Die Reterritorialisierung Des Digitalen Als Reaktionsweise Zeitgenössischer Demokratien Auf Den Plan

Total Page:16

File Type:pdf, Size:1020Kb

Die Reterritorialisierung Des Digitalen Als Reaktionsweise Zeitgenössischer Demokratien Auf Den Plan In Reaktion auf die Enthüllungen Edward Snowdens und die dadurch aktualisierte Krise der Privatheit tritt die Reterritorialisierung des Digitalen als Reaktionsweise zeitgenössischer Demokratien auf den Plan. Verwerfungen im Zuge zunehmend globalisierter Datenströme sollen nach altbekanntem Muster der territorialen und nationalen Containergesellschaften gekittet werden. Reterritorialisierung adres- siert dabei einen digital induzierten Wandel und versucht, Antworten zu geben auf Fragen der gegenwärtigen Neukonfiguration des Ver- hältnisses von Demokratie und Gesellschaft. Die Kartografie der dynamischen Arena um das umstrittene Konzept Privatheit liefert empirische Erkenntnisse zu einem der meistdiskutierten sozialen Ordnungsmechanismen und zeigt, wie die politische Suche nach Lösungen angesichts der tektonischen Veschiebungen der Digitali- sierung mit bestehenden Institutionen, Routinen und Ressourcen Die Reterritorialisierung des Digitalen Die Reterritorialisierung verbunden bleibt. Die Publikation präsentiert Ergebnisse des BMBF-Projektes “Kartografie und Analyse der Privacy-Arena”, an dem die Disziplinen Soziologie, Rechtswissenschaft und Philosophie/ Ethik beteiligt sind. Die Reterritorialisierung des Digitalen Zur Reaktion nationaler Demokratie auf die Krise der Barbara Büttner, Christian L. Geminn, Thilo Hagendorff, Jörn Lamla, Simon Ledder, Carsten Ochs, Fabian Pittroff Privatheit nach Snowden Barbara Büttner, Christian L. Geminn, Thilo Hagendorff, Jörn Lamla, Simon Ledder, Carsten Ochs, Fabian Pittroff ISBN 978-3-86219-106-2 9 783862 191062 Barbara Büttner, Christian L. Geminn, Thilo Hagendorff, Jörn Lamla, Simon Ledder, Carsten Ochs, Fabian Pittroff Die Reterritorialisierung des Digitalen Zur Reaktion nationaler Demokratie auf die Krise der Privatheit nach Snowden kassel university press Das dieser Publikation zugrundeliegende Vorhaben wurde mit Mitteln des Bundesministeriums für Bildung und Forschung unter dem Förderkennzeichen 16KIS0096K gefördert. Die Verantwortung für den Inhalt der Veröffentlichung liegt bei den Autoren. Bibliografische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografie; detaillierte bibliografische Daten sind im Internet über http://dnb.dnb.de abrufbar. ISBN 978-3-86219-106-2 (print) ISBN 978-3-86219-107-9 (e-book) DOI: http://dx.medra.org/10.19211/KUP9783862191079 URN: http://nbn-resolving.de/urn:nbn:de:0002-31078 © 2016, kassel university press GmbH, Kassel www.upress.uni-kassel.de Printed in Germany Inhalt 1 Einleitung 4 2 Kartografie als Methode 11 2.1 Strauss‘ Theorie sozialer Welten und Arenen 11 2.2 Das Konzept der Kartografie in der Forschungsliteratur 13 2.3 Mapping sozialer Welten und Arenen nach Clarke als Visualisierungsstrategie 17 2.4 Das Arena-Segment des nationalen Routings 20 3 Routing und die Arena seiner Aushandlung 23 3.1 Schengen- bzw. nationales Routing als umkämpfter Lösungsvorschlag 23 3.2 Die beteiligten sozialen Welten und die Arena ihrer Aushandlungen 27 3.3 Argumente und Bewertungen in der Arena 36 3.4 Recht als Ressource in der Arena 60 3.5 Privatheit in den Diskursen der Arena 76 4 Begriffliche und theoretische Hintergründe 93 4.1 Privatheit – Ideengeschichte und theoretische Zugänge 93 4.2 Der Begriff der Privatsphäre in der Rechtswissenschaft 111 4.3 Vertrauen ins Netz 127 4.4 Vertrauen in der Arena 135 5 Reterritorialisierung und Privatheit 139 5.1 Zugriffsweisen auf den Wert der Privatheit 139 5.2 Die Verlaufskurve des nationalen Routings und die Reproduktion der Container-Gesellschaft 145 6 Schluss: Demokratische Alternativen der Reterritorialisierung 