL must also adapt to the new social demand, and, in the event of problems, to mitigate any image- and offer to the public at large educational guidance on related damage. solutions, by providing insights for a responsible and con- trolled use of personal data. The CNIL needs to fully play its role as a guide to digital life. This is one of the reasons why we decided to conduct a survey on smartphones, our new everyday-life instrument that contains numer- ous personal data, including sensitive data, yet lacking any specific protection. Based on the study findings, we developed ten recommendations to help better secure smartphones, in the form of a video tutorial. In the same Enforcement didactic spirit on best practices, the CNIL also innovated with the production of an interactive video clip entitled and oversight of Share the Party intended to raise the awareness of young- “ sters about the videos or photos they publish on social compliance will lie at networks. the core of the CNIL’s In order to anticipate on new uses, we can increas- ingly rely on the initiatives and works produced by our actions over the Department of Research, Innovation and Foresight. The many discussions initiated by the Department attest to coming years ” our determination to establish an open dialogue with 6 activitY repOrt 2011 highly diversified stakeholders, with exchanges of views example illustrating how credibility can be boosted by a that fuel and enrich our thinking, and sometimes even proactive collective action. incite us into rethinking our models. In this context of fierce international competition, the world is turning to Europe, in search of the continent’s These structural changes occur in a highly turbulent ability to modernize its data protection model, while reas- international environment which is not conducive to an serting privacy as a fundamental right. Because not eve- easy readjustment process. rything is merely about growth! The idea is to reconcile Europe, USA and Asia are wrestling to develop legal growth with a humanistic vision of fundamental rights, frameworks of personal data protection that will be as an approach specific to Europe, yet finding wide echoes efficient as possible in terms of economic growth. On a in the French-speaking world in particular. European scale, I am thinking of the Draft Regulation In order to assert its existence and have real clout on reforming the European Directive of 1995 relative to data the international scene, Europe therefore needs to show protection.
Recommended publications
  • Social Networking and Digital Gaming Media Convergence: Classification and Its Consequences for Appropriation
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Salford Institutional Repository Social Networking and Digital Gaming Media Convergence: Classification and its Consequences for Appropriation Marie Griffiths, PhD and Ben Light, PhD IS, Organisations and Society Research Centre University of Salford, Maxwell Building, Salford, M5 4WT. United Kingdom. Contact Author: Professor Ben Light IS, Organisations and Society Research Centre University of Salford, Maxwell Building, Salford, M5 4WT. United Kingdom. Tel. +44 161 295 5443 Email. [email protected] Suggested running title: Social Networking and Digital Gaming Convergence Biographies Marie Griffiths moved from the IT industry into academia and is now based at the University of Salford as an EPSRC Academic Fellow. She has, and continues to research gender and ICTs. Recently she has embarked upon the study "Cybercitizens and their Virtual Pursuits" to understand the consequence of growing up and living in a technologically saturated environment. Her work has been published in journals such as Gender, Work and Organization, the European Journal of Information Systems and Information Communication and Society. Ben Light is Professor of Technology and Society at the University of Salford. His research concerns the appropriation of configurable technologies within work, organisations and society. This has led him to explore the use of large-scale enterprise resource planning packages, call centre technologies, social networking sites and digital games. He has published in journals such as Communications of the ACM, Information Systems Journal, New Technology, Work and Employment, the European Journal of Information Systems and the Journal of Information Technology.
    [Show full text]
  • Childhood Comes but Once National Strategy to Combat Violence and Sexual Abuse Against Children and Youth (2014–2017)
    Strategy Childhood comes but once National strategy to combat violence and sexual abuse against children and youth (2014–2017) Strategy Childhood comes but once National strategy to combat violence and sexual abuse against children and youth (2014–2017) 4 FOREWORD As a society, Norway has come a long way in its efforts to protect children and adolescents from violence, sexual abuse and bullying. The progress we have achieved is attributable to policy decisions, legislation, increased knowledge, public discussion, media attention and the work of professionals, parents and children themselves. We do not permit parents to harm their children, and we express collective grief and alarm when we hear of children exposed to serious abuse. To the vast majority of parents in Norway, nothing is more important than the well-being of children. All the same, violence and sexual abuse, whether in the family or elsewhere, are a part of daily life for many children. Extensive research shows how consequential violence may be, whether it is directed at a parent or the child itself, and whether it takes the form of direct physical violence, sexual abuse or bullying. Violence can lead to extensive cognitive, social, psychological and physical problems in both the short and long term. Violence against children and adolescents is a public health challenge. The approach to violence and sexual abuse against children in Norwegian society must be one of zero tolerance. We want safety and security for all children, enabling them to enjoy good health and a good quality of life as they grow. Taboos must be broken.
