757 resultados para Privacy, right of
Resumo:
During the last decades, the virtual world increasingly gained importance and in this context the enforcement of privacy rights became more and more difficult. An important emanation of this trend is the right to be forgotten enshrining the protection of the data subject’s rights over his/her “own” data. Even though the right to be forgotten has been made part of the proposal for a completely revised Data Protection Regulation and has recently been acknowledged by the Court of Justice of the European Union (“Google/Spain” decision), to date, the discussions about the right and especially its implementation with regard to the fundamental right to freedom of expression have remained rather vague and need to be examined in more depth.
Resumo:
The enforcement of Intellectual Property rights poses one of the greatest current threats to the privacy of individuals online. Recent trends have shown that the balance between privacy and intellectual property enforcement has been shifted in favour of intellectual property owners. This article discusses the ways in which the scope of preliminary discovery and Anton Piller orders have been overly expanded in actions where large amounts of electronic information is available, especially against online intermediaries (service providers and content hosts). The victim in these cases is usually the end user whose privacy has been infringed without a right of reply and sometimes without notice. This article proposes some ways in which the delicate balance can be restored, and considers some safeguards for user privacy. These safeguards include restructuring the threshold tests for discovery, limiting the scope of information disclosed, distinguishing identity discovery from information discovery, and distinguishing information preservation from preliminary discovery.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
A new era of visible and sharable electricity information is emerging. Where eco-feedback is installed, households can now visualise many aspects of their energy consumption and share this information with others through Internet platforms such as social media. Despite providing users with many affordances, eco-feedback information can make public previously private actions from within the intimate setting of the family home. This paper represents a study focussing specifically on the privacy aspects of nascent ways for viewing and sharing this new stream of personal information. It explores the nuances of privacy related to eco-feedback both within and beyond the family home. While electricity consumption information may not be considered private itself, the household practices which eco-feedback systems makes visible may be private. We show that breaches of privacy can occur in unexpected ways and have the potential to cause distress. The paper concludes with some suggestions for how to realise the benefits of sharing energy consumption information whist effectively maintaining individuals’ conceptions of adequate privacy.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
This thesis examines the right to self-determination which is a norm used for numerous purposes by multiple actors in the field of international relations, with relatively little clarity or agreement on the actual and potential meaning of the right. In international practice, however, the main focus in applying the right has been in the context of decolonization as set by the United Nations in its early decades. Thus, in Africa the right to self-determination has traditionally implied that the colonial territories, and particularly the populations within these territories, were to constitute the people who were entitled to the right. That is, self-determination by decolonization provided a framework for the construction of independent nation-states in Africa whilst other dimensions of the right remained largely or totally neglected. With the objective of assessing the scope, content, developments and interpretations of the right to self-determination in Africa, particularly with regard to the relevance of the right today, the thesis proceeds on two fundamental hypotheses. The first is that Mervyn Frost s theory of settled norms, among which he lists the right to self-determination, assumes too much. Even if the right to self-determination is a human right belonging to all peoples stipulated, inter alia, in the first Article of the 1966 International Human Rights Covenants, it is a highly politicized and context-bound right instead of being settled and observed in a way that its denial would need special justification. Still, the suggested inconsistency or non-compliance with the norm of self-determination is not intended to prove the uselessness or inappropriateness of the norm, but, on the contrary, to invite and encourage debate on the potential use and coverage of the right to self-determination. The second hypothesis is that within the concept of self-determination there are two normative dimensions. One is to do with the idea and practice of statehood, the nation and collectivity that may decide to conduct itself as an independent state. The other one is to do with self-determination as a human right, as a normative condition, to be enjoyed by people and peoples within states that supersedes state authority. These external and internal dimensions need to be seen as complementary and co-terminous, not as mutually exclusive alternatives. The thesis proceeds on the assumption that the internal dimension of the right, with human rights and democracy at its core, has not been considered as important as the external. In turn, this unbalanced and selective interpretation has managed to put the true normative purpose of the right making the world better and bringing more just polity models into a somewhat peculiar light. The right to self-determination in the African context is assessed through case studies of Western Sahara, Southern Sudan and Eritrea. The study asks what these cases say about the right to self-determination in Africa and what their lessons learnt could contribute to the understanding and relevance of the right in today s Africa. The study demonstrates that even in the context of decolonization, the application of the right to self-determination has been far from the consistent approach supposedly followed by the international community: in many respects similar colonial histories have easily led to rather different destinies. While Eritrea secured internationally recognized right to self-determination in the form of retroactive independence in 1993, international recognition of distinct Western Sahara and Southern Sudan entities is contingent on complex and problematic conditions being satisfied. Overall, it is a considerable challenge for international legality to meet empirical political reality in a meaningful way, so that the universal values attached to the norm of self-determination are not overlooked or compromised but rather reinforced in the process of implementing the right. Consequently, this thesis seeks a more comprehensive understanding of the right to self-determination with particular reference to post-colonial Africa and with an emphasis on the internal, human rights and democracy dimensions of the norm. It