SlideShare a Scribd company logo
1 of 19
IT Law: the Middle Kingdom 
between East and West 
Lilian Edwards 
Professor of E-Governance and Director, 
Centre for Internet law and Policy 
University of Strathclyde
http://www.strath.ac.uk/internetlaw/ Lilian.edwards@strath.ac.uk
Privacy as a Middle Kingdom 
Security 
Privacy 
Business 
profits 
Freedom of 
speech 
Consumer 
convenience
Lessons for China? 
• Privacy vs security – recent Western 
experience 
• Impact of lack of privacy on profit – 
recent Western experience 
• Does limiting privacy law in favour of 
other values work? 
• What can China learn from this?
Privacy vs security
Richard Hannigan, Director 
GCHQ, 3 November 2014 
• Calling for technology firms such as as Facebook and Google to 
share personal data of users more readily with security service s 
eg by not supplying stronger encryption to consumers in the wake 
of Snowden 
• Tech firms “little more than “command and control networks of 
choice for terrorists and criminals” 
• “GCHQ is happy to be part of a mature debate on privacy in the 
digital age. But privacy has never been an absolute right and the 
debate about this should not become a reason for postponing 
urgent and difficult decisions.”
Privacy and profit
OBA: data as “the new oil” of the 
economy 
• “Advertising based on the observation of the behaviour of individuals over 
time. Behavioural advertising seeks to study the characteristics of this 
behaviour through their actions (repeated site visits, interactions, 
keywords, online content production etc) in order to develop a specific 
profile and provide data subjects with adverts tailored to match their 
inferred interests” (Art 29 WP 2/2010) 
• Online advertising now largest sector in UK (since 2009) c 30% – bigger 
than TV, radio, newsprint etc. c 59% spend of this on search ads , mainly 
AdWords (Google revenues). 
• IAB: Social media revenues - advertising delivered on social platforms, inc 
social networking and social gaming -> rose by 58% H1 2014. Mobile 
revenues increased 76%. 
• Wired: “every industry that becomes digital eventually becomes free” 
(Anderson, 2008) 
• Failure to find other business models for digital world?
Big data 
• “If information wants to be free, data 
wants to merge” (Grossman) 
• UK Government Information Economy 
Strategy 2013: 90% of global data 
generated in the last 2 years -> 
“business sectors across the economy 
have the potential to be transformed 
by data, analytics and modelling” 
• “..UK Government will continue to drive 
and influence EU …to ensure that 
growth opportunities are not inhibited 
by new or existing levels of regulation” 
• ? Challenges DP princs of data 
minimisation and purpose specification 
(Tene and Polonetsky, 2013) – “fishing 
expedition”
Big bureaucracy? 
• Considerable opposition by both UK and US to enactment of 
General Data Protection Regulation to improve data privacy in EU – 
not “business friendly” 
• HMG Seizing the Data Opportunity 2013 : “the GDPR does not strike 
the correct balance between ’privacy and innovation.. we should be 
careful about overly prescriptive regulation that increases red tape 
and costs for businesses, the public sector, and for regulators” 
• Similar earlier reactions by industry to new laws on cookies consent 
2009-2011 – OUT-law “Please kill this cookie monster to save EU 
websites” 
• And to the “right to be forgotten” (Google Spain), HL, 2014: 
“..judgment of the Court is unworkable. It does not take into account 
the effect the ruling will have on smaller search engines which, 
unlike Google, are unlikely to have the resources to process the 
thousands of removal requests they are likely to receive.”
Privacy and consumer enjoyment 
C4, May 2010
From virtual to real world “sharing”: consumers gain? 
Smart meters
Privacy and freedom of expression
How does the law protect informational 
privacy? 
