National Security Needs, the Widespread Availability of Personally Identifiable Financial Information Puts Individuals at Risk for Fraud

Total Page:16

File Type:pdf, Size:1020Kb

National Security Needs, the Widespread Availability of Personally Identifiable Financial Information Puts Individuals at Risk for Fraud SECURITY and PRIVACY SECURITY and PRIVACY Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States John Kleinig • Peter Mameli • Seumas Miller • Douglas Salane Adina Schwartz THE AUSTRALIAN NATIONAL UNIVERSITY E PRESS Centre for Applied Philosophy and Public Ethics An Australian Research Council Funded Special Research Centre Practical Ethics and Public Policy Monograph 2 Series Editor: Michael J. Selgelid E PRESS Published by ANU E Press The Australian National University Canberra ACT 0200, Australia Email: [email protected] This title is also available online at http://epress.anu.edu.au National Library of Australia Cataloguing-in-Publication entry Title: Security and privacy : global standards for ethical identity management in contemporary liberal democratic states / John Kleinig ... [et al.] ISBN: 9781921862571 (pbk.) 9781921862588 (ebook) Notes: Includes bibliographical references. Subjects: Terrorism--Moral and ethical aspects. Transnational crime--Moral and ethical aspects. Terrorism--Political aspects. Transnational crime--Political aspects. Other Authors/Contributors: Kleinig, John, 1942- Dewey Number: 363.325 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise, without the prior permission of the publisher. Cover design and layout by ANU E Press Printed by Griffin Press This edition © 2011 ANU E Press Contents Preface . vii Contributors . ix Acknowledgments . xi I . Crime Scenes and the Terroir of Terror . 1 II . Security and the Challenge to Liberal Values . 7 III . The Blessing and Bane of the Liberal Democratic Tradition . 11 IV . Divergent Formalities . 19 V . When the Rubber Hits the Road . 77 VI . Securitization Technologies . 89 VII . Surveillance Technologies and Economies . 129 VIII . The Underlying Values and their Alignment . 151 IX . The Complexities of Oversight and Accountability . 225 X . Recommendations . 241 Appendix: Security and Privacy Institutional Arrangements: Australia and India . 247 References . 263 v Preface This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal democracies, namely, security and privacy. Both values are essential to individual liberty but they come into conflict in times when civil order is threatened, as has been the case from late in the twentieth century, with the advent of global terrorism and transnational crime. We seek to articulate legally sustainable, politically possible and technologically feasible global ethical standards1 for identity management technology and policies in liberal democracies in the contemporary global security context. Although the standards in question are to be understood as global ethical standards potentially to be adopted not only by the United States (US) but also by the European Union (EU), India, Australasia and other contemporary liberal democratic states, we take as our primary focus the tensions that have arisen between the US and the EU. This tension provides a good example of the kinds of challenges involved in developing global standards. It is exemplified by the 2006 disclosure concerning the US government’s access to SWIFT transactions and the controversy that has followed it, as well as the earlier and ongoing controversy over the 2004 US–EU Passenger Names Records (PNR) agreement. It also makes itself known in the ongoing debate over national identity cards. The first two conflicts make it clear that, however difficult it may be to develop global standards for the management of personal data, such standards are needed and that every effort should be made to develop them or at least to implement procedures for addressing conflicts among them. Naturally, authoritarian states do not share the liberal values underlying this project – values such as individual autonomy and privacy. Nevertheless, to the extent that such authoritarian states are evolving or are likely to evolve toward some form of liberal democracy, the results of this study will also be relevant to these states. Our purpose is to articulate standards and institutional initiatives that are sufficiently specific to determine – or at least substantially constrain – the requisite detailed security and privacy policies and prescriptions in national as well as international and transnational jurisdictions. 