Anonymity and Encryption in Digital Communications, February 2015

Total Page:16

File Type:pdf, Size:1020Kb

Anonymity and Encryption in Digital Communications, February 2015 Submission to the UN Special Rapporteur on freedom of expression – anonymity and encryption in digital communications, February 201 1! Introduction Privacy International submits this information for the Special Rapporteur's report on the use of encryption and anonymity in digital communications. Anonymity and the use of encryption in digital communications engage both the right to freedom of expression and right to privacy very closely: anonymity and encryption protects privacy, and ithout effective protection of the right to privacy, the right of individuals to communicate anonymously and ithout fear of their communications being unla fully detected cannot be guaranteed. As noted by the previous mandate holder, !rank #aRue, $the right to privacy is essential for individuals to express themselves freely. Indeed, throughout history, people%s illingness to engage in debate on controversial sub&ects in the public sphere has al ays been linked to possibilities for doing so anonymously.'( Individuals' right to privacy extends to their digital communications.) As much as they offer ne opportunities to freely communicate, the proliferation of digital communications have signi*cantly increased the capacity of states, companies and other non+state actors to interfere ith individual's privacy and free expression. Such interference ranges from mass surveillance of communications by state intelligence agencies, to systematic collection and storage of private information by internet and telecommunication companies, to cybercrime. Anonymity and encryption are essential tools available to individuals to mitigate or avert interferences ith their rights to privacy and free expression. In this ay, they are means of individuals exercising to the fullest degree their rights hen engaging in digital communications. Anonymity has long been a means by hich individuals could freely en&oy their right to impart and receive information, free from State control. ,he use of pseudonyms, nom de plumes and pen names to conceal an author's identity has been common 1 -. /oc. A01R20(30)3, (4 5ay )6((. 2 7oth the -. 8eneral Assembly and the -. 1uman Rights 2ouncil have consistently af*rmed that the same rights that people have 'of9ine' must also be protected 'online', including the right to privacy :-. 8eneral Assembly resolution on the right to privacy in the digital age, (; /ecember )6(<= resolution 4;0(43 of (; /ecember )6(>= and 1uman Rights 2ouncil resolution )40(> on the promotion, protection and en&oyment of human rights on the Internet, of )4 ?une )6(<.@ throughout history, and essential to the publication of orks that critiAue governments or po erful actors, or expose rongdoings. Indeed, the name of that famous author of dystopian *ction, George Br ell, as in fact a nom de plume. Pen names have also been an effective means by hich omen authors have been able to have their orks published and given eAual and unbiased attention. Anonymity can protect histleblo ers, sources and dissidents from exposure, and thus ensure they're able to communicate freely and in private. #ncryption tools and services are a means by hich individuals can protect their anonymity, as ell as the security and privacy of their communications. Cncryption, too, has long played a role in security the en&oyment of human rights. In fact, one of the earliest uses of encryption as by ?ulius Caesar, ho used a $cipher' to protect the transmission of information of military signi*cance. ,oday, encryption is used by every person ho uses a cell phone or a computer, and protect their personal details and communications from interference by cyber criminals, identity thieves, hackers, and States. ,he use of encryption is the only ay to ensure digital communications – ranging from online *nancial transactions to cell phone calls to emails + are protected from interference. ,he availability of anonymity and encryption must be seen as essential preconditions to the exercise of privacy and free expression. 1o ever, the right to privacy and to freedom of expression are not absolute rights. ,here are legitimate grounds under hich these rights can be limited. Restriction of these rights by States must be &usti*ed as a permissible limitation under international human rights legal standards, by reference to the overarching principles of legality, necessity and proportionality. ,his submission ill address the types of measures that restrict or eradicate the availability of anonymity and encryption, and the conditions that must exist for them to constitute permissible limitations of the rights. -nderpinning our submissions and reiterated throughout is the important reality that digital communications are inherently universal, and measures hich restrict their free, secure and private use ill have universal impacts. 