    [Show full text]
  • Names and Behavior: Case of the Name “Muhammad”
    International Journal of Philosophy and Theology December 2014, Vol. 2, No. 4, pp. 109-127 ISSN: 2333-5750 (Print), 2333-5769 (Online) Copyright © The Author(s). 2014. All Rights Reserved. Published by American Research Institute for Policy Development DOI: 10.15640/ijpt.v2n4a7 URL: http://dx.doi.org/10.15640/ijpt.v2n4a7 Names and Behavior: Case of the Name “Muhammad” Raja Irfan Sabir1, Farooq Nawaz2, Usman Zakir3, Maira Naeem3 & Talha Anjum3 Abstract Names have great impact on the personality and behavioral traits of a person. Muslims mostly name their children (male) on the names of Prophets (Peace be upon All) and the devoted Companions (May Allah be Pleased with All) of Prophet Muhammad (Peace be Upon Him). The name of the last Prophet “Muhammad (Peace be Upon Him)” is used with most of the names e.g. Muhammad Abu Bakar, Muhammad Umer, Muhammad Usman, Muhammad Ali, Muhammad Bilal, Muhammad Junaid, Muhammad Ahmed, etc. Very rare research has been done on the impact of name on one’s personality and behavior. Furthermore, no research has been carried out specifically by considering the name “Muhammad (Peace be Upon Him)” which is the world’s most popular name. This research is aimed at exploring the impact of the name “Muhammad (Peace be Upon Him)” on one’s personality. Keywords: Muhammad, Name, Behavior, Personality, Theory of Planned Behavior. Introduction Names do have the power to make a child's identity and self-esteem and it also has impact on how he has been treated and seen by other people (Miller & Harrison, 2007). In western countries, just like music, clothes and hairstyles names come and go in fashion cycle.
    [Show full text]
  • Guy Fawkes, from Villain to Icon
    FACULTAD de FILOSOFÍA Y LETRAS DEPARTAMENTO de FILOLOGÍA INGLESA Grado en Estudios Ingleses TRABAJO DE FIN DE GRADO Guy Fawkes, from villain to icon Rafael Calle Cardona Tutor: Berta Cano Echevarría 2016-2017 1 2 ABSTRACT In this dissertation, I will be explaining and analyzing the changes that the historical figure of Guy Fawkes underwent from being one of the most hated figures in England, with an annual celebration to commemorate his death, to a fictional character representing the fight against totalitarianism in the late 20th century. And finally, how, in the early years of the 21st century he became the face of the international hacktivist group known as Anonymous. Furthermore, I will be analyzing the historical context in which the character of Guy Fawkes was conceived as well as explaining why he was the main figure who was accounted responsible for the Gunpowder Plot despite the fact that he was not its leader. Moreover, I will analyze why the group Anonymous chose the “Fawkesque” mask from the character from the graphic novel as well as the movie V for Vendetta which was at the same time inspired in the historical character, to become the face of the 21st century hacktivist movement. Keyword: Guy Fawkes, England, Anonymous, Hacktivism, V for Vendetta, Gunpowder Plot. En este trabajo, explicaré y analizaré los cambios que sufrió la figura histórica de Guy Fawkes, de ser una de las más odiadas en Inglaterra, con una celebración anual que para conmemorar su muerte, a un personaje de ficción que representa la lucha contra el totalitarismo en la segunda mitad del siglo XX.