1 Gijs de Vries, “Terrorism, Islam and Democracy”, EurActiv.com, March 4, 2005, at: http://www.euractiv. com/en/security/gijs-vries-terrorism-islam-democracy/article-136245. vii Security and Privacy The project distinguishes itself from other work in this field in two major respects. Firstly, the multi-disciplinary team of experts brought together for this project has enabled the integration of: (a) ethical principles, (b) national and international legal considerations, (c) effective law enforcement practices, (d) oversight and accountability concerns and (e) knowledge of existing and emerging technology, such as database mining and knowledge discovery technology, in the development of a framework of determinate and feasible ethical standards for identity management technology in the global security context. Secondly, the study has drawn on an international team of experts and focuses on common international standards and solutions, as befits the trans-jurisdictional and transnational nature of the problems to be addressed. Specifically, the project involves not only US personnel and institutions but also EU, Indian, and Australasian expertise. viii Contributors John Kleinig is Professor of Philosophy in the Department of Criminal Justice at John Jay College of Criminal Justice, and teaches in the PhD Programs in Philosophy and Criminal Justice at the Graduate Center, City University of New York. He is also Professorial Fellow in Criminal Justice Ethics at the Centre for Applied Philosophy and Public Ethics, Charles Sturt University, Canberra. Peter Mameli is Associate Professor in the Department of Public Management at John College of Criminal Justice and is part of the PhD Program in Criminal Justice at the Graduate Center, CUNY. Seumas Miller is Foundation Director for the Centre for Applied Philosophy and Public Ethics (an Australian Research Council Special Research Centre) at the Australian National University and Charles Sturt University, and a senior research fellow in the Centre for Ethics and Technology at Delft University of Technology, Netherlands. Douglas Salane is Associate Professor in the Department of Mathematics and Computer Science and in the graduate program in Forensic Computing at John Jay College of Criminal Justice. He is also Director of the Center for Cybercrime Studies. Adina Schwartz is Professor of Law in the Department of Law, Police Science, and Criminal Justice Administration at John Jay College of Criminal Justice and the Masters Program in Forensic Computing at John Jay College of Criminal Justice. She is also the Assistant Director of the Center for Cybercrime Studies. ix Acknowledgments The initial impetus for this study was a US National Science Foundation grant (#0619226) awarded in 2006 to several researchers at John Jay College of Criminal Justice, some of whom were also associated with the Centre for Applied Philosophy and Public Ethics, Charles Sturt University, Canberra. We are particularly appreciative of the support of John Jay College and CAPPE, and for the assistance at different stages of this project of Nick Evans, Jamie Levy, Richard Lovely, Richard Lucas, Vincent Maldonado and Vincenzo Sainato. Richard Lucas was particularly helpful in reviewing and updating the technical data. Until his untimely death, one of our original grant members, Brian O’Connell, from Central Connecticut State University, brought to the early stages of this project not only his enthusiasm but also his combined expertise in philosophy, law, and computing. Our loss, along with that of others, was great. In preparing this material for publication, we are grateful for the extensive comments of two reviewers, including Leslie Francis of the University of Utah. James Spence provided valuable editorial assistance. During the course of this study, several items have been prepared for other venues, including: John Kleinig “Humiliation, Degradation, and