153 7 Literaturverzeichnis 160 1 Einleitung Jörn Lamla Die vorliegende Gemeinschaftsarbeit präsentiert den methodischen und theoretischen Forschungsansatz sowie Hypothesen und Ergeb- nisse aus der Explorationsphase eines BMBF-Verbundprojektes zur „Kartografie und Analyse der Privacy-Arena“.1 An diesem Projekt sind die Disziplinen Soziologie (unter der Leitung von Jörn Lamla und Cars- ten Ochs, Universität Kassel), Rechtswissenschaft (unter der Leitung von Alexander Roßnagel und Silke Jandt, Universität Kassel) und Phi- losophie/Ethik (unter der Leitung von Regina Ammicht Quinn und Jessica Heesen, Universität Tübingen) beteiligt. Die zentrale Idee des Projektes besteht darin, Privatheit als umstrittenes Konzept nicht wissenschaftlich definieren zu wollen, sondern den Streit darum zum Ausgangspunkt der Analyse zu nehmen. Methodisch schließt es an soziologische Ansätze an, die sich dem Nachzeichnen komplexer Kon- fliktlandschaften und ihrer Wandlungsdynamik verschrieben haben. Hierzu zählen Ansätze des „Mapping of Controversies“, die aus den Science & Technology-Studies und der Akteur-Netzwerk-Theorie her- vorgegangen sind, sowie die Mapping-Verfahren der Situationsanaly- se von Adele Clarke (2012). Letztere greift auf die Theorie der Sozialen Welten und Arenen zurück, die Anselm Strauss (1978, 1993; vgl. Strü- bing 2007) entwickelt hat, um dem dynamischen Strukturwandel und der „Wissensorganisation in modernen Komplexgesellschaften“ (Schütze 2002) Rechnung zu tragen. Im Sinne dieses Ansatzes wird hier angenommen, dass sich auch um die Streitsache Privatheit eine komplexe Arena gebildet hat und dynamisch entwickelt, die durch eine Pluralität sozialer Welten konstituiert und vorangetrieben wird. Gegenwärtig kommt diese Arena insbesondere durch die Herausfor- 1 Aus Gründen der sprachlichen Vereinheitlichung und Vereinfachung wurde auf ein Gendern verzichtet und nur die männliche Form verwendet. In der Regel sind alle Geschlechter angesprochen. 4 derungen der Digitalisierung stark in Bewegung und evoziert einen Strudel von Argumenten und Positionierungen seitens der Beteiligten und Betroffenen. Angesichts der Offenheit dieser Situation ist es für die interdisziplinäre Forschung zentral, die Figuration der Arena de- tailliert in den Blick zu nehmen, um tragfähige Hypothesen zu den sozialen, technischen, rechtlichen, politischen und ethischen Ver- schiebungen zu generieren, die mit dem gegenwärtigen Wandel der Privatheit im Zuge der Digitalisierung verknüpft sind. Im Sinne der Grounded Theory hat sich der Projektverbund für einen spiralförmigen Forschungsprozess entschieden, um nach und nach zu generalisierenden Aussagen über die Privacy-Arena zu gelangen. Im Sinne dieses Vorgehens musste ein geeigneter und überschauba- rer Zugang zum Issue Privatheit identifiziert werden. Daher stand am Anfang der nachfolgenden Exploration die forschungspragmatische Entscheidung, mit der Analyse einer spezifischen und überschauba- ren Debatte in die Situationsanalyse einzusteigen. Ausgewählt wurde dafür die Kontroverse um nationales Routing, das in Reaktion auf die Enthüllungen Edward Snowdens und die dadurch aktualisierte Krise der Privatheit als Lösungsvorschlag ins Spiel gebracht wurde. Die Auswertung dieses empirischen Falles führte zu der Hypothese, dass sich im Vorschlag des nationalen Routings Bestrebungen zu einer Reterritorialisierung des Digitalen manifestieren, die mit Berufung auf den Wert der Privatheit und das (keineswegs deckungsgleiche) Recht auf informationelle Selbstbestimmung gerechtfertigt werden. Unklar und empirisch zu ermitteln ist dabei, wie diese Ausrichtung der Pri- vacy-Politik motiviert ist: Resultiert sie aus vertieften Auseinanderset- zungen mit den Problemen des Privatheitsschutzes im digitalen Zeit- alter oder wiederholt sie nur die Routinen und Präferenzen