Surveillance As Social Sorting: Privacy, Risk, and Digital Discrimination

Total Page:16

File Type:pdf, Size:1020Kb

Surveillance As Social Sorting: Privacy, Risk, and Digital Discrimination Surveillance as Social Sorting Surveillance happens to us all, every day, as we walk beneath street cameras, swipe cards, surf the Net. Agencies are using increasingly sophisticated computer systems – especially searchable databases – to keep tabs on us at home, work, and play. Once the word surveillance was reserved for police activities and intelligence gathering; now it is an unavoidable feature of everyday life. Surveillance as Social Sorting proposes that surveillance is not simply a contemporary threat to individual freedoms, but that, more insidiously, it is a powerful means of creating and reinforcing long-term social differences. As practiced today, it is actually a form of social sorting – a means of verifying identities but also of assessing risks and assigning worth. Questions of how categories are constructed therefore become significant ethical and political questions. Bringing together contributions from North America and Europe, Surveillance as Social Sorting offers an innovative approach to the interaction between societies and their technologies. It looks at a number of examples in depth and will be an appropriate source of reference for a wide variety of courses. David Lyon is Professor of Sociology at Queen’s University, Kingston, Ontario. Surveillance as Social Sorting Privacy, risk, and digital discrimination Edited by David Lyon London and New York First published 2003 by Routledge 11 New Fetter Lane, London EC4P 4EE Simultaneously published in the USA and Canada by Routledge 29 West 35th Street, New York, NY 10001 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor and Francis e-Library, 2005. “To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.” © 2003 David Lyon All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging in Publication Data A catalog record for this book has been requested ISBN 0-203-99488-4 Master e-book ISBN ISBN 0–415–27873–2 (pbk) ISBN 0–415–27872–4 (hbk) Contents List of contributors vii Preface and acknowledgements xiii Introduction 1 DAVID LYON PART I Orientations 11 1 Surveillance as social sorting: computer codes and mobile bodies 13 DAVID LYON 2 Theorizing surveillance: the case of the workplace 31 ELIA ZUREIK 3 Biometrics and the body as information: normative issues of the socio-technical coding of the body 57 IRMA VAN DER PLOEG PART II Verifying identities: constituting life-chances 75 4 Electronic identity cards and social classification 77 FELIX STALDER AND DAVID LYON 5 Surveillance creep in the genetic age 94 DOROTHY NELKIN AND LORI ANDREWS vi Contents 6 “Racial” categories and health risks: epidemiological surveillance among Canadian First Nations 111 JENNIFER POUDRIER PART III Regulating mobilities: places and spaces 135 7 Privacy and the phenetic urge: geodemographics and the changing spatiality of local practice 137 DAVID PHILLIPS AND MICHAEL CURRY 8 People and place: patterns of individual identification within intelligent transportation systems 153 COLIN BENNETT, CHARLES RAAB, AND PRISCILLA REGAN 9 Netscapes of power: convergence, network design, walled gardens, and other strategies of control in the information age 176 DWAYNE WINSECK PART IV Targeting trouble: social divisions 199 10 Categorizing the workers: electronic surveillance and social ordering in the call center 201 KIRSTIE BALL 11 Private security and surveillance: from the “dossier society” to database networks 226 GREG MARQUIS 12 From personal to digital: CCTV, the panopticon, and the technological mediation of suspicion and social control 249 CLIVE NORRIS Index 282 Contributors Lori Andrews is Distinguished Professor, Chicago-Kent College of Law, and Director, Institute for Science, Law, and Technology at the Illinois Institute of Technology. Kirstie Ball is Lecturer in Organizational Management, Department of Commerce, University of Birmingham. She is the author of a number of theoretical and empirical papers on surveillance in organizations including those published in Organization Studies, and Ethics and Information Technology, and is joint editor (with David Lyon, Clive Norris, Steven Graham, and David Wood) of Surveillance in Society, an on-line journal and web-based study resource. She has spoken nationally and internation- ally on surveillance practice at work, and has appeared in the national media in relation to this issue. She also writes on new managerialism (with Damian Hodgson and Chris Carter); discourse and the body in organizations (with Damian Hodgson); and human resource information systems. Colin Bennett received his Bachelor’s and Master’s degrees from the University of Wales, and his Ph.D. from the University of Illinois at Urbana-Champaign. Since 1986 he has taught in the Department of Political Science at the University of Victoria, where he is now Professor. From 1999 to 2000, he was a fellow with the Harvard Information Infra- structure Project, Kennedy School of Government, Harvard University. His research interests have focused on the comparative analysis of information privacy protection policies at the domestic and international levels. He has published Regulating Privacy: Data Protection and Public Policy in Europe and the United States (1992); Visions of Privacy: Policy Choices for the Digital Age (1999); and multiple articles in a variety of international journals. He is currently involved in an