Moral Capacity: A Response to Hörnle and Kremnitzer”, Israel Law Review 44; and John Kleinig, “Liberty and Security in an Era of Terrorism”, in Criminologists on Terrorism and Homeland Security, ed. Brian Forst, Jack Greene & James Lynch (NY: Cambridge University Press, 2011), ch. 15. Acknowledgment is also made of permission to use material first published in Peter Mameli, “Tracking the Beast: Techno-Ethics Boards and Government Surveillance Programs”, Critical Issues in Justice and Politics, 1, no. 1 (2008): 31–56, available at: http://www.suu.edu/hss/polscj/CIJP.htm. Professor Mameli's research benefitted from time spent as a visiting scholar at the National Policing Improvement Agency, Bramshill, in the United Kingdom during 2006. In addition, elements of his work were originally presented at the 2006 “Soft Law, Soft Regulation?” conference of Anglia Ruskin University. We also acknowledge
Recommended publications
  • Australian Political Writings 2009-10
    Parliament of Australia Department of Parliamentary Services Parliamentary Library Information, analysis and advice for the Parliament BIBLIOGRAPHY www.aph.gov.au/library Selected Australian political writings 2009‐10 Contents Biographies ............................................................................................................................. 2 Elections, electorate boundaries and electoral systems ......................................................... 3 Federalism .............................................................................................................................. 6 Human rights ........................................................................................................................... 6 Liberalism and neoliberalism .................................................................................................. 6 Members of Parliament and their staff .................................................................................... 7 Parliamentary issues ............................................................................................................... 7 Party politics .......................................................................................................................... 13 Party politics- Australian Greens ........................................................................................... 14 Party politics- Australian Labor Party .................................................................................... 14 Party politics-
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • Limitless Surveillance at the Fda: Pro- Tecting the Rights of Federal Whistle- Blowers
    LIMITLESS SURVEILLANCE AT THE FDA: PRO- TECTING THE RIGHTS OF FEDERAL WHISTLE- BLOWERS HEARING BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION FEBRUARY 26, 2014 Serial No. 113–88 Printed for the use of the Committee on Oversight and Government Reform ( Available via the World Wide Web: http://www.fdsys.gov http://www.house.gov/reform U.S. GOVERNMENT PRINTING OFFICE 87–176 PDF WASHINGTON : 2014 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 11:40 Mar 31, 2014 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\DOCS\87176.TXT APRIL COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM DARRELL E. ISSA, California, Chairman JOHN L. MICA, Florida ELIJAH E. CUMMINGS, Maryland, Ranking MICHAEL R. TURNER, Ohio Minority Member JOHN J. DUNCAN, JR., Tennessee CAROLYN B. MALONEY, New York PATRICK T. MCHENRY, North Carolina ELEANOR HOLMES NORTON, District of JIM JORDAN, Ohio Columbia JASON CHAFFETZ, Utah JOHN F. TIERNEY, Massachusetts TIM WALBERG, Michigan WM. LACY CLAY, Missouri JAMES LANKFORD, Oklahoma STEPHEN F. LYNCH, Massachusetts JUSTIN AMASH, Michigan JIM COOPER, Tennessee PAUL A. GOSAR, Arizona GERALD E. CONNOLLY, Virginia PATRICK MEEHAN, Pennsylvania JACKIE SPEIER, California SCOTT DESJARLAIS, Tennessee MATTHEW A. CARTWRIGHT, Pennsylvania TREY GOWDY, South Carolina TAMMY DUCKWORTH, Illinois BLAKE FARENTHOLD, Texas ROBIN L. KELLY, Illinois DOC HASTINGS, Washington DANNY K. DAVIS, Illinois CYNTHIA M. LUMMIS, Wyoming PETER WELCH, Vermont ROB WOODALL, Georgia TONY CARDENAS, California THOMAS MASSIE, Kentucky STEVEN A.