etablier- ter sozialer Welten und politischer Traditionen? Der Verlauf der Aus- einandersetzungen zeigt zwar, dass sich der Vorschlag eines nationa- len oder europäischen Routings in der Arena nicht durchsetzen konn- te und vorerst gescheitert ist, aber auch hierfür sind die Gründe nicht offensichtlich. Dieses Scheitern bedeutet jedenfalls nicht, dass auch die mit dem Vorschlag verbundene Logik der Reterritorialisierung 5 digitaler Netze und Kommunikationsströme vom Tisch ist. Die Analy- se des Aushandlungsprozesses zum Vorschlag des nationalen Rou- tings hat vielmehr zu allgemeineren Fragen und Hypothesen darüber geführt. Wie ist die Suche nach Antworten auf die Krise der Privatheit angesichts der Digitalisierung verbunden mit den bestehenden Insti- tutionen, Routinen und Ressourcen des Rechts, der Staatlichkeit und der Demokratie? Welche Folgen werden die Reaktionen auf diese Krise für die Privatheit und das Verständnis von Freiheit und Selbst- bestimmung zeitigen? An dieser Stelle verschmilzt der wörtliche geopolitische Gehalt des Reterritorialisierungsbegriffs mit seiner abstrakteren metaphorischen Verwendungsweise in Philosophie und Sozialtheorie. Er bahnt einen Weg von den Niederungen der Router-Technologie und der nationa- len Rechtsauslegungen des Telekommunikationsgeheimnisses hin zu Fragen der digitalen Neukonfiguration des Verhältnisses von Demo- kratie und Gesellschaft oder der Zukunft des Grundrechts auf infor- mationelle Selbstbestimmung. Ausgehend vom Vorschlag des natio- nalen Routings meint Reterritorialisierung zunächst nicht viel mehr als den Versuch, problematischen Folgen der Digitalisierung mit einer Begrenzung digitaler Datenströme auf territorial bestimmte Rechts- räume zu begegnen. Während solche Rechtsräume derzeit laufend unkontrolliert überschritten und missachtet würden, sollen die Da- tenflüsse stattdessen an staatliche Grenzen zurückgebunden werden; entweder durch gesetzliche Vorschriften (etwa im Rahmen von Be- hördenkommunikation) oder durch die Bereitstellung infrastrukturel- ler Möglichkeiten und deren freiwillige Nutzung
Recommended publications
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • Cross-Border Data Transfers Between the EU and the US
    Santa Clara Journal of International Law Volume 19 Issue 2 Article 1 5-1-2021 Cross-Border Data Transfers Between the EU and the U.S.: A Transatlantic Dispute Jiménez-Gómez, Briseida Sofía Follow this and additional works at: https://digitalcommons.law.scu.edu/scujil Part of the International Law Commons Recommended Citation Jiménez-Gómez, Briseida Sofía, Cross-Border Data Transfers Between the EU and the U.S.: A Transatlantic Dispute, 19 SANTA CLARA J. INT'L L. 1 (2021). Available at: https://digitalcommons.law.scu.edu/scujil/vol19/iss2/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara Journal of International Law by an authorized editor of Santa Clara Law Digital Commons. For more information, please contact [email protected]. 2021 Santa Clara Journal of International Law 19:2 Cross-Border Data Transfers Between the EU and the U.S.: A Transatlantic Dispute By: Briseida Sofía Jiménez-Gómez* This article deals with the clash between the European and American approach to transborder data flows. In the last decades, the discourse has been that the U.S. offers a market-dominated approach while the EU was embedded in a right-dominated policy. General Data Protection Regulation (GDPR) restricts data transfers outside the EU. An analysis of the meaning of the level of adequate protection of a non-EU country is necessary to transfer data beyond the EU. The Court of Justice of the European Union has invalidated the Privacy Shield agreement to transfer commercial data from the European Union to the United States, leaving transatlantic data transfers in a current predicament.