interdisciplinary and international research project (funded by the National Science Foundation) which examines the relation of emergent geographic information technologies to changing patterns of individual identification. viii Contributors Michael Curry is a Professor of Geography at the University of California, Los Angeles. His areas of interest are the social and cultural implications of the development of geographic information technologies, such as geographic information systems, and the geographical implications of the development of information technologies. He is the author of two books, The Work in the World: Geographical Practice and the Written Word (1996) and Digital Places: Living with Geographic Information Technologies (1998), and a number of articles and book chapters. His current work concerns the relationship between conceptualizations of place and of privacy. E-mail: [email protected]. Website: http: //baja.sscnet.ucla.edu/~curry/. David Lyon is Professor of Sociology at Queen’s University, Kingston, Ontario, where he is also Director of the Surveillance Project (http: //qsilver.queensu.ca/sociology/Surveillance/intro.htm). He works in the sociology of technology, of religion, and social theory. His books include The Electronic Eye: The Rise of Surveillance Society (1994), Surveillance Society: Monitoring Everyday Life (2001) and, co-edited with Elia Zureik, Computers, Surveillance and Privacy (1996). Greg Marquis obtained his Ph.D. from Queen’s University in 1987 and teaches Canadian and criminal justice history at the University of New Brunswick Saint John. Author of Policing Canada’s Century: A History of the Canadian Association of Chiefs of Police (1993) and In Armageddon’s Shadow: The Civil War and Canada’s Maritime Provinces (1998, 2000), his work has appeared in Acadiensis, the Journal of the Canadian Historical Association, Histoire sociale/Social History, the Canadian Journal of Criminology, Criminal Justice History and the Journal of Imperial and Commonwealth History. His current research is twentieth-century Canadian alcohol policy. E-mail: [email protected] Dorothy Nelkin holds a University Professorship at New York University, teaching in the Department of Sociology and the School of Law. Her research in science studies focuses on the relationship between science and the public as expressed in disputes, the media and popular culture, public attitudes, and institutional responses to scientific information. Formerly on the faculty of Cornell University, she has had visiting appointments at University College in London, the École Polytechnique in Paris, and MIT. Her books include: Controversy: Politics of Technical Decisions (1992), The Creation Controversy (1982), Workers at Risk (1984), Selling Science (1995), Dangerous Diagnostics (with L. Tancredi) (1989, 1994), The DNA Mystique (with S. Lindee) (1995), and Body Bazaar: The Market for Human Tissue in the Biotechnology Age (with L. Andrews) (2001). Contributors ix Clive Norris is Professor of Sociology at the University of Sheffield. He has written extensively on the sociology of policing and surveillance. In 1998 he completed another, two-year, ESRC-funded study entitled CCTV and Social Control. He is joint editor with Gary Armstrong and Jade Moran of Surveillance, Closed Circuit Television and Social Control (1998), and co-author with Gary Armstrong of The Maximum Surveillance Society: The Rise of CCTV (1999). His most recent book, with Clive Coleman, is Introducing Criminology (2000). He is currently working on a three-year European Commission funded project, entitled Urbaneye, comparing the use of CCTV in seven European countries. David Phillips
Recommended publications
  • Centering Civil Rights in the Privacy Debate
    August 2019 Centering Civil Rights in the Privacy Debate Becky Chao, Eric Null, Brandi Collins-Dexter, & Claire Park Last edited on September 17, 2019 at 11:28 a.m. EDT Acknowledgments The authors would like to thank Francella Ochillo, Erin Shields, Alisa Valentin, Miranda Bogen, Priscilla González, and Gaurav Laroia for participating in the event highlighted in this report and Lisa Johnson, Austin Adams, and Maria Elkin for communications support. Open Technology Institute would also like to thank Craig Newmark Philanthropies for generously supporting its work in this area. newamerica.org/oti/reports/centering-civil-rights-privacy-debate/ 2 About the Author(s) Becky Chao is a policy analyst at New America’s Open Technology Institute, where she works to promote equitable access to a fair and open internet ecosystem. Eric Null is senior policy counsel at the Open Technology Institute, focusing on internet openness and affordability issues, including network neutrality, Lifeline, and privacy. Brandi Collins-Dexter is the senior campaign director at Color Of Change and oversees the media, democracy and economic justice departments. Claire Park was an intern at New America's Open Technology Institute, where she researched and wrote about technology policy issues including broadband access and competition, as well as privacy. About New America We are dedicated to renewing America by continuing the quest to realize our nation’s highest ideals, honestly confronting the challenges caused by rapid technological and social change, and seizing the opportunities those changes create. About Open Technology Institute OTI works at the intersection of technology and policy to ensure that every community has equitable access to digital technology and its benefits.