is considered that the right to self-determination cannot be perceived only as an inter-state issue as it is also very much an intra-state issue, including the possibility of different sub-state arrangements exercised under the right, for example, in the form of autonomy. At the same time, the option of independent statehood achieved through secession remains a mode of exercising and part of the right to self-determination. But in whatever form or way applied, the right to self-determination, as a normative instrument, should constitute and work as a norm that comprehensively brings more added value in terms of the objectives of human rights and democracy. From a normative perspective, a peoples right should not be allowed to transform and convert itself into a right of states. Finally, in light of the case studies of Western Sahara, Southern Sudan and Eritrea, the thesis suggests that our understanding of the right to self-determination should now reach beyond the post-colonial context in Africa. It appears that both the questions and answers to the most pertinent issues of self-determination in the cases studied must be increasingly sought within the postcolonial African state rather than solely in colonial history. In this vein, the right to self-determination can be seen not only as a tool for creating states but also as a way to transform the state itself from within. Any such genuinely post-colonial approach may imply a judicious reconsideration, adaptation or up-dating of the right and our understanding of it in order to render it meaningful in Africa today.
Resumo:
This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of technology change, the laws should be interpreted to apply broadly to protect privacy interests. Enhanced privacy protection may in fact lead to greater adoption of e-money by consumers.
Resumo:
The idea of participation is becoming increasingly important in international human rights law and recent political and constitutional theory. There is an emerging international law right of minorities to participate in public life. There are many problems though with putting this right into practice. It is not enough to offer formal opportunities for representation or even to facilitate more participatory processes. This article explores how participation is more easily proclaimed than practised by examining the position of one ethnic minority, Travellers, in a liberal democracy, Ireland. While there are many formal opportunities for participation, these do not necessarily result in effective participation on a basis of equality, and may still result in decisions which fail to consider the Traveller culture and identity. Travellers still suffer from an imbalance of power in these arrangements. There are hopeful avenues to pursue in improving participation, the role of civil society and the use of a dialogue between non-governmental organisations and international organisations to put pressure on a national government, including special representation to offset the disadvantages of traditional representative democracy and emphasising the role of special parliamentary bodies; and the need to address the politics of recognition so as to strengthen the hand of disadvantaged groups such as Travellers.
Resumo:
In Canada freedom of information must be viewed in the context of governing -- how do you deal with an abundance of information while balancing a diversity of competing interests? How can you ensure people are informed enough to participate in crucial decision-making, yet willing enough to let some administrative matters be dealt with in camera without their involvement in every detail. In an age when taxpayers' coalition groups are on the rise, and the government is encouraging the establishment of Parent Council groups for schools, the issues and challenges presented by access to information and protection of privacy legislation are real ones. The province of Ontario's decision to extend freedom of information legislation to local governments does not ensure, or equate to, full public disclosure of all facts or necessarily guarantee complete public comprehension of an issue. The mere fact that local governments, like school boards, decide to collect, assemble or record some information and not to collect other information implies that a prior decision was made by "someone" on what was important to record or keep. That in itself means that not all the facts are going to be disclosed, regardless of the presence of legislation. The resulting lack of information can lead to public mistrust and lack of confidence in those who govern. This is completely contrary to the spirit of the legislation which was to provide interested members of the community with facts so that values like political accountability and trust could be ensured and meaningful criticism and input obtained on matters affecting the whole community. This thesis first reviews the historical reasons for adopting freedom of information legislation, reasons which are rooted in our parliamentary system of government. However, the same reasoning for enacting such legislation cannot be applied carte blanche to the municipal level of government in Ontario, or - ii - more specifially to the programs, policies or operations of a school board. The purpose of this thesis is to examine whether the Municipal Freedom of Information and Protection of Privacy Act, 1989 (MFIPPA) was a neccessary step to ensure greater openness from school boards. Based on a review of the Orders made by the Office of the Information and Privacy Commissioner/Ontario, it also assesses how successfully freedom of information legislation has been implemented at the municipal level of government. The Orders provide an opportunity to review what problems school boards have encountered, and what guidance the Commissioner has offered. Reference is made to a value framework as an administrative tool in critically analyzing the suitability of MFIPPA to school boards. The conclusion is drawn that MFIPPA appears to have inhibited rather than facilitated openness in local government. This may be attributed to several factors inclusive of the general uncertainty, confusion and discretion in interpreting various provisions and exemptions in the Act. Some of the uncertainty is due to the fact that an insufficient number of school board staff are familiar with the Act. The complexity of the Act and its legalistic procedures have over-formalized the processes of exchanging information. In addition there appears to be a concern among municipal officials that granting any access to information may be violating personal privacy rights of others. These concerns translate into indecision and extreme caution in responding to inquiries. The result is delay in responding to information requests and lack of uniformity in the responses given. However, the mandatory review of the legislation does afford an opportunity to address some of these problems and to make this complex Act more suitable for application to school boards. In order for the Act to function more efficiently and effectively legislative changes must be made to MFIPPA. It is important that the recommendations for improving the Act be adopted before the government extends this legislation to any other public entities.