    [Show full text]
  • Thesis (844.6Kb)
    ABSTRACT You Should Have Expected Us – An Explanation of Anonymous Alex Gray Director: Linda Adams; PhD Anonymous is a decentralized activist collective that has evolved using the technology of the information age. This paper traces its origins as a way of contextualizing and better understanding its actions. The groups composition is examined using its self‐ascribed imagery to illustrate its’ unique culture and relational norms. Its structure and motivation are analyzed using the framework developed for social movements and terrorist networks. Finally a discussion of a splinter cell and official reaction delineate both strengths and weaknesses of the movement while suggesting its future development. The conclusion serves to expound on the ideal end for the online anonymous community as a new frontier in meritocratic activism. APPROVED BY DIRECTOR OF HONORS THESIS: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Linda Adams, Department of Political Science APPROVED BY THE HONORS PROGRAM: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Andrew Wisely, Director. DATE: ________________________ YOU SHOULD HAVE EXPECTED US AN EXPLANATION OF ANONYMOUS A Thesis Submitted to the Faculty of Baylor University In Partial Fulfillment of the Requirements for the Honors Program By Alex Gray Waco, Texas May 2012 TABLE OF CONTENTS Preface iii Acknowledgements iv Dedication v CHAPTER ONE 1 Introduction CHAPTER TWO 4 The Story of Anonymous CHAPTER THREE 20 A Group with No Head and No Members CHAPTER FOUR 39 Activists or Terrorists CHAPTER FIVE 56 Distraction, Diversion, Division CHAPTER SIX 67 Conclusion Bibliography 71 ii PREFACE Writing a paper about a decentralized, online collective of similarly minded individuals presents a unique set of challenges. In spending so much time with this subject, it is my goal to be both intellectually honest and as thorough as I can be.
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]
  • Social Media, Politics and the State Two)
    4 Anonymous Hacktivism and Contemporary Politics Christian Fuchs 1. INTRODUCTION It is Friday, August 6, 2012, on the Internet. Sixty-seven years earlier, on August 6, 1945, the U.S. dropped the first atom bomb on Hiroshima. One hears a song by Trey Parker: "America. Fuck yeah. [. .] So lick my butt and suck on my balls, America, fuck yeah! Whatcha' gonna do when we come for you now? (. .) McDonalds, fuck yeah! Wal-Mart, fuck yeah!" Pictures of cats that look human are accompanied by the request, "I want to start a collection of my fetish catboys so post moar!" There is a link to a live cam on Times Square. One also finds an image showing a burning American flag that is accompanied by the logos of McDonald's and images of a can of Mountain Dew, the Statue of Liberty, a guitar player and a screaming bear. "You should kill yourself, fucking AMERRRICCAAA, you little fag- got." A rapper writes a new song and says that the first few minutes of the discussion in his thread will become part of the song. There is a story about a brother who tries to seduce his sister, but it turns out that his sister is a large arthropod. There is a thread with images of female but- tocks, accompanied by an announcement that one of the portrayed girls receives prank phone calls. One sees a picture of a couple having oral sex accompanied by the text "PORNO FUCK YEAH!" as well as a picture of a drunk sleeping man accompanied by the text "buddy passed out after 11 Coors lights and 2 bud lights" and the suggestion that a game will decide what the person who posted the picture will do to the drunk.
    [Show full text]
  • VIRTUAL TOURISM of HABBO UK USERS Final Paper Presented In
    VIRTUAL TOURISM OF HABBO UK USERS Final paper presented in MIT6 Media in Transition Conference (Boston, Mass., US, April 24-26, 2009) Marjoriikka Ylisiurua Sulake Corporation, Helsinki, Finland Peter Durant Sulake United Kingdom, London, UK Abstract Habbo, an open social virtual world, attracting millions of teenaged users monthly, consists of 31 local internet communities around the world. Every Habbo site operates in a different country in the local language, and despite similarity of activities and appearance, all communities form their own culture by making its own additions and translations to the globally coordinated elements. Having been grown to have its own customs and codes of conduct, every local Habbo has its own traits, making them worthy targets of virtual tourism within the Habbo realm. With United Kingdom -based teenagers as examples, we investigated the phenomenon of virtual tourism in Habbo virtual world. We perceive British teenagers as defining themselves as global citizens: they form a proud national core identity, are familiar with multi-national or international identities, and are interested in travelling and exploration. In real-life, this ‘glocal’ youth is held back by age, money and opportunity; virtual travelling offers them a way to new experiences. A local campaign in Habbo UK was designed during late 2008 for the predominantly British Habbo UK user to create virtual spaces for their peers to travel virtually within. The result was a thoughtfully executed representation of a local virtual community’s idea of separate real life scenes in different countries; the success of the campaign showed the users’ wish for travel and the desire to express national identity.