    [Show full text]
  • Connecting Equity to a Universal Broadband Strategy
    Wired: CONNECTING EQUITY TO A UNIVERSAL BROADBAND STRATEGY A JOINT REPORT FROM: BY RAKEEN MABUD AND MARYBETH SEITZ-BROWN SEPTEMBER 2017 About the Roosevelt Institute Until economic and social rules work for all, they’re not working. Inspired by the legacy of Franklin and Eleanor, the Roosevelt Institute reimagines America as it should be: a place where hard work is rewarded, everyone participates, and everyone enjoys a fair share of our collective prosperity. We believe that when the rules work against this vision, it’s our responsibility to recreate them. We bring together thousands of thinkers and doers—from a new generation of leaders in every state to Nobel laureate economists— working to redefine the rules that guide our social and economic realities. We rethink and reshape everything from local policy to federal legislation, orienting toward a new economic and political system: one built by many for the good of all. About The New School Founded in 1919, The New School was born out of principles of academic freedom, tolerance, and experimentation. Committed to social engagement, The New School today remains in the vanguard of innovation in higher education, with more than 10,000 undergraduate and graduate students challenging the status quo in design and the social sciences, liberal arts, management, the arts, and media. The New School welcomes thousands of adult learners annually for continuing education courses and calendar of lectures, screenings, readings, and concerts. Through its online learning portals, research institutes, and international partnerships, The New School maintains a global presence. For more information, visit The New School’s website.
    [Show full text]
  • Canadian Privacy Law: the Personal Information Protection and Electronic Documents Act (PIPEDA)
    International In-house Counsel Journal Vol. 2, No. 7, Spring 2009, 1135–1146 Canadian Privacy Law: The Personal Information Protection and Electronic Documents Act (PIPEDA) DOMINIC JAAR PATRICK E. ZELLER Legal Counsel Vice President & Deputy General Counsel Ledjit Consulting, Inc. Guidance Software, Inc. Canada United States This white paper provides a general overview of the Personal Information Protection and Electronic Documents Act (“PIPEDA”), and discusses both the privacy requirements imposed by that Act as well as the rules governing the use of electronic documents that it sets out. Overview Introduction to PIPEDA PIPEDA is the federal legislative response to growing concerns over the protection and use of personal information that is accumulated by both public and private organizations in the course of their day-to-day operations.1 The Act sets out rules governing how such information should be handled by the organizations that collect it, and under what circumstances it may be disclosed, either to third parties or to the individual who is the subject of the information. The Act contains two main parts. The first part sets out the rules governing the collection, retention and disclosure of personal information, as well as the remedies available in the event of a suspected breach. In essence, this part of the Act establishes a framework which attempts to balance the privacy rights of individuals with the needs of organizations to collect, use, and disclose personal information in the course of commercial activities. This part of the Act is discussed in sections I and II of this document. The second part of the Act describes the circumstances in which electronic alternatives may be used to fulfill legal obligations, which, under federal laws, require the use of paper documents to record or communicate information or transactions.