Resumo:
L’avénement des réseaux sociaux, tel que Facebook, MySpace et LinkedIn, a fourni une plateforme permettant aux individus de rester facilement connectés avec leurs amis, leurs familles ou encore leurs collègues tout en les encourageant activement à partager leurs données personnelles à travers le réseau. Avec la richesse des activités disponibles sur un réseau social, la quantité et la variété des informations personnelles partagées sont considérables. De plus, de part leur nature numérique, ces informations peuvent être facilement copiées, modifiées ou divulguées sans le consentement explicite de leur propriétaire. Ainsi, l’information personnelle révélée par les réseaux sociaux peut affecter de manière concrète la vie de leurs utilisateurs avec des risques pour leur vie privée allant d’un simple embarras à la ruine complète de leur réputation, en passant par l’usurpation d’identité. Malheureusement, la plupart des utilisateurs ne sont pas conscients de ces risques et les outils mis en place par les réseaux sociaux actuels ne sont pas suffisants pour protéger efficacement la vie privée de leurs utilisateurs. En outre, même si un utilisateur peut contrôler l’accès à son propre profil, il ne peut pas contrôler ce que les autres révèlent à son sujet. En effet, les “amis” d’un utilisateur sur un réseau social peuvent parfois révéler plus d’information à son propos que celui-ci ne le souhaiterait. Le respect de la vie privée est un droit fondamental pour chaque individu. Nous pré- sentons dans cette thèse une approche qui vise à accroître la prise de conscience des utilisateurs des risques par rapport à leur vie privée et à maintenir la souveraineté sur leurs données lorsqu’ils utilisent un réseau social. La première contribution de cette thèse réside dans la classification des risques multiples ainsi que les atteintes à la vie privée des utilisateurs d’un réseau social. Nous introduisons ensuite un cadre formel pour le respect de la vie privée dans les réseaux sociaux ainsi que le concept de politique de vie privée (UPP). Celle-ci définie par l’utilisateur offre une manière simple et flexible de spécifier et communiquer leur attentes en terme de respect de la vie privée à d’autres utilisateurs, tiers parties ainsi qu’au fournisseur du réseau social. Par ailleurs, nous dé- finissons une taxonomie (possiblement non-exhaustive) des critères qu’un réseau social peut intégrer dans sa conception pour améliorer le respect de la vie privée. En introduisant le concept de réseau social respectueux de la vie privée (PSNS), nous proposons Privacy Watch, un réseau social respectueux de la vie privée qui combine les concepts de provenance et d’imputabilité afin d’aider les utilisateurs à maintenir la souveraineté sur leurs données personnelles. Finalement, nous décrivons et comparons les différentes propositions de réseaux sociaux respectueux de la vie privée qui ont émergé récemment. Nous classifions aussi ces différentes approches au regard des critères de respect de la vie privée introduits dans cette thèse.
Resumo:
Cet article met en lumière la perspective européenne sur un des plus importants défis que l’Internet et le Web 2.0 présente pour la vie privée et le droit à la protection des données. L’auteur y soulève des problématiques liées à la mémoire numérique et distingue à partir de plusieurs cas où les individus seraient intéressés de réclamer l'oubli tant dans les réseaux sociaux, les journaux officiels des gouvernements et dans les bibliothèques médiatiques numériques. Il trace l’histoire de l’identification du droit à l’oubli dont les fondements ont été définis par les agences françaises, italiennes et espagnoles de protection des données. En conclusion, il pose son regard sur un nouveau cadre européen de la protection des données comprenant le droit individuel à voir leurs données supprimées lorsqu’elles ne sont plus nécessaires à des fins légitimes.