7ecause of the ay that digital communications 9o across borders and around the orld, measures hich restrict the use of anonymity in one State cannot but impact the rights of individuals in another. CAually, the existence of targeted po ers to remove or defeat encryption in one State has implications for all individuals, and creates a chilling effect for people around the orld that is far greater than the sum of isolated instances in hich such po ers might be deployed. 2! General measures that limit or eradicate anonymity #a s that restrict anonymity of users on the internet or hen communicating through mobile phones are on the rise. According to the )6(< !reedom of the Internet report by !reedom 1ouse, (E out of the 4F countries studies passed ne legislation that increased surveillance or restricted internet anonymity in )6(<.> State measures to restrict anonymity are both in9uenced by and have a 9o on effect on the actions of private companies, hich are also increasingly limiting the use of anonymity or pseudonymity, and reAuiring the use of real names as a precondition to the use of particular services. Anecdotal evidence sho s that often the actions of private companies are a result of pressure from States to ensure companies are able to facilitate State surveillance of their users. 5andatory SI5 card registration States are increasingly passing la s hich reAuire telecommunications companies to reAuire the provision of State+issued identi*cation as a prereAuisite for the obtaining of SI5 cards, and thus accessing mobile communications. SI5 card registration la s are particularly prominent in Africa, here <E of the FF countries reAuire the mandatory registration of SI5 cards.< SI5 registration, in effect, eradicates the ability of mobile phone users to communicate anonymously and facilities mass surveillance, making tracking and monitoring of all users easier for la enforcement and security agencies. SI5 users' information can be shared ith government departments and matched ith other private and public databases, enabling the State to create comprehensive pro*les of individual citiGens. An individual's phone number could potentially be matched ith their voting preferences or health data, enabling governments to identify and target political opposition, for example, or people living ith 1IH0AI/s. ,he potential for misuse of such information, particularly in countries ith traditions of ethnic con9ict and in situations of political instability and unrest, is enormous. SI5 registration can also have discriminatory effects + the poorest individuals :many of hom already *nd themselves disadvantaged by or excluded from the spread of mobile technology) are often unable to buy or register SI5 cards because they do not have identi*cation documents. -ndocumented migrants are similarly disadvantaged. ,his could result in exclusion from numerous public services. In addition, given the additional burdens that SI5 registration places on telecommunication companies, this may result in additional costs being passed on to a customer. Importantly, the &usti*cations commonly given for SI5 registration – that it ill assist in reducing the abuse of telecommunications services for the purpose of criminal and fraudulent activity – are unfounded. SI5 registration has not been effective in curbing crime, and instead has fueled it: States hich have adopted SI5 card registration have seen the gro th of identity-related crime, and have itnessed black markets Auickly pop up to service those ishing to remain anonymous :for example, in Saudi Arabia@. SI5s can be illicitly cloned, or criminals can use foreign SI5s on roaming mode, or internet and satellite telephony, to circumvent SI5 registration reAuirements. 3 https://freedomhouse.org/sites/default0*les/FB,.I)6(<I!ull_Report_compressedv2I6.pdf 4 http:00*rstmonday.org/o&s/index.php/fm/article/vie 0<>F(0>;)6 7ecause of its ineffectiveness and exclusionary impacts, SI5 registration has been re&ected after consultation in Canada, 2Gech Republic, Greece, Ireland, the .etherlands and Poland. Real name registration In some States, the ability of individuals to communicate anonymously is undermined by real name registration la s, hich reAuire internet users to register ith their real name :often using a government+issued I/@ hen using certain internet services. Real name registration is an incredibly invasive policy as it is designed to facilitate the identi*cation of users and the policing of content for critical, libelous, defamatory or dissenting opinions and ideas. !or example, in the last fe eeks China has implemented real name registration policies that ill reAuire users of blogs, microblogs, instant+messaging services, online discussion forums and ne s services to register
Recommended publications
