E. Bryan - E-Governance and Personal Privacy

1,089
-1

Published on

Critically discussion on the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,089
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 06/08/09 12:17
  • E. Bryan - E-Governance and Personal Privacy

    1. 1. eGovernment & Personal Privacy Emerson O. St. G. Bryan Information Management Specialist 2008 March 24
    2. 2. Assignment Question <ul><li>Critically discuss the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information. </li></ul>
    3. 3. Session Outline: <ul><li>First Things, First… </li></ul><ul><li>Political, social and technological dimensions </li></ul><ul><li>Orwellian State? </li></ul><ul><li>Legislative Matters </li></ul>08/06/09
    4. 4. First Things, First…
    5. 5. First things, first… <ul><li>What is Personal Information? </li></ul><ul><li>&quot;Personal information&quot; is information about a natural person that is readily identifiable to that individual, such as an individual's name, address and telephone number. </li></ul><ul><li>Thomas Riley, 2007 </li></ul>
    6. 6. Political, social and technological dimensions
    7. 7. Political, social and technological dimensions (1) <ul><li>Advantages </li></ul><ul><li>Ability to introduce legislations, programmes, and technology if there is ‘buy in’ by the head of the political directorate. </li></ul><ul><li>Centralized authority with responsibility for e-monitoring </li></ul><ul><li>Disadvantages </li></ul><ul><li>Usually one-way flow of information (national security) </li></ul>
    8. 8. Political, social and technological dimensions (2) <ul><li>Monitoring and compliance campaigns through state surveillance (political promises): </li></ul><ul><ul><li>Border control systems, e.g., Barbados’ GAIA (Common User Terminal Equipment - CUTE) </li></ul></ul><ul><ul><li>Machine readable passports </li></ul></ul><ul><ul><li>Mobile police scanners for crime fighting e.g. RBPF, JCF </li></ul></ul><ul><ul><li>GPS (Tracking government transportation in Jamaica) </li></ul></ul><ul><ul><li>Magnetic card readers (Jamaican Urban Transit Corporation) </li></ul></ul><ul><ul><li>TTPF Blimps to monitor criminal activities (Trinidad) </li></ul></ul>
    9. 9. Political, social and technological dimensions (3) <ul><li>Advantages </li></ul><ul><li>People are eager to use the technology </li></ul><ul><li>When marketed properly there is huge buy-in. </li></ul><ul><li>Disadvantages </li></ul><ul><li>Privacy and Access issues (content not being properly managed/poor communications etc.) </li></ul>
    10. 10. Political, social and technological dimensions (4) <ul><li>Technology: </li></ul><ul><li>ECHELON is a name used in global media and in popular culture to describe a signals intelligence collection and analysis network operated on behalf of the five signatory states to the UKUSA agreement ; Australia, Canada, New Zealand, the United Kingdom and the United States, known as AUSCANZUKUS </li></ul><ul><li>CARNIVORE is a system that was used by the FBI to trace the online activates of a suspect. </li></ul>
    11. 11. Orwellian States?
    12. 12. Orwellian State? <ul><li>The world has changed since 9/11 </li></ul><ul><li>When I speak of an Orwellian State I mean a “Police State” where the government regulates every single action of the citizenry. </li></ul><ul><li>See: “Enemy of the State”, “Equilibrium”, “Time Cop”, “Matrix Trilogy” etc. where the State plays an important role in the lives of everyday people to ensure a “secure society” </li></ul>