    [Show full text]
  • THE PRIVACY ACT of 1974 (As Amended) Public Law 93-579
    THE PRIVACY ACT OF 1974 (As Amended) Public Law 93-579, as codified at 5 U.S.C. 552a Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, that this Act may be cited as the "Privacy Act of 1974." SECTION 2 (a) The Congress finds that – (1) the privacy of an individual is directly affected by the collection, maintenance, use, and dissemination of personal information by Federal agencies; (2) the increasing use of computers and sophisticated information technology, while essential to the efficient operations of the Government, has greatly magnified the harm to individual privacy that can occur from any collection, maintenance, use, or dissemination of personal information; (3) the opportunities for an individual to secure employment, insurance, and credit, and his right to due process, and other legal protections are endangered by the misuse of certain information systems; (4) the right to privacy is a personal and fundamental right protected by the Constitution of the United States; and (5) in order to protect the privacy of individuals identified in information systems maintained by Federal agencies, it is necessary and proper for the Congress to regulate the collection, maintenance, use, and dissemination of information by such agencies. (b) The purpose of this Act is to provide certain safeguards for an individual against an invasion of personal privacy by requiring Federal agencies, except as otherwise provided by law, to -- (1) permit an individual to determine what records
    [Show full text]
  • A Citizen's Guide on Using the Freedom of Information
    1 Union Calendar No. 127 109TH CONGRESS "!REPORT 1st Session HOUSE OF REPRESENTATIVES 109–226 A CITIZEN’S GUIDE ON USING THE FREEDOM OF INFORMATION ACT AND THE PRIVACY ACT OF 1974 TO REQUEST GOVERNMENT RECORDS SECOND REPORT BY THE COMMITTEE ON GOVERNMENT REFORM Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html http://www.house.gov/reform SEPTEMBER 20, 2005.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 21–892 PDF WASHINGTON : 2005 VerDate 11-MAY-2000 14:44 Sep 20, 2005 Jkt 000000 PO 00000 Frm 00001 Fmt 4012 Sfmt 4012 D:\DOCS\21892.TXT HGOVREF1 PsN: HGOVREF1 COMMITTEE ON GOVERNMENT REFORM TOM DAVIS, Virginia, Chairman CHRISTOPHER SHAYS, Connecticut HENRY A. WAXMAN, California DAN BURTON, Indiana TOM LANTOS, California ILEANA ROS-LEHTINEN, Florida MAJOR R. OWENS, New York JOHN M. MCHUGH, New York EDOLPHUS TOWNS, New York JOHN L. MICA, Florida PAUL E. KANJORSKI, Pennsylvania GIL GUTKNECHT, Minnesota CAROLYN B. MALONEY, New York MARK E. SOUDER, Indiana ELIJAH E. CUMMINGS, Maryland STEVEN C. LATOURETTE, Ohio DENNIS J. KUCINICH, Ohio TODD RUSSELL PLATTS, Pennsylvania DANNY K. DAVIS, Illinois CHRIS CANNON, Utah WM. LACY CLAY, Missouri JOHN J. DUNCAN, JR., Tennessee DIANE E. WATSON, California CANDICE S. MILLER, Michigan STEPHEN F. LYNCH, Massachusetts MICHAEL R. TURNER, Ohio CHRIS VAN HOLLEN, Maryland DARRELL E. ISSA, California LINDA T. SANCHEZ, California GINNY BROWN-WAITE, Florida C.A. DUTCH RUPPERSBERGER, Maryland JON C. PORTER, Nevada BRIAN HIGGINS, New York KENNY MARCHANT, Texas ELEANOR HOLMES NORTON, District of LYNN A.