  • Anonymity in a Time of Surveillance
    LESSONS LEARNED TOO WELL: ANONYMITY IN A TIME OF SURVEILLANCE A. Michael Froomkin* It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator’s identity. But online anonymity—one of the two most important tools that protect online communicative freedom—is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names. This Article traces the global development of technologies and regulations hostile to online anonymity, beginning with the early days of the Internet. Offering normative and pragmatic arguments for why communicative anonymity is important, this Article argues that anonymity is the bedrock of online freedom, and it must be preserved. U.S. anti-anonymity policies not only enable repressive policies abroad but also place at risk the safety of anonymous communications that Americans may someday need. This Article, in addition to providing suggestions on how to save electronic anonymity, calls for proponents of anti- anonymity policies to provide stronger justifications for such policies and to consider alternatives less likely to destroy individual liberties. In
    [Show full text]
  • No. 16-3588 in the UNITED STATES COURT of APPEALS for THE
    Case: 16-3588 Document: 003112605572 Page: 1 Date Filed: 04/26/2017 No. 16-3588 IN THE UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT ______________________ UNITED STATES OF AMERICA, Appellee v. GABRIEL WERDENE, Appellant ______________________ On Appeal from the United States District Court for the Eastern District of Pennsylvania ______________________ BRIEF OF AMICUS CURIAE PRIVACY INTERNATIONAL IN SUPPORT OF APPELLANT AND IN SUPPORT OF REVERSAL OF THE DECISION BELOW ______________________ Of counsel: Caroline Wilson Palow* Lisa A. Mathewson Scarlet Kim* The Law Offices of PRIVACY INTERNATIONAL Lisa A. Mathewson, LLC 62 Britton Street 123 South Broad Street, Suite 810 London EC1M 5UY Philadelphia, PA 19109 Phone: +44 (0) 20 3422 4321 Phone: (215) 399-9592 [email protected] [email protected] Counsel for Amicus Curiae, *Counsel not admitted to Third Circuit Bar Privacy International Case: 16-3588 Document: 003112605572 Page: 2 Date Filed: 04/26/2017 CORPORATE DISCLOSURE STATEMENT Pursuant to Federal Rule of Appellate Procedure 26.1 and Local Appellate Rule 26.1.1, amicus curiae Privacy International certifies that it does not have a parent corporation and that no publicly held corporation owns 10% or more of its stock. i Case: 16-3588 Document: 003112605572 Page: 3 Date Filed: 04/26/2017 TABLE OF CONTENTS TABLE OF AUTHORITIES ................................................................................... iii STATEMENT OF INTEREST .................................................................................
    [Show full text]
  • Aiding Surveillance an Exploration of How Development and Humanitarian Aid Initiatives Are Enabling Surveillance in Developing Countries
    Privacy International Aiding Surveillance An exploration of how development and humanitarian aid initiatives are enabling surveillance in developing countries Gus Hosein and Carly Nyst 01 October 2013 www.privacyinternational.org Aiding Surveillance — Privacy International Contents Executive Summary 04 Section 1 Introduction 05 Section 2 Methodology 15 Section 3 Management Information Systems 17 and electronic transfers Section 4 Digital identity registration and biometrics 28 Section 5 Mobile phones and data 42 Section 6 Border surveillance and security 50 Section 7 Development at the expense of human rights? 56 The case for caution Endnotes 59 03/80 Aiding Surveillance — Privacy International Executive Summary Information technology transfer is increasingly a crucial element of development and humanitarian aid initiatives. Social protection programmes are incorporating digitised Management Information Systems and electronic transfers, registration and electoral systems are deploying biometric technologies, the proliferation of mobile phones is facilitating access to increased amounts of data, and technologies are being transferred to support security and rule of law efforts. Many of these programmes and technologies involve the surveillance of individuals, groups, and entire populations. The collection and use of personal information in these development and aid initiatives is without precedent, and subject to few legal safeguards. In this report we show that as development and humanitarian donors and agencies rush to adopt new technologies that facilitate surveillance, they may be creating and supporting systems that pose serious threats to individuals’ human rights, particularly their right to privacy. 04/80 Section 1 Aiding Surveillance — Privacy International Introduction 1.0 It is hard to imagine a current public policy arena that does not incorporate new technologies in some way, whether in the planning, development, deployment, or evaluation phases.
