READING: LEE BYGRAVE, DATA PRIVACY LAW: an INTERNATIONAL PERSPECTIVE ("BYGRAVE)" (2014), Pages 3-8, 118-121, 123-135
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Reconciling Data Privacy and the First Amendment
RECONCILING DATA PRIVACY AND THE FIRST AMENDMENT Neil M. Richards This Article challenges the First Amendment critique of data privacy regulaion- the claim that data privacy rules restrict the dissemination of truthful information and thus violate the FirstAmendment. The critique, which is ascendant in privacy discourse, warps legislative and judicial processes and threatens the consti- tutionalization of information policy. The First Amendment critique should be rejected for three reasons. First, it mistakenly equates privacy regulation with speech regulation. Building on scholarship examining the boundaries of First Amendment protection, this Article suggests that "speech restrictions" in a wide variety of commercial contexts have never triggered heightened First Amendment scru- tiny, refuting the claim that all information flow regulations fall within the First Amendment. Second, the critique inaccurately describes current First Amendment doctrine. To demonstrate this point, this Article divides regulations of information flows into four analytic categories and demonstrates how, in each category, ordinary doctrinal tools can be used to uphold the constitutionality of consumer privacy rules. Third, the critique is normatively unpersuasive. Relying on recent intellectual histories of American constitutional law, this Article argues that fundamental jurisprudentialreasons counsel against acceptance of the First Amendment critique. From the perspective of privacy law, there are striking parallels between the critique's advocacy of "freedom of information" and the discredited "freedom of contract" regime of Lochner. More importantly, from the perspective of First Amendment law, the critique threatens to obliterate the distinction between economic and political rights at the core of post-New Deal constitutionalism. Rejecting the FirstAmendment critique thus has real advantages. -
Canadian Privacy Law: the Personal Information Protection and Electronic Documents Act (PIPEDA)
International In-house Counsel Journal Vol. 2, No. 7, Spring 2009, 1135–1146 Canadian Privacy Law: The Personal Information Protection and Electronic Documents Act (PIPEDA) DOMINIC JAAR PATRICK E. ZELLER Legal Counsel Vice President & Deputy General Counsel Ledjit Consulting, Inc. Guidance Software, Inc. Canada United States This white paper provides a general overview of the Personal Information Protection and Electronic Documents Act (“PIPEDA”), and discusses both the privacy requirements imposed by that Act as well as the rules governing the use of electronic documents that it sets out. Overview Introduction to PIPEDA PIPEDA is the federal legislative response to growing concerns over the protection and use of personal information that is accumulated by both public and private organizations in the course of their day-to-day operations.1 The Act sets out rules governing how such information should be handled by the organizations that collect it, and under what circumstances it may be disclosed, either to third parties or to the individual who is the subject of the information. The Act contains two main parts. The first part sets out the rules governing the collection, retention and disclosure of personal information, as well as the remedies available in the event of a suspected breach. In essence, this part of the Act establishes a framework which attempts to balance the privacy rights of individuals with the needs of organizations to collect, use, and disclose personal information in the course of commercial activities. This part of the Act is discussed in sections I and II of this document. The second part of the Act describes the circumstances in which electronic alternatives may be used to fulfill legal obligations, which, under federal laws, require the use of paper documents to record or communicate information or transactions. -
Off the Grid: Pinpointing Location-Based Technologies and the Law
Off the Grid: Pinpointing Location-based Technologies and the Law Written By: Geoffrey White, Barrister & Solicitor External Counsel The Public Interest Advocacy Centre 1204 - ONE Nicholas St. Ottawa, Ontario K1N 7B7 June 2015 Copyright 2015 PIAC Contents may not be commercially reproduced. Any other reproduction with acknowledgment is encouraged. The Public Interest Advocacy Centre (PIAC) Suite 1204 ONE Nicholas Street Ottawa, ON K1N 7B7 Tel: (613) 562-4002 Fax: (613) 562-0007 E-mail: [email protected] Website: www.piac.ca Canadian Cataloguing and Publication Data ISBN 978-1-927707-03-6 Off the Grid? Pinpointing Location-Based Technologies and the Law Off the Grid? Pinpointing Location-Based Technologies and the Law Page 2 of 109 Acknowledgement Financial support from Industry Canada to conduct the research on which this report is based is gratefully acknowledged. The views expressed in this report are not necessarily those of Industry Canada or of the Government of Canada. The author would also like to thank Kent Sebastian, PIAC Student-at-Law 2014-15, Sarah Mavula, PIAC Summer Student 2014, and Jonathan Bishop, PIAC’s Research & Parliamentary Affairs Analyst, for their research and contributions. Any mistakes are solely the author’s. Off the Grid? Pinpointing Location-Based Technologies and the Law Page 3 of 109 Executive Summary Knowledge of the whereabouts of a person, and of a person’s movement patterns, can be very valuable, from a marketing perspective. Indeed, the scale and scope of the business opportunities associated with so-called location-based behavioural marketing and location- based services (collectively, location-based technologies) have been well-documented in the business literature. -