    [Show full text]
  • Off the Grid: Pinpointing Location-Based Technologies and the Law
    Off the Grid: Pinpointing Location-based Technologies and the Law Written By: Geoffrey White, Barrister & Solicitor External Counsel The Public Interest Advocacy Centre 1204 - ONE Nicholas St. Ottawa, Ontario K1N 7B7 June 2015 Copyright 2015 PIAC Contents may not be commercially reproduced. Any other reproduction with acknowledgment is encouraged. The Public Interest Advocacy Centre (PIAC) Suite 1204 ONE Nicholas Street Ottawa, ON K1N 7B7 Tel: (613) 562-4002 Fax: (613) 562-0007 E-mail: [email protected] Website: www.piac.ca Canadian Cataloguing and Publication Data ISBN 978-1-927707-03-6 Off the Grid? Pinpointing Location-Based Technologies and the Law Off the Grid? Pinpointing Location-Based Technologies and the Law Page 2 of 109 Acknowledgement Financial support from Industry Canada to conduct the research on which this report is based is gratefully acknowledged. The views expressed in this report are not necessarily those of Industry Canada or of the Government of Canada. The author would also like to thank Kent Sebastian, PIAC Student-at-Law 2014-15, Sarah Mavula, PIAC Summer Student 2014, and Jonathan Bishop, PIAC’s Research & Parliamentary Affairs Analyst, for their research and contributions. Any mistakes are solely the author’s. Off the Grid? Pinpointing Location-Based Technologies and the Law Page 3 of 109 Executive Summary Knowledge of the whereabouts of a person, and of a person’s movement patterns, can be very valuable, from a marketing perspective. Indeed, the scale and scope of the business opportunities associated with so-called location-based behavioural marketing and location- based services (collectively, location-based technologies) have been well-documented in the business literature.
    [Show full text]
  • I Facebook and Panopticism: Healthy Curiosity Or Stalking?
    Facebook and Panopticism: Healthy Curiosity or Stalking? A thesis presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Mary Catherine Kennedy November 2009 © 2009. Mary Catherine Kennedy. All Rights Reserved. i This thesis titled Facebook and Panopticism: Healthy Curiosity or Stalking? by MARY CATHERINE KENNEDY has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Karen E. Riggs Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT KENNEDY, MARY C., M.A., November 2009, Telecommunications Facebook and Panopticism: Healthy Curiosity or Stalking? (108 pp.) Director of Thesis: Karen E. Riggs This study deepens existing knowledge concerning social networking sites, with specific interest in the social networking site Facebook and the phenomenon, “Facebook stalking”. By providing insights into lesser-known studies concerning user curiosity and surveillance online, the present research reveals that the terms ‘monitoring’ and ‘keeping up with’ or ‘keeping in touch with’ are most commonly used when referring to social searches within social networks; only when asked to think about surveillance in terms of stalking did interview participants refer to it as such. The present study aims to discover Facebook users’ perception of their friends’ disclosure while delving into the idea of “Facebook stalking”, specifically with regard to how users define it. Facebook’s evolution and prominence in the public sphere is dependent upon user satisfaction with and general understanding of the functionality of social networking websites. A discussion of these issues is beneficial to understanding how Facebook is used as a modern-day panopticon.
    [Show full text]
  • The End of Forgetting: Strategic Agency Beyond the Panopticon
    1 Running Head: THE END OF FORGETTING Title The end of forgetting: Strategic agency beyond the Panopticon Authors Jonah Bossewitch Communications Doctoral Program, Columbia University, USA Aram Sinnreich School of Communication and Information, Rutgers University, USA Abstract The rapid explosion of information technologies in recent years has contributed to a substantive change in the social dimensions of information sharing, and is forcing us to revise substantially our old assumptions regarding the knowledge/power dynamic. In this article, we discuss a range of strategic information-management options available to individuals and institutions in the networked society, and contrast these ‘blueprints’ to Foucault’s well-known Panopticon model. We organize these observations and analyses within a new conceptual framework based on the geometry of ‘information flux,’ or the premise that the net flow of information between an individual and a network is as relevant to power dynamics as the nature or volume of that information. Based on this geometrical model, we aim to develop a lexicon for the design, description, and critique of socio-technical systems. Keywords surveillance, privacy, transparency, sousveillance, panopticon, memory, new media, software studies, identity, quantified self Author Bios Jonah Bossewitch is a doctoral candidate in communications at Columbia University and a Technical Architect at the Columbia Center for New Media Teaching and Learning. He writes about surveillance and madness, and is investigating the politics of memory at the intersection of corruption in psychiatry and the pharmaceutical industry. He blogs at http://alchemicalmusings.org. Aram Sinnreich is an Assistant Professor at the Rutgers University School of Communication and Information.