    [Show full text]
  • Key Issues Guidance
    Version 1.0 i February 11, 2008 Table of Contents Guidance Papers Outline..................................................................................................... ii Note on ISE Privacy and Civil Liberties Implementation Guidance.................................. ii A. REDRESS............................................................................................................ A1-A8 GUIDANCE.................................................................................................................. 1 BACKGROUND AND COMMENTARY................................................................ A3 RESOURCES AND TOOLS..................................................................................... A7 B. NOTICE MECHANISMS ....................................................................................B1-B9 GUIDANCE................................................................................................................B1 BACKGROUND AND COMMENTARY.................................................................B4 RESOURCES AND TOOLS......................................................................................B9 C. DATA QUALITY...............................................................................................C1-C12 GUIDANCE................................................................................................................C1 BACKGROUND AND COMMENTARY.................................................................C4 RESOURCES AND TOOLS....................................................................................C12
    [Show full text]
  • Transatlantic Privacy Regulation: Conflict and Cooperation
    GW Law Faculty Publications & Other Works Faculty Scholarship 2015 Transatlantic Privacy Regulation: Conflict and Cooperation Francesca Bignami George Washington University Law School, [email protected] Giorgio Resta Università degli Studi di Roma Tre, Law Department Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Bignami, Francesca, Transatlantic Privacy Regulation: Conflict and Cooperation (2015). Law and Contemporary Problems, Vol. 78 (Fall 2015); GWU Law School Public Law Research Paper No. 2015-52; GWU Legal Studies Research Paper No. 2015-52. Available at SSRN: http://ssrn.com/abstract=2705601 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. TRANSATLANTIC PRIVACY REGULATION: CONFLICT AND COOPERATION FRANCESCA BIGNAMI* GIORGIO RESTA** I INTRODUCTION Regulatory differences in the data privacy arena have been a recurring source of contention in transatlantic trade relations. In the 1990s, the focus was primarily on differences in the rules governing market actors. Over the past decade, however, the focus has expanded to include the public sector and the policies regulating the collection and use of personal data by government actors, particularly national security agencies. This article surveys the considerable history of transatlantic relations in the privacy area and the attempts that have been made to reconcile legal and policy differences in the interest of trade liberalization and police and national security cooperation.
    [Show full text]
  • The Value of Privacy Federalism by Paul M
    09/24/14 (consolidated 3) The Value of Privacy Federalism By Paul M. Schwartz I. Introduction The United States features a dual system of federal and state sectoral law. In the absence of an omnibus privacy statute, the key question is how these laws interact with each other. When Congress enacts privacy law, it generally allows the states space for further action. The federal lawmaker typically does so through laws that set only a floor, that is, a minimum of safeguards, but that allow the states to exceed their privacy protections. This model has involved a wide range of institutional actors in the regulation of privacy. State legislatures and courts interpret state laws. Congress acts to preempt state law in enacting sectoral legislation, as needed, and federal judges interpret state legislation, including subsequent amendments to existing state law or new laws, to decide if they conflict with federal law. This existing U.S model is under pressure, however, because the federal government is largely inactive. The risk is that a new generation of state privacy legislation, such as breach notification laws, will not be consolidated and improved through the federal legislative process. Gridlock in Washington, D.C. has suspended the normal process of privacy federalism. In the European Union, the situation is different. At present, the Data Protection Directive requires Member States to enact legislation that is “harmonized” around its rules for information privacy. In the resulting legal system, the focus remains on the Member States, which are left with a “margin for maneuver” that permits national differences in the resulting statutes.
    [Show full text]
  • Overview of the Privacy Act of 1974 Table of Contents
    OVERVIEW OF THE PRIVACY ACT OF 1974 TABLE OF CONTENTS INTRODUCTION................................................................................................ 1 LEGISLATIVE HISTORY .................................................................................. 1 ROLE OF THE PRIVACY PROTECTION STUDY COMMISSION ................ 1 ROLE OF THE OFFICE OF MANAGEMENT AND BUDGET ....................... 2 COMPUTER MATCHING.................................................................................. 3 POLICY OBJECTIVES ....................................................................................... 4 DEFINITIONS ..................................................................................................... 4 A. Agency ................................................................................................... 4 B. Individual ............................................................................................. 14 C. Maintain ............................................................................................... 17 D. Record .................................................................................................. 17 E. System of Records ............................................................................... 28 1) Disclosure: Subsection (b) ........................................................... 34 2) Access and Amendment: Subsections (d)(1) and (d)(2) .............. 46 3) Other Aspects................................................................................ 48 CONDITIONS
    [Show full text]
  • The Pii Problem: Privacy and a New Concept of Personally Identifiable Information
    \\jciprod01\productn\N\NYU\86-6\NYU603.txt unknown Seq: 1 28-NOV-11 15:01 THE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION PAUL M. SCHWARTZ† & DANIEL J. SOLOVE‡ Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved. The basic assumption behind the applicable laws is that if PII is not involved, then there can be no privacy harm. At the same time, there is no uniform definition of PII in information privacy law. Moreover, computer science has shown that in many circumstances non-PII can be linked to individuals, and that de-identified data can be re-identified. PII and non-PII are thus not immutable categories, and there is a risk that information deemed non-PII at one time can be transformed into PII at a later juncture. Due to the malleable nature of what consti- tutes PII, some commentators have even suggested that PII be abandoned as the mechanism by which to define the boundaries of privacy law. In this Article, we argue that although the current approaches to PII are flawed, the concept of PII should not be abandoned. We develop a new approach called “PII 2.0,” which accounts for PII’s malleability. Based upon a standard rather than a rule, PII 2.0 utilizes a continuum of risk of identification. PII 2.0 regulates informa- tion that relates to either an “identified” or “identifiable” individual, and it estab- lishes different requirements for each category.