Bibliography
Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens, -
June 10, 2021 President Joseph R. Biden the White House 1600
June 10, 2021 President Joseph R. Biden The White House 1600 Pennsylvania Ave. NW Washington, DC 20500 Dear Mr. President: We, the undersigned civil rights, civil liberties, privacy, government accountability, and consumer rights organizations, urge your Administration to ensure that any new transatlantic data transfer deal is coupled with the enactment of U.S. laws that reform government surveillance practices and provide comprehensive privacy protections. The United States’ failure to ensure meaningful privacy protections for personal data is the reason that a growing number of countries are concerned about trans-border data flows. Until the United States addresses this problem, concerns about data transfers to the United States will remain, and data flow agreements are likely to be invalidated. Recent history demonstrates that any transatlantic data transfer agreement will be subject to litigation to determine whether it provides adequate protection for personal data. In 2015, the Court of Justice of the European Union invalidated the U.S.-EU Safe Harbor agreement. And in July 2020, the successor agreement, Privacy Shield, was also invalidated by the same court. Without reform of U.S. surveillance and privacy laws, any new transatlantic data transfer deal will likely face a similar fate. The only way to fully address these issues and enter into a lasting transatlantic agreement is to harmonize data protection standards between the European Union and the United States. There have been calls for the United States to strengthen and modernize its privacy laws since long before the European Union’s General Data Protection Regulation came into effect in 2018. The modern concept of the right to privacy was invented in the United States – but now we lag behind many other nations on privacy protections. -
Survey on Privacy Preserving in Social Networks
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391 Survey on Privacy Preserving in Social Networks S. Mayil1, Dr. M. Vanitha2 1Research scholar, PG & Research Department of Computer Science, JJ College of Arts and Science (Autonomous), Pudukkottai, Tamil Nadu, India 2Assistant Professor, Ph.D. and Research Department of Computer Application, Alagappa University, Karaikudi , Tamilnadu. Abstract: The development of online social networks and the release of data network resulting in the risk of leakage of personal confidential information. This requires privacy protection before the data network is published by the service provider. Data privacy online social networks are important in recent years. Therefore, this research is still in its infancy. This article describes the generalization techniques of anonymous social networking data with sufficient privacy for harsh environments while preserving the validity of the data. The loss metric information, iloss, is used to check the information due to the loss of the generalized amount. While these networks make frequent data sharing and intercommunication between users can instantly and privacy problems that may arise are very explicable with their obvious immediate consequences. Although the concept of privacy can take different forms, the ultimate challenge is how to prevent the invasion of privacy when personal information is available. Basic social networks, co-statements, and their associated primary motivations. The following describes how to protect privacy, relying on technical analysis and link social networks to disclose sensitive user information. Keywords: Data Privacy, Data Publishing, Privacy Preserving, Social Network, Service Provider. 1. Introduction data may affect the privacy of individuals. -
CJEU Ruling on Facebook Action on January 25, 2018: Class Action, Model Case Or No Jurisdiction?
CJEU ruling on Facebook action on January 25, 2018: Class action, model case or no jurisdiction? In August 2014, lawyer and data protection expert Max Schrems filed a lawsuit against Facebook with his competent court in Vienna, as previous complaints in Ireland have not been decided by the Irish Data Protection Commissioner since 2011. Now the CJEU decides on the admissibility of the lawsuit against Facebook. Previously, in 2015 Schrems brought down the EU-US “Safe Harbor” system through a case against Facebook at the CJEU. Dispute solely on jurisdiction and on two questions Facebook has submitted various grounds with the court in Vienna, why the procedure should not be heard at all. The majority of these attempts to prevent the procedure have already been rejected by the Austria courts over the past three years. What remained, were two questions: (1) whether Mr Schrems is a "consumer" or has lost this status through his pro bono work as a privacy advocate; and (2) whether he can bring claims of other users jointly in a "class action". The class action is financed by ROLAND Prozessfinanz AG. Facebook wants each of the 25,000 other users to have to sue in a separate procedure - which would make the legal costs skyrocket and a case against Facebook financially impossible for most users. In Facebook’s view, the same legal and factual issues should therefore be trailed 25,000 times in front of thousands of European courts and judges (“divide and conquer”). These two questions were submitted to the Court of Justice of the European Union (CJEU) for a preliminary ruling by the Austrian Supreme Court. -
Report of Findings: Joint Investigation of Clearview AI, Inc