    [Show full text]
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • Report of Findings: Joint Investigation of Clearview AI, Inc
    REPORT OF FINDINGS Joint investigation of Clearview AI, Inc. by the Office of the Privacy Commissioner of Canada, the Commission d’accès à l’information du Québec, the Information and Privacy Commissioner for British Columbia, and the Information Privacy Commissioner of Alberta OPC PIPEDA-039525/CAI QC-1023158/OIPC BC P20- 81997/OIPC AB-015017 Joint Investigation by the Privacy Commissioner of Canada (OPC), the Commission d’accès à l’information du Québec (CAI), the Information and Privacy Commissioner for British Columbia (OIPC BC), and the Information and Privacy Commissioner of Alberta (OIPC AB) into Clearview AI, Inc.’s compliance with the Personal Information Protection and Electronic Documents Act (PIPEDA), the Act Respecting the Protection of Personal Information in the Private Sector, the Act to Establish a Legal Framework for Information Technology (LCCJTI), the Personal Information Protection Act (PIPA BC), and the Personal Information Protection Act (PIPA AB) Page 1 / 29 Contents Overview ..................................................................................................................................................... 3 Background ............................................................................................................................................... 5 Issues .......................................................................................................................................................... 6 Methodology .............................................................................................................................................
    [Show full text]
  • Taylor, Taylor Vs ATT Corp Re
    Before the Federal Communications Commission Washington, DC 20554 In the matter of ) ) Edward G. Taylor, ) Proceeding Number ________ Ray Taylor ) Complainants, ) ) Bureau ID Number EB-______ v. ) ) AT&T Corp., ) ) Defendant. ) FORMAL COMPLAINT OF EDWARD G. TAYLOR AND RAY TAYLOR Daryl Parks Parks & Crump 240 North Magnolia, Drive Tallahassee, Florida, 32301 [email protected] (850) 222-3333 (850) 224-6679 Counsel for Edward G. Taylor and Ray Taylor ! !!!! ! ! Dated: September 25, 2017 ! ! 1 ! TABLE OF CONTENTS SUMMARY………………………………………………………………………………………2 PARTIES AND COUNSEL……………………………………………………………………...4 JURISDICTION………………………………………………………………………………….5 REQUIRED CERTIFICATIONS………………………………………………………………..6 FACTS……………………………………………………………………………………………7 I. Introduction…………………………………………………………………………………….7 II. Complainants………………………………………………………………………………….7 III. Evidence of AT&T Redlining in Detroit….………………………………………………9 IV. Redlining is Widespread in the United States and Not Unique to Detroit…..………………………………………………………………………………………..12 LEGAL ANALYSIS…………………………………………………………………………….14 I. No Unjust or Unreasonable Discrimination or Practices. ……………………………….14 II. Broadband Access Internet Services Legal Treatment…………………………………..15 III. Standard for Determining Discrimination Under Section 202…………………………..15 IV. Complainants Demonstrate an Unreasonable Difference in Service……………………18 V. The Commission Must Act Regardless of BIAS Title II Classification…………………19 VI. The Commission Should Initiate an Investigation Pursuant to Section 403. ……………20 COUNT I………………………………………………………………………………………...20
    [Show full text]
  • Institutional and Technological Design Development Through Use Of
    Institutional and Technological Design Development Through Use of Case Based Discussion Arindrajit Basu, Elonnai Hickok and Regulatory Amber Sinha Interventions For Emerging Economies Governing The Use Of Artificial Intelligence In Public Functions Regulatory Interventions For Emerging Economies Governing The Use Of Artificial Intelligence In Public Functions Introduction Background and Scope The use of artificial intelligence (AI) driven decision making in public functions has been touted around the world as a means of augmenting human capacities, removing bureaucratic fetters, and benefiting society. Yet, with concerns over bias, fairness, and a lack of algorithmic accountability, it is being increasingly recognized that algorithms have the potential to exacerbate entrenched structural inequality and threaten core constitutional values. While these concerns are applicable to both the private and public sector, this paper focuses on recommendations for public sector use, as standards of comparative constitutional law dictate that the state must abide by the full scope of fundamental rights articulated both in municipal and international law. For example, as per Article 13 of the Indian Constitution, whenever the government is exercising a “public function”, it is bound by the entire range of fundamental rights articulated in Part III of the Constitution. However, the definition and scope of “public function” is yet to be clearly defined in any jurisdiction, and certainly has no uniformity across countries. This poses a unique challenge to the regulation of AI projects in emerging economies. Due to a lack of government capacity to implement these projects in their entirety, many private sector organizations are involved in functions which were traditionally identified in India as public functions, such as policing, education, and banking.