    [Show full text]
  • A Call from the Panopticon to the Judicial Chamber “Expect Privacy!”
    Journal of International Commercial Law and Technology Vol.1, Issue 2 (2006) A Call From the Panopticon to the Judicial Chamber “Expect Privacy!” Julia Alpert Gladstone Bryant University Smithfield, RI,USA Abstract Privacy is necessary in order for one to develop physically, mentally and affectively. Autonomy and self definition have been recognized by the United States Supreme Court as being values of privacy. In our technologically advanced, and fear driven society, however, our right to privacy has been severely eroded. Due to encroachment by government and business we have a diminished expectation of privacy. This article examines the detriments to self and society which result from a reduced sphere of privacy, as well as offering a modest suggestion for a method to reintroduce an improved conception of privacy into citizens’ lives. Keywords: Privacy, Technology, Judiciary, Autonomy, Statute INTRODUCTION Citizens often pay scant attention to their privacy rights until a consciousness raising event, such as the late 2005 exposure of the unauthorized wiretapping performed by the United States Executive Branch, heightens their interest and concern to protect previously dormant privacy rights. The scholarly literature on privacy is plentiful which broadly explains privacy as a liberty or property right, or a condition of inner awareness, and explanations of invasions of privacy are also relevant. This article seeks to explain why privacy remains under prioritized in most people’s lives, and yet, privacy is held as a critical, if not, fundamental right. Privacy is defined according to social constructs that evolve with time, but it is valued, differently. It is valued as a means to control one’s life.
    [Show full text]
  • The Right to Privacy in the Digital Age
    The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.
    [Show full text]
  • 13 Principles for a Human Rights Respecting State Surveillance Framework
    13 Principles for a Human Rights Respecting State Surveillance Framework Reporters Without Borders (RWB) joins the Association for Progressive Communications and more than 215 other organizations in calling for the adoption of the “International Principles on the Application of Human Rights to Communications Surveillance,” which were developed by Access, Electronic Frontier Foundation and Privacy International in consultation with a group of international experts. Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity, reinforces other rights, such as freedom of expression, information and association, and is recognised under national, regional and international human rights instruments. This Council recognized with A/HRC/RES/20/8 “the same rights that people have offline must also be protected online.” However, in recent years, many States have developed national legal frameworks and practices that exploit the capacities of new technologies to engage in mass surveillance. Those frameworks reflect a shift from surveillance of communications based on the rule of law (in particular legally authorised targeted surveillance based on clear criteria) to mass surveillance through untargeted collection of communications data of ordinary citizens where no lawful grounds for surveillance exists. These national legal frameworks often contain outmoded definitions of communications that purport to distinguish between the content of communication, versus data about the communication. Typically, the content of communications is strongly protected whereas non-content transactional data, traffic data, or “meta-data” is typically given much less protection, even though it can be just as revealing and have serious privacy implications. Activities that restrict the right to privacy, including communications surveillance, can only be justified when prescribed by law, are necessary to achieve a legitimate aim, and are proportionate to the aim pursued.
    [Show full text]
  • Privacy International, Human and Digital Rights Organizations, and International Legal Scholars As Amici Curiae in Support of Respondent
    No. 17-2 IN THE Supreme Court of the United States IN THE MdATTER OF A WARRANT TO SEARCH A CERTAIN EMAIL ACCOUNT CONTROLLED AND MAINTAINED BY MICROSOFT CORPORATION UNITED STATES OF AMERICA, Petitioner, —v.— MICROSOFT CORPORATION, Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT BRIEF OF PRIVACY INTERNATIONAL, HUMAN AND DIGITAL RIGHTS ORGANIZATIONS, AND INTERNATIONAL LEGAL SCHOLARS AS AMICI CURIAE IN SUPPORT OF RESPONDENT LAUREN GALLO WHITE BRIAN M. WILLEN RYAN T. O’HOLLAREN Counsel of Record WILSON, SONSINI, GOODRICH BASTIAAN G. SUURMOND & ROSATI, P.C. WILSON, SONSINI, GOODRICH One Market Plaza Spear Tower, & ROSATI, P.C. Suite 3300 1301 Avenue of the Americas, San Francisco, California 94105 40th Floor (415) 947-2000 New York, New York 10019 [email protected] (212) 999-5800 [email protected] [email protected] [email protected] Attorneys for Amici Curiae (Counsel continued on inside cover) CAROLINE WILSON PALOW SCARLET KIM PRIVACY INTERNATIONAL 62 Britton Street London, EC1M 5UY United Kingdom [email protected] [email protected] i QUESTION PRESENTED Whether construing the Stored Communications Act (“SCA”) to authorize the seizure of data stored outside the United States would conflict with foreign data-protection laws, including those of Ireland and the European Union, and whether these conflicts should be avoided by applying established canons of construction, including presumptions against extra- territoriality and in favor of international comity, which direct U.S. courts to construe statutes as applying only domestically and consistently with foreign laws, absent clear Congressional intent. ii TABLE OF CONTENTS PAGE QUESTION PRESENTED ..........................