    [Show full text]
  • Congressional Correspondence
    People Record 7006012 for The Honorable Peter T. King Help # ID Opened � WF Code Assigned To Template Due Date Priority Status 1 885995 11/3/2010 ESLIAISON4 (b)(6) ESEC Workflow 11/10/2010 9 CLOSED FEMA Draft Due to ESEC: 11/10/2010 ESEC Case Number (ESEC Use Only): 10-9970 To: Secretary Document Date: 10/25/2010 *Received Date: 11/03/2010 *Attachment: Yes Significant Correspondence (ESEC Use Only): Yes *Summary of Document: Write in support of the application submitted by the (b)(4) for $7,710,089 under the Staffing for Adequate Fire and Emergency Response grant program. *Category: Congressional *Type: Congressional - Substantive Issue *Action to be Taken: Assistant Secretary OLA Signature Status: Action: *Lead Component: FEMA *Signed By (ESEC Use Only): Component Reply Direct and cc: *Date Response Signed: 11/02/2010 Action Completed: 11/04/2010 *Complete on Time: Yes Attachments: 10-9970rcuri 10.25.10.pdf Roles: The Honorable Michael Arcuri(Primary, Sender), The Honorable Timothy H. Bishop(Sender) 2 884816 10/22/2010 ESLIAISON4 (b)(6) ESEC Workflow 11/5/2010 9 OPEN FEMA Reply Direct Final Due Date: 11/05/2010 ESEC Case Number (ESEC Use Only): 10-9776 To: Secretary Mode: Fax Document Date: 10/20/2010 *Received Date: 10/22/2010 *Attachment: Yes Significant Correspondence (ESEC Use Only): No *Summary of Document: Requests an Urban Area Security Initiative designation for seven southern San Joaquin Valley Counties. *Category: Congressional *Type: Congressional - Substantive Issue *Action to be Taken: Component Reply Direct and Cc: Status:
    [Show full text]
  • GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms
    ACCESS TO KNOWLEDGE RESEARCH GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Prakash Nagla Rizk Carlos Affonso Souza GLOBAL CENSORSHIP Shifting Modes, Persisting Paradigms edited by Pranesh Pra ash Nag!a Ri" Car!os Affonso So$"a ACCESS %O KNO'LE(GE RESEARCH SERIES COPYRIGHT PAGE © 2015 Information Society Project, Yale Law School; Access to Knowle !e for "e#elo$ment %entre, American Uni#ersity, %airo; an Instituto de Technolo!ia & Socie a e do Rio+ (his wor, is $'-lishe s'-ject to a %reati#e %ommons Attri-'tion./on%ommercial 0%%.1Y./%2 3+0 In. ternational P'-lic Licence+ %o$yri!ht in each cha$ter of this -oo, -elon!s to its res$ecti#e a'thor0s2+ Yo' are enco'ra!e to re$ro 'ce, share, an a a$t this wor,, in whole or in part, incl' in! in the form of creat . in! translations, as lon! as yo' attri-'te the wor, an the a$$ro$riate a'thor0s2, or, if for the whole -oo,, the e itors+ Te4t of the licence is a#aila-le at <https677creati#ecommons+or!7licenses7-y.nc73+07le!alco e8+ 9or $ermission to $'-lish commercial #ersions of s'ch cha$ter on a stan .alone -asis, $lease contact the a'thor, or the Information Society Project at Yale Law School for assistance in contactin! the a'thor+ 9ront co#er ima!e6 :"oc'ments sei;e from the U+S+ <m-assy in (ehran=, a $'-lic omain wor, create by em$loyees of the Central Intelli!ence A!ency / em-assy of the &nite States of America in Tehran, de$ict.
    [Show full text]
  • Lab Activity and Assignment #2
    Lab Activity and Assignment #2 1 Introduction You just got an internship at Netfliz, a streaming video company. Great! Your first assignment is to create an application that helps the users to get facts about their streaming videos. The company works with TV Series and also Movies. Your app shall display simple dialog boxes and help the user to make the choice of what to see. An example of such navigation is shown below: Path #1: Customer wants to see facts about a movie: >> >> Path #2: Customer wants to see facts about a TV Series: >> >> >> >> Your app shall read the facts about a Movie or a TV Show from text files (in some other course you will learn how to retrieve this information from a database). They are provided at the end of this document. As part of your lab, you should be creating all the classes up to Section 3 (inclusive). As part of your lab you should be creating the main Netfliz App and making sure that your code does as shown in the figures above. The Assignment is due on March 8th. By doing this activity, you should be practicing the concept and application of the following Java OOP concepts Class Fields Class Methods Getter methods Setter methods encapsulation Lists String class Split methods Reading text Files Scanner class toString method Override superclass methods Scanner Class JOptionPane Super-class sub-class Inheritance polymorphism Class Object Class Private methods Public methods FOR loops WHILE Loops Aggregation Constructors Extending Super StringBuilder Variables IF statements User Input And much more..