REPORT OF FINDINGS Joint investigation of Clearview AI, Inc. by the Office of the Privacy Commissioner of Canada, the Commission d’accès à l’information du Québec, the Information and Privacy Commissioner for British Columbia, and the Information Privacy Commissioner of Alberta OPC PIPEDA-039525/CAI QC-1023158/OIPC BC P20- 81997/OIPC AB-015017 Joint Investigation by the Privacy Commissioner of Canada (OPC), the Commission d’accès à l’information du Québec (CAI), the Information and Privacy Commissioner for British Columbia (OIPC BC), and the Information and Privacy Commissioner of Alberta (OIPC AB) into Clearview AI, Inc.’s compliance with the Personal Information Protection and Electronic Documents Act (PIPEDA), the Act Respecting the Protection of Personal Information in the Private Sector, the Act to Establish a Legal Framework for Information Technology (LCCJTI), the Personal Information Protection Act (PIPA BC), and the Personal Information Protection Act (PIPA AB) Page 1 / 29 Contents Overview ..................................................................................................................................................... 3 Background ............................................................................................................................................... 5 Issues .......................................................................................................................................................... 6 Methodology ............................................................................................................................................. -
Facebook: Where Privacy Concerns and Social Needs Collide
Edith Cowan University Research Online Theses: Doctorates and Masters Theses 2020 Facebook: Where privacy concerns and social needs collide Sonya Scherini Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses Part of the Communication Technology and New Media Commons, Mass Communication Commons, and the Social Media Commons Recommended Citation Scherini, S. (2020). Facebook: Where privacy concerns and social needs collide. https://ro.ecu.edu.au/ theses/2331 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses/2331 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form. -
Issues Paper on Cyber-Crime Affecting Personal Safety, Privacy and Reputation Including Cyber-Bullying (LRC IP 6-2014)
Issues Paper on Cyber-crime affecting personal safety, privacy and reputation including cyber-bullying (LRC IP 6-2014) BACKGROUND TO THIS ISSUES PAPER AND THE QUESTIONS RAISED This Issues Paper forms part of the Commission’s Fourth Programme of Law Reform,1 which includes a project to review the law on cyber-crime affecting personal safety, privacy and reputation including cyber-bullying. The criminal law is important in this area, particularly as a deterrent, but civil remedies, including “take-down” orders, are also significant because victims of cyber-harassment need fast remedies once material has been posted online.2 The Commission seeks the views of interested parties on the following 5 issues. 1. Whether the harassment offence in section 10 of the Non-Fatal Offences Against the Person Act 1997 should be amended to incorporate a specific reference to cyber-harassment, including indirect cyber-harassment (the questions for which are on page 13); 2. Whether there should be an offence that involves a single serious interference, through cyber technology, with another person’s privacy (the questions for which are on page 23); 3. Whether current law on hate crime adequately addresses activity that uses cyber technology and social media (the questions for which are on page 26); 4. Whether current penalties for offences which can apply to cyber-harassment and related behaviour are adequate (the questions for which are on page 28); 5. The adequacy of civil law remedies to protect against cyber-harassment and to safeguard the right to privacy (the questions for which are on page 35); Cyber-harassment and other harmful cyber communications The emergence of cyber technology has transformed how we communicate with others. -
Law, Technology, and Public Health in the COVID-19 Crisis
Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M. -
Photographs in Public Places and Privacy
[2009] 2 Journal of Media Law 159–171 Photographs in Public Places and Privacy Kirsty Hughes In the last few years, the European Court of Human Rights (‘the Court’) has considered a number of cases relating to photographs taken in public places, and it is now clear that the jurisprudence has evolved significantly since the early cases in which no protection was afforded to the privacy interests of those photographed. The most recent cases (Reklos and Davourlis v Greece and Egeland and Hanseid v Norway) have extended the protection afforded by Article 8 of the European Convention on Human Rights (ECHR) so that the right is engaged at the stage at which photographs are taken.1 The author argues that whilst this development was necessary, there are a number of problems with the Court’s approach and that further guidance from the Court is essential. THEORIES OF PRIVACY-RELATED INTERESTS To fully understand the significance of the Article 8 ECHR photography cases, one has to have some idea of how these cases relate to the protection of privacy. There are many different theories of privacy and privacy-related interests and it is beyond the scope and purpose of this commentary to examine the details of those theories here.2 However, it * Clare College, University of Cambridge. 1 (App No 1234/05) [2009] EMLR 16 and (App No 34438/04) [2009] ECHR 622, available on HUDOC. 2 The literature is extensive; a good starting point would be Ruth Gavison, ‘Privacy and the Limits of the Law’ (1980) 89(3) Yale Law Journal 421; Hyman Gross, ‘Privacy and Autonomy’