    [Show full text]
  • Gender Perspectives on Privacy’
    September 2018 Privacy International’s submission on the consultation ‘Gender perspectives on privacy’ In response to the consultation on ‘Gender perspectives on Privacy’ by the UN Special Rapporteur on the right to privacy, Privacy International submit the following observations. The organisation is publishing in October 2018 a report on the topic, which it will share with the Rapporteur as soon as it is released. 1. What gender issues arise in the digital era in the Thematic Action Streams (Privacy and Personality; Security and Surveillance; Big Data and Open Data; Health Data, and the Use of Personal Data by Corporations)? What challenges need to be addressed and what positives can be promoted more widely? As a necessary condition to define boundaries, protect human dignity and enable autonomy, the right to privacy can be particularly important for women and queer persons, influencing most aspect of their lives, preventing them from being victims of discrimination, unwanted exposure, unlawful surveillance, and harassment, among other harms. A gender perspective is also necessary to address power imbalances in the exercise of the right to privacy, making sure that it does not become an excuse from providing proper redress when this right is affected. Within that context, we would like to draw your attention to particular issues and challenges that we believe should be addressed. Previous research on the topic, as well as our on-going research, document a reality in which traditional systems of oppression that are based on gender discrimination can find new manifestations in the information age. Of particular concern to us is the issue of online gender-based violence.
    [Show full text]
  • The Role of International Human Rights Law in the Protection of Online Privacy in the Age of Surveillance
    2017 9th International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or non-commercial Defending the Core purposes is granted providing that copies bear this notice and a full citation on the H. Rõigas, R. Jakschis, L. Lindström, T. Minárik (Eds.) first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. 2017 © NATO CCD COE Publications, Tallinn The Role of International Human Rights Law in the Protection of Online Privacy in the Age of Surveillance Eliza Watt Westminster Law School University of Westminster London, UK [email protected] Abstract: Whilst the political dust on mass surveillance is slowly settling down, what has become apparent is the uncertainty regarding the interpretation and application of the right to privacy norms under Article 17 of the International Covenant on Civil and Political Rights 1966 in the context of cyberspace. Despite the world-wide condemnation of these practices by, inter alia, the United Nations and international human rights organisations, little consensus has been reached on how to bring them in line with international human rights law. This paper proposes that the most pragmatic solution is updating Article 17 by replacing General Comment No.16. There are many issues that require attention. The paper focuses on two fundamental aspects of this process, namely the development of more detailed understanding of what is meant by the right to privacy in the 21st century, and the challenge posed by foreign cyber surveillance to the principle of extraterritorial application of human rights treaties.