    [Show full text]
  • Patrol Guide § 212-72
    EXHIBIT K AOR307 An Investigation of NYPD’s Compliance with Rules Governing Investigations of Political Activity New York City Department of Investigation Office of the Inspector General for the NYPD (OIG-NYPD) Mark G. Peters Commissioner Philip K. Eure Inspector General for the NYPD August 23, 2016 AOR308 AN INVESTIGATION OF NYPD’S COMPLIANCE WITH RULES GOVERNING AUGUST 2016 INVESTIGATIONS OF POLITICAL ACTIVITY Table of Contents Overview ............................................................................................................................... 1 Executive Summary ............................................................................................................... 3 Introduction ........................................................................................................................ 11 I. NYPD Investigations of Political Activity: Handschu and Patrol Guide § 212-72 ....... 11 II. OIG-NYPD Investigation .............................................................................................. 12 Methodology and Access ..................................................................................................... 13 I. Treatment of Sensitive Information ............................................................................ 13 II. Compliance Criteria ..................................................................................................... 13 III. Scope and Sampling .................................................................................................... 14
    [Show full text]
  • Australia 2019
    Australia Free 77 100 A Obstacles to Access 23 25 B Limits on Content 29 35 C Violations of User Rights 25 40 Last Year's Score & Status 79 100 Free Overview Internet freedom in Australia declined during the coverage period. The country’s information and communication technology (ICT) infrastructure is well developed, and prices for connections are low, ensuring that much of the population enjoys access to the internet. However, a number of website restrictions, such as those related to online piracy or “abhorrent” content, limit the content available to users. The March 2019 terrorist attack on mosques in Christchurch, New Zealand, prompted internet service providers (ISPs) to block certain websites and the government subsequently introduced a new law that criminalized the failure to delete “abhorrent” content. Other legal changes—including court decisions expanding the country’s punitive defamation standards, an injunction silencing digital media coverage of a high-profile trial, and a problematic law that undermines encryption—shrunk the space for free online expression in Australia. Finally, an escalating series of cyberattacks sponsored by China profoundly challenged the security of Australia’s digital sphere. Australia is a democracy with a strong record of advancing and protecting political rights and civil liberties. Recent challenges to these freedoms have included the threat of foreign political influence, harsh policies toward asylum seekers, and ongoing disparities faced by indigenous Australians. Key Developments June 1, 2018 – May 31, 2019 After the March 2019 Christchurch attack, in which an Australian man who had espoused white supremacist views allegedly killed 51 people at two New Zealand mosques, ISPs acted independently to block access to more than 40 websites that hosted the attacker’s live-streamed video of his crimes.