    [Show full text]
  • 'Revelations: the 11 Years of Taivas'
    Where else? “The world’s biggest hotel has its headquarters right in the centre of Helsinki.” Timo Soininen, CEO, Sulake Corporation “Sulake’s thing is community-based entertain- ment. People are the best entertainment.” Step inside, and just believe it: Habbo Hotel has either to just bump into random strangers on the unless there are other people there. The entire seven million visitors every month. street and start talking to them. service rests on a fundamental human need, the At Habbo’s headquarters, a rather impressive And it makes no sense – or at least it’s not easy need to be sociable. It’s not a need created by the turn-of-the-century granite fortress of a building, – to look for someone with the same taste in Web, but it hasn’t gone away either. Sulake’s guests are received at an oddly curving front desk music on an American community website with thing is community-based entertainment. People in electric-blue plastic. And then greeted by Timo 274,000 groups based around music. And even if are the best entertainment,” Soininen says. Soininen who appears on the run. your interests are slightly more esoteric, such as Although the dinosaurs are tottering, this is just Soininen is head of the Sulake Corporation, history or science, that still leaves 8,200 groups. the beginning. That is what Soininen believes. which accounts for a good one-fifth of the Taivas Sulake’s business idea draws its power from “It’s astounding what amazing things people Innovations investment portfolio. Its most the vastness of the Internet and its unbridled can come up with.” important product is Habbo, a virtual world in growth.
    [Show full text]
  • Griffiths, Marie, & Light, Ben
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Griffiths, Marie & Light, Ben (2008) Social networking and digital gaming media convergence : Classification and its consequences for appropriation. Information Systems Frontiers, 10(4), pp. 447-459. This file was downloaded from: https://eprints.qut.edu.au/75712/ c Copyright 2008 Springer, Part of Springer Science+Business Me- dia. This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/s10796-008-9105-4 Griffiths, Marie, & Light, Ben. (2008). Social networking and digital gaming media convergence: Classification and its consequences for appropriation.
    [Show full text]
  • Governing the Ungovernable?
    Virtual Spaces & Virtual Layers – Governing the Ungovernable? Online multi-user platforms like World of Warcraft and Twitter have one common regulatory mechanism; the End User License Agreement. This document forms the cornerstone of the regulatory system within each of these spaces. Yet it is regularly contravened by users and providers alike. These agreements are very often the only forms of control or regulation that are present in online environments and therefore control more than user behaviour. Yet these platforms also share another feature: virtual disputes, but these are no longer confined online. Threats of violence and other criminal offences arise too, with examples including the abuse issued to Criado-Perez, and more recently, Flipovic. Criado-Perez suffered Twitter abuse and Flipovic was victimised on online message boards. Cyberspace was once deemed to be free from governmental control but the increasing disputes suggest there is now a need to consider how users of spaces such as online games, virtual worlds and social media are protected. Is it fair and practical to leave regulation to EULAs? How do users achieve redress for wrongs – through online and in-site governance mechanisms or wider controls? This work will consider some of these issues, and will suggest that there is now a need for additional layers of regulation to fill the ‘responsibility gap’ left between EULAs and the offline legal mechanisms. Introduction Virtual worlds, online social media sites, virtual communities and even MMORPGs1 have had a chequered past, experiencing exponential growth in user numbers and subscriber bases. Facebook has truly global reach, with an estimated 1.23 billion worldwide users engaging with, or using the site regularly.
    [Show full text]
  • Of Habbo Hotel
    An Interdisciplinary Journal on Humans in ICT Environments ISSN: 1795-6889 www.humantechnology.jyu.fi Volume 3 (2), May 2007, 127–153 UNSCRAMBLING THE “AVERAGE USER” OF HABBO HOTEL Mikael Johnson Helsinki Institute for Information Technology Helsinki University of Technology and University of Helsinki Finland Abstract: The “user” is an ambiguous concept in human-computer interaction and information systems. Analyses of users as social actors, participants, or configured users delineate approaches to studying design-use relationships. Here, a developer’s reference to a figure of speech, termed the “average user,” is contrasted with design guidelines. The aim is to create an understanding about categorization practices in design through a case study about the virtual community, Habbo Hotel. A qualitative analysis highlighted not only the meaning of the “average user,” but also the work that both the developer and the category contribute to this meaning. The average user a) represents the unknown, b) influences the boundaries of the target user groups, c) legitimizes the designer to disregard marginal user feedback, and d) keeps the design space open, thus allowing for creativity. The analysis shows how design and use are intertwined and highlights the developers’ role in governing different users’ interests. Keywords: design-use relationships, user, designer, categorization practices. INTRODUCTION Designers and users are commonly treated as trivial roles in research on design processes, but the question, “Who are the users?” is far from trivial. Take, for instance, the case in this paper, the on-line chat and game environment Habbo Hotel. Should the users be defined as the Internet surfers who visit the hotel at least once a month? This is the designation of users when discussing popular Web site statistics.
    [Show full text]