    [Show full text]
  • 2017.10.20 PI Amicus Brief
    Case: 17-30117, 10/20/2017, ID: 10624905, DktEntry: 9, Page 1 of 35 No. 17-30117 IN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DAVID TIPPENS, Defendant-Appellant. On Appeal from the United States District Court for the Western District of Washington at Tacoma District Court BRIEF OF AMICUS CURIAE PRIVACY INTERNATIONAL IN SUPPORT OF DEFENDANT-APPELLANT AND REVERSAL Scarlet Kim Counsel for Amicus Curiae Privacy International 62 Britton Street London EC1M 5UY United Kingdom +44 (0) 20 3422 4321 Case: 17-30117, 10/20/2017, ID: 10624905, DktEntry: 9, Page 2 of 35 CORPORATE DISCLOSURE STATEMENT Pursuant to Federal Rules of Appellate Procedure 26.1 and 29(a)(4)(A), amicus curiae Privacy International certifies that it does not have a parent corporation and that no publicly held corporation owns 10% or more of its stock. i Case: 17-30117, 10/20/2017, ID: 10624905, DktEntry: 9, Page 3 of 35 TABLE OF CONTENTS TABLE OF AUTHORITIES .................................................................................. iii STATEMENT OF INTEREST ................................................................................. 1 INTRODUCTION .................................................................................................... 2 FACTUAL BACKGROUND ................................................................................... 4 I. The “Network Investigative Technique.” ......................................................... 4 A. The NIT uses an “exploit” and a “payload.” .................................................
    [Show full text]
  • Consumers Online: Your Rights to Privacy in Cyberspace Nancy Lazar
    Loyola Consumer Law Review Volume 10 | Issue 2 Article 3 1998 Consumers Online: Your Rights to Privacy in Cyberspace Nancy Lazar Follow this and additional works at: http://lawecommons.luc.edu/lclr Part of the Consumer Protection Law Commons Recommended Citation Nancy Lazar Consumers Online: Your Rights to Privacy in Cyberspace, 10 Loy. Consumer L. Rev. 117 (1998). Available at: http://lawecommons.luc.edu/lclr/vol10/iss2/3 This Recent Legislative Activity is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola Consumer Law Review by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. RECENT LEGISLATIVE by Nancy Lazar ACTIVITY Consumers Online: Your Right to Privacy in Cyberspace "According to some predictions, applied federal laws safeguarding consumer nearly one billion people will be privacy to commercial transactions in online in the next 10 years. If people cyberspace, the protection of consumer privacy are uncomfortable sending personal online is limited. For instance, although information over the Internet, the Congress amended the Electronic largest potential consumer market Communications Privacy Act of 1986, 18 will be closed to nearly every U.S.C. § 2510 - 2710 (1982 Supp. IV 1986) company in the world," according to ("Act"), to prevent Internet service providers Joseph L. Dionne, chairman and from releasing personal information of their CEO of The McGraw-Hill members to a government agency absent a legal Companies, a leading information request, the Act does not explicitly prohibit services provider. Internet service providers from distributing the members' private information to any individual A Business Week/Louis Harris & Associates or entity outside of government.
    [Show full text]
  • European General Data Protection Regulation (GDPR) and Fake News Policy in Slovakia
    European General Data Protection Regulation (GDPR) and Fake News Policy in Slovakia Europe has the toughest privacy laws in the world; one’s right to privacy is a fundamental right under European law. However, many corporations largely ignore it by using private information for their financial gain. This led to the application of General Data Protection Regulation (GDPR), which is a European privacy and security law. It had been put into effect on May 25, 2018. Viennese activist Max Schrems asserted the rights it gives people over the data that companies want to collect about them. It is valid in EU countries today. With the significant development of social media, we tend to give out personal information, sometimes without any hesitation. In terms of accessing the use of a significant social networking app, we give permission to collect data about ourselves that the companies keep. This can turn into a risk circle that some may or may not know about. These companies such as Google, Facebook, Instagram and many more act illegally by forcing users to accept intrusive terms of service, or lose access. According to this Max Schrems stated that there needs to be an option to make a choice. Therefore he filed all the complaints and started working on this big project dedicated to data protection. As it was slowly getting the attention of important authorities, Andrea Jelinek, who leads Austria’s and European Data Protection Board, expressed interest in Schrems´s idea. Jelinek very clearly stated: “If there is forced consent, there is no consent.” Max Schrems showed that a pop up message on Facebook gets the approval to use our data.
    [Show full text]