    [Show full text]
  • An Anthropological Study of Smes in Manchester
    “BLOCKS TO CONVERGENCE” IN THE NEW MEDIA INDUSTRIES: AN ANTHROPOLOGICAL STUDY OF SMALL AND MEDIUM SIZED ENTERPRISES IN MANCHESTER A thesis submitted to the University of Manchester for the degree of Doctor of Philosophy in the Faculty of Social Sciences and Law 2003 HANNAH KNOX DEPARTMENT OF SOCIAL ANTHROPOLOGY 1 TABLE OF CONTENTS Table of Figures 3 Abstract 4 Declaration 6 Copyright 6 The Author 7 Acknowledgements 7 Abbreviations 8 1: Introduction......................................................................................................9 Why Anthropology? 14 Chapter Outline 40 2: The Study of Cities - Making Manchester...................................................45 Views of the City 46 From Landscape to Space 50 Competitive Spaces 59 Historical Stories 65 Creative Places 74 Conclusion 81 3: New Media Workplaces ................................................................................84 Anthropology and Organisations 85 Gaining Access 91 Work and Identity 111 4: Realising Our Potential - Paradigms of Newness and Change................117 Introducing Convergence 119 Conversations on Convergence 122 Gaming 124 Interactive TV 131 Commerce and Convergence 135 Blocks to Convergence 148 The “Newness” of New Media 157 Conclusion 161 5: The Discourse of Skills in the Practice of the Economic ..........................168 Wider Discourses on Skill 174 Skills – a Means to an End 182 6: The Network as Cultural Form ..................................................................205 Network Theories 208 Networks in New Media
    [Show full text]
  • Privacy and Data Protection in Australia: a Critical Overview (Extended Abstract)
    Privacy and Data Protection in Australia: a Critical overview (extended abstract) David Watts1, Pompeu Casanovas2,3 1 La Trobe Law School, La Trobe University, Melbourne, Australia 2 UAB Institute of Law and Technology, Universitat Autònoma de Barcelona, Spain Abstract. This extended abstract describes the regulation of privacy under Aus- tralian laws and policies. In the CRC D2D programme, we will develop a strategy to model legal requirements in a situation that is far from clear. Law enforcement agencies are facing big floods of data to be acquired, stored, assessed and used. We will propose in the final paper a linked data regulatory model to organise and set the legal and policy requirements to model privacy in this unstructured con- text. Keywords: Australian privacy law, legal requirements, privacy modelling 1 Introduction Australia has a federal system of government that embodies a number of the structural elements of the US Constitutional system but retains a Constitutional monarchy. It con- sists of a national government (the Commonwealth), six state governments (New South Wales, Victoria, Tasmania, Queensland, South Australia and Western Australia) as well as two Territories (the Australian Capital Territory and the Northern Territory). Under this system, specific Constitutional powers are conferred on the Common- wealth. Any other powers not specifically conferred on the Commonwealth are retained by the States (and, to a lesser extent, the Territories). There is no general law right to privacy in Australia. Although Australia is a signa- tory to the International Convention on Civil and Political Rights, the international law right to privacy conferred under Article 17 of the ICCPR has not been enacted into Australia’s domestic law.
    [Show full text]
  • Legitimacy in the New Regulatory State
    LEGITIMACY IN THE NEW REGULATORY STATE KAREN LEE A THESIS IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF LAW MARCH 2016 TABLE OF CONTENTS ACKNOWLEDGEMENTS ...................................................................................................... I PUBLICATIONS AND PRESENTATIONS ARISING FROM THE WRITING OF THE THESIS .. III GLOSSARY AND TABLE OF ABBREVIATIONS .................................................................. IV CHAPTER 1 INTRODUCTION ............................................................................................. 1 I JUSTIFICATION FOR RESEARCH AND ITS APPROACH .......................................... 4 A THE NEED FOR EMPIRICAL STUDY OF INDUSTRY RULE-MAKING ....................... 4 B PART 6 RULE-MAKING ....................................................................................... 7 1 THE COMMUNICATIONS ALLIANCE ................................................................ 8 2 CONSUMER CODES ....................................................................................... 10 C PROCEDURAL AND INSTITUTIONAL LEGITIMACY, RESPONSIVENESS AND THEIR CRITERIA ......................................................................................................... 11 II TERMINOLOGY ................................................................................................ 15 A CONSUMER AND PUBLIC INTERESTS................................................................. 15 1 CONSUMER INTEREST .................................................................................
    [Show full text]
  • Mark Burdon Thesis
    THE CONCEPTUAL AND OPERATIONAL COMPATIBILITY OF DATA BREACH NOTIFICATION AND INFORMATION PRIVACY LAWS Mark Burdon M.Sc. (Econ) Public Policy (Lon), LLB (Hons) (London South Bank University, UK) Submitted in fulfilment of the requirements for the degree of PhD by publications Faculty of Law Queensland University of Technology 2011 Keywords Data Breach Notification Law – Information Privacy Law – Data Protection – Contextualisation - Information Security Law ii Abstract Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue.
    [Show full text]