    [Show full text]
  • Worldwide Privacy Regulations Restricting Access to Genealogical Records Jan Meisels Allen
    IAJGS 38th International Conference on Jewish Genealogy August 6, 2018 Warsaw, Poland Worldwide Privacy Regulations Restricting Access to Genealogical Records Jan Meisels Allen Genealogists without records can’t do genealogy! We are facing crises worldwide on access to vital records due to misunderstandings by those in power about identity theft and fraud and due to budget cuts Privacy Someone's right to keep their personal matters and relationships secret Why Do We Care About Privacy? There are many people who value their privacy, and wouldn't dream of posting personal information about themselves or their family where everyone can see it. Some of those people are my cousins, and some of them are your cousins - but how could you and I hope to connect with them online given their concerns? Do You Want Your Information Available to Everyone? We want others to provide information to us. Do we want our personal information posted to the Internet? European Union Members 28 Countries Austria Belgium Bulgaria Czech Croatia Cyprus Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Poland Portugal Romania Slovakia Slovenia Spain Sweden Until 3-29- United Kingdom 2019 European Union - 2 • 28 Countries until BREXIT takes place - 29 March 2019 • 500 million residents • Right to be forgotten/erased • Google has ~90% of Search Engine Market in Europe-varies by country • Since May 29, 2014 Google received 698,395 requests to delink from 2,615,742 URLs. They did not remove 44 percent of the URLs requested. • Fall 2016 CJEU ruled hyperlinking by third-party website (search engine) without consent of holder constitutes a "communication to the public“ and doing so is a violation of EU copyright directive.
    [Show full text]
  • Video Surveillance in Norway and Denmark
    On the Threshold to Urban Panopticon? Analysing the Employment of CCTV in European Cities and Assessing its Social and Political Impacts RTD-Project (September 2001 – February 2004) 5th Framework Programme of the European Commission Contract No.: HPSE-CT2001-00094 [email protected] www.urbaneye.net Working Paper No. 4 Restrictive? Permissive? The Contradictory Framing of Video Surveillance in Norway and Denmark Carsten Wiecek & Ann Rudinow Sætnan [email protected] [email protected] Department of Sociology and Political Science Norwegian University of Science and Technology Dragvoll, 7491 Trondheim, Norway March 2002 Project Co-ordination: Centre for Technology and Society Technical University Berlin www.ztg.tu-berlin.de Urbaneye: Video Surveillance in Norway and Denmark 1 Table of Content TABLE OF CONTENT ......................................................................................................... 1 1 INTRODUCTION -- WHY TWO COUNTRIES? ..........................................................2 2 INTRODUCING NORWAY AND DENMARK.............................................................3 2.1 CCTV IN NORWAY AND DENMARK............................................................................ 6 2.2 OPEN STREET SYSTEMS AND THE ROLE OF THE POLICE ................................................. 9 3 LEGAL FRAMEWORK ..............................................................................................11 3.1 LEGAL STRUCTURES AND TEXTS.................................................................................12
    [Show full text]