    [Show full text]
  • Data Protection and the Right to Privacy in the United States and West Germany [Note] [Comment]
    Data Protection and the Right to Privacy in the United States and West Germany [Note] [Comment] Item Type Article; text Authors Daniel-Paczosa, Angela Citation 1987 Ariz. J. Int'l Comp. L. 154 (1987) Publisher The University of Arizona James E. Rogers College of Law (Tucson, AZ) Journal Arizona Journal of International and Comparative Law Rights Copyright © The Author(s) Download date 28/09/2021 20:20:21 Item License http://rightsstatements.org/vocab/InC/1.0/ Version Final published version Link to Item http://hdl.handle.net/10150/659552 DATA PROTECTION AND THE RIGHT TO PRIVACY IN THE UNITED STATES AND WEST GERMANY INTRODUCTION The increasing use of computers in contemporary society has produced numerous threats to human rights. Computer data banks provide a vast amount of personal information, to governmental bodies and private firms. Consequently, a need has developed for protecting not only the accuracy but also the confidentiality of such personal data.2 The present article examines and compares the developments that have taken place regarding data protection in West Germany and the United States. West Germany's experience may help the United States to further develop its present system. A SHORT HISTORY In the United States, the individual's interest in privacy first became recognized as a constitutional principle4 in Griswold v. Connecticut.5 Griswold expanded on earlier due process and equal protection 'Trubow defines personal information as follows: Personal information is any information that identifiably refers to an individual by name, number, or any other identifying characteristic. Information is personal not because of its content but because of its reference.
    [Show full text]
  • The Privacy Act of 1974 5 U.S.C. § 552A (2012)
    U.S. Department of Justice Office of Privacy and Civil Liberties OVERVIEW OF THE PRIVACY ACT The Privacy Act of 1974 5 U.S.C. § 552a (2012) [315] U.S. Department of Justice Office of Privacy and Civil Liberties OVERVIEW OF THE PRIVACY ACT [316] U.S. Department of Justice Office of Privacy and Civil Liberties THE PRIVACY ACT OF 1974 5 U.S.C. § 552a As Amended § 552a. Records maintained on individuals (a) Definitions For purposes of this section— (1) the term “agency” means agency as defined in section 552(e) of this title; (2) the term “individual” means a citizen of the United States or an alien lawfully admitted for permanent residence; (3) the term “maintain” includes maintain, collect, use, or disseminate; (4) the term “record” means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph; (5) the term “system of records” means a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual; (6) the term “statistical record” means a record in a system of records maintained for statistical research or reporting purposes only and not used in whole or
    [Show full text]
  • A Brief History of Information Privacy Law
    GW Law Faculty Publications & Other Works Faculty Scholarship 2006 A Brief History of Information Privacy Law Daniel J. Solove George Washington University Law School, [email protected] Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Daniel J. Solove, A Brief History of Information Privacy Law in PROSKAUER ON PRIVACY, PLI (2006). This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. WHOLEBOOK.book Page 1 Monday, October 16, 2006 3:50 PM Chapter 1 A Brief History of Information Privacy Law Daniel J. Solove* George Washington University Law School §1:1 Introduction §1:2 Colonial America §1:3 The Nineteenth Century §1:3.1 New Threats to Privacy [A] The Census and Government Records [B] The Mail [C] Telegraph Communications §1:3.2 The Fourth and Fifth Amendments §1:3.3 Privacy of the Body §1:3.4 Warren and Brandeis’s the Right to Privacy §1:4 The Twentieth Century §1:4.1 1900 to 1960 [A] Warren and Brandeis’s Privacy Torts [A][1] Early Recognition [A][2] William Prosser and the Restatement [A][2][a] Intrusion upon Seclusion *I would like to thank Paul Schwartz for his comments on this chapter and John Spaccarotella for his research assistance. More extensive information about the topics discussed in this article can be found in DANIEL J.
    [Show full text]