Resumo:
Conscientious objection is defined as the ability to depart from statutory mandates because of intimate convictions based on ethical or religious convictions. A discussion of this issue presents the conflict between the idea of a State concerned with the promotion of individual rights or the protection of general interests and an idea of law based on the maintenance of order and against a view of the law as a means to claim the protection of minimum conditions of the person. From this conflict is drawn the possibility to argue whether conscientious objection should be guaranteed as a fundamental right of freedom of conscience or as a statutory authority legislatively conferred upon persons. This paper sets out a discussion around the two views so as to develop a position that is more consistent with the context of social and constitutional law.
Resumo:
This Article examines state court cases involving the right to arms, during the first century following ratification of the Amendment in 1791. This is not the first article to survey some of those cases. This Article includes additional cases, and details the procedural postures and facts, not only the holdings. The Article closely examines how the Supreme Court integrated the nineteenth century arms cases into Heller and McDonald to shape modern Second Amendment law. Part I briefly explains two English cases which greatly influenced American legal understandings. Semayne’s Case is the foundation of “castle doctrine” — the right to home security which includes the right of armed self-defense in the home. Sir John Knight’s Case fortified the tradition of the right to bear arms, providing that the person must bear arms in a non-terrifying manner. Part II examines American antebellum cases; these are the cases to which Heller looked for guidance on the meaning of the Second Amendment. Part III looks at cases from Reconstruction and the early years of Jim Crow, through 1891. As with the antebellum cases, the large majority of post-war cases are from the Southeast, which during the nineteenth century was the region most ardent for gun control. The heart of gun control country was Tennessee and Arkansas; courts there resisted some infringements of the right to arms, but eventually gave up. Heller and McDonald did not look to the Jim Crow cases as constructive precedents on the Second Amendment.
Resumo:
Thesis (Master's)--University of Washington, 2016-06
Resumo:
Abstract: In the mid-1990s when I worked for a telecommunications giant I struggled to gain access to basic geodemographic data. It cost hundreds of thousands of dollars at the time to simply purchase a tile of satellite imagery from Marconi, and it was often cheaper to create my own maps using a digitizer and A0 paper maps. Everything from granular administrative boundaries to right-of-ways to points of interest and geocoding capabilities were either unavailable for the places I was working in throughout Asia or very limited. The control of this data was either in a government’s census and statistical bureau or was created by a handful of forward thinking corporations. Twenty years on we find ourselves inundated with data (location and other) that we are challenged to amalgamate, and much of it still “dirty” in nature. Open data initiatives such as ODI give us great hope for how we might be able to share information together and capitalize not only in the crowdsourcing behavior but in the implications for positive usage for the environment and for the advancement of humanity. We are already gathering and amassing a great deal of data and insight through excellent citizen science participatory projects across the globe. In early 2015, I delivered a keynote at the Data Made Me Do It conference at UC Berkeley, and in the preceding year an invited talk at the inaugural QSymposium. In gathering research for these presentations, I began to ponder on the effect that social machines (in effect, autonomous data collection subjects and objects) might have on social behaviors. I focused on studying the problem of data from various veillance perspectives, with an emphasis on the shortcomings of uberveillance which included the potential for misinformation, misinterpretation, and information manipulation when context was entirely missing. As we build advanced systems that rely almost entirely on social machines, we need to ponder on the risks associated with following a purely technocratic approach where machines devoid of intelligence may one day dictate what humans do at the fundamental praxis level. What might be the fallout of uberveillance? Bio: Dr Katina Michael is a professor in the School of Computing and Information Technology at the University of Wollongong. She presently holds the position of Associate Dean – International in the Faculty of Engineering and Information Sciences. Katina is the IEEE Technology and Society Magazine editor-in-chief, and IEEE Consumer Electronics Magazine senior editor. Since 2008 she has been a board member of the Australian Privacy Foundation, and until recently was the Vice-Chair. Michael researches on the socio-ethical implications of emerging technologies with an emphasis on an all-hazards approach to national security. She has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation and surveillance/ uberveillance for Proceedings of the IEEE, Computer and IEEE Potentials. Prior to academia, Katina worked for Nortel Networks as a senior network engineer in Asia, and also in information systems for OTIS and Andersen Consulting. She holds cross-disciplinary qualifications in technology and law.