    13. 13. Orwellian State? <ul><ul><li>According to Edwards (2005) </li></ul></ul><ul><ul><li>Data collected often combined with other databases to form more complete profiles of consumers/citizens. </li></ul></ul><ul><ul><li>Often involves linking of data gathered ON-line with OFF-line. New data can be extracted from large databases. </li></ul></ul><ul><ul><ul><li>Eg. Tesco’s Crucible database ( Guardian, Sept 05) </li></ul></ul></ul><ul><ul><ul><li>Eg Doubleclick/Abacus scandal, 1999 </li></ul></ul></ul><ul><ul><ul><li>Eg “joined up government” projects often link government t dbs eg to promote child safety, to enable terrorist detection (see failed US Total Information Awareness project), to detect illegal immigrant use of services(UK ID cards database?) </li></ul></ul></ul>
    14. 14. Legislative Matters
    15. 15. Legislative Matters <ul><li>States argue that they must have the right to invade personal privacy for the following reasons: </li></ul><ul><li>Monitoring narcotic and other nefarious activities; </li></ul><ul><li>Due diligence for financial activities; </li></ul><ul><li>Pedophilia and other sex crimes; </li></ul><ul><li>Terrorism and national security </li></ul><ul><li>Espionage </li></ul>
    16. 16. Some notable laws… <ul><li>The US Patriot Act ; </li></ul><ul><ul><li>Monitoring of information used within libraries, emails, IMs exchange, personal documents etc. </li></ul></ul><ul><ul><li>Personal Information within databases; </li></ul></ul><ul><ul><li>Content being exchanged over networks etc; </li></ul></ul><ul><ul><li>New data storage and processing devices, etc. biometrics in passports, driver’s licenses, etc. </li></ul></ul><ul><li>Anti-Terrorism Acts (Jamaica, Bahamas, Trinidad & Tobago and most other CARICOM states); </li></ul><ul><li>Freedom of Information Acts (Antigua & Barbuda, Belize, Jamaica, Trinidad & Tobago, and St. Vincent & the Grenadines); </li></ul><ul><li>Data Protection & Privacy Acts – These are usually not present in Caribbean jurisdictions, and instead enjoy coverage under FOI (exempted areas0 </li></ul>
    17. 17. Some final thoughts… <ul><li>It is good that governments, agencies, and departments are working together with common data/information sets; </li></ul><ul><li>E-Commerce can flourish if secured and managed properly; </li></ul><ul><li>Greater sharing of information for crime fighting needed (ICC CWC 07, InterPol, Border control). </li></ul><ul><li>We share personal information already (social networks: hi5, facebook, myspace etc.) </li></ul>
    18. 18. <ul><li>Any Questions? </li></ul>
    19. 19. Works/ Sites Consulted: <ul><li>Anderson, Paige & Jim Dempsey, 2002, Privacy and E-Government: Privacy Impact Assessments and Privacy Commissioners –Two Mechanisms for Protecting Privacy to Promote Citizen Trust Online . 11 March 2008.<http://www.privacyinternational.org/survey/phr2002/> </li></ul><ul><li>Branscomb, Wells A. 1994, Who Owns Information? From Privacy to Public Access, Basic Books, New York </li></ul><ul><li>Commonwealth Centre for E-Governance <http://www.electronicgov.net/pubs/workshop_reports/security-privacy03.shtml> </li></ul><ul><li>Dempsey, James et al, 2003, Privacy & E-Government < http://www.internetpolicy.net/privacy/20030523cdt.pdf> </li></ul><ul><li>Edwards, Lillian, 2004, Taking the “Personal” Out of Personal Data: Durant v FSA and its Impact on the Legal Regulation of CCTV” (2004) 1:2 SCRIPT-ed. </li></ul><ul><li>Escalante, Richard, 2005, E-government and Information Privacy in Caribbean Developing Societies , World Forum Proceedings of the International Research Foundation for Development, WSIS Summit. 22 March 2008 <http://www.irfd.org/events/wf2005/abstracts_t8.htm> </li></ul><ul><li>Koster, Erica, Zero Privacy: Personal Data on the Internet , The Computer Lawyer, May 1999. 23 March 2008 <http://www.oppenheimer.com/news/content/zeroprivacy.htm> </li></ul><ul><li>Orwell, George, 1949 , 1984, Secker & Warburg, London </li></ul><ul><li>Riley, Thomas, 2005, E-Privacy, Anonymity and Public Spaces: What is this all about? 24 March 2008 <http://www.rileyis.com/publications/research_papers/PrivAnonNymity05.html> </li></ul>

    ×