• International human rights law eg ECHR, UNDHR 
• Specific international guidelines/treaties/supranational law 
– OECD guidelines on personal data,1980 
– Council of Europe Convention on Automatic Processing of 
Personal Data 1981 
– EC Data protection law – required minimum in EU states - 
taken up as “gold standard” in many overseas states 
– US : no similar omnibus protection of personal data – but some 
strong sectoral laws eg health, financial info, kids data 
– China : no omnibus “DP” law but increasing legal protection in 
Internet related sector 
• What lessons can China learn from current concerns about 
balancing privacy, security and profit?
Data Protection Principles – DP Directive 95/46/EC 
1. Personal Data shall be processed lawfully and fairly (“collection 
limitation”). 
2. Personal Data shall be obtained only for one or more specified 
and lawful purposes, and shall not be further processed in a 
manner incompatible with those purposes (“purpose /use 
limitation”). 
3. Personal data shall be adequate, relevant and not excessive in 
relation to the purpose for which it was processed (add “data 
minimisation” principle? – DP Reg) 
4. Personal data shall be accurate and kept to date if necessary 
(“data quality”). 
5. Personal data shall not be kept for a longer time than it is 
necessary for its purpose. (“retention”) 
6. Personal data can only be processed in accordance with the rights 
of the data subjects (“openness”) 
7. Appropriate technical and organisational measures shall be taken 
against unauthorised or unlawful processing (“security”). 
8. Data export principle 
PLUS – independent regulator/watchdog + some degree of 
bureaucracy for business?
Global adoption of DP law (or DP+)as a 
standard for privacy rights? 
• Greenleaf 2012 – not EU v US anymore 
• DP laws fast becoming a comprehensive global 
standard – 89 such laws 2012, growing fast 
• Only just over half are in European states (56%) 
• 2/3 of APEC members have data privacy laws in private 
or public sector 
• Some new laws exceed current EU DP norms, rts of 
interoperability, privacy by design, etc – “third wave” 
• Remaining outliers among “digital” nations – China and 
the US!
Privacy vs security OR loss of privacy -> 
loss of profit? 
1. Does promoting security over privacy help industry? 
Snowden – loss of consumer confidence in both B2C and B2B markets in EU 
• Evidence from EU industry 
– Information Technology & Innovation Foundation report, 2014 – US cloud providers may lose 
10-20% of their EU market share = $35 billion over the next three years 
– Cloud Security Alliance report,10% of 207 non EU companies had cancelled contracts with US 
cloud cos since Snowden 
– NTT Comms report: c 25-30% of IT decisionmakers in Germany, France, UK “wanted to keep 
data in own country” 
– AWS setting up German data centre 
– “"Right now, there are many customers who don't want to buy American -- or to buy from a 
NATO country in general," F-Secure 
– Impact on government procurement - 
• Evidence from non-EU states 
– Election officials in India canceled a deal with Google to improve voter registration. 
– In China, sales of Cisco routers dropped 10 percent (Huffington Post) 
– Russia ban on user data being stored in US -> possible ban on all Apple products ( 
• Reaction from UK industry and government- 
– Plea for ethical codes and MORE privacy restraints/supervision for industry not LESS 
– “Addressing consumer confidence in the Digital Economy” – DP plus ethical approval for new 
big data products, security by design, privacy by design – IEC committee 
– “A Unified Ethical Frame for Big Data Analysis” , industry, lead by Hewlett Packard
Privacy vs consumer convenience? 
• Do consumers care about privacy after all? Not just about 
business attitudes? 
• Citizen attitudes towards data privacy – EuroBarometer 201 
• People disclose personal data, including biographical 
information (almost 90%), social information 
(almost 50%) and sensitive information (almost 
10%) on these sites. 
• 70% said they were concerned about how companies 
use this data and they think that they have only 
partial, if any, control of their own data. 
• 74% want to give their specific consent before their 
` data is collected and processed on the Internet. 
• Privacy affecting if not ending data market – cf rise of 
Snapchat, Whatsapp, Ello – privacy as a feature not a bug
Conclusions 
• Privacy is seen as a value which may be damaging to 
other more crucial societal goals such as (crucially) 
national security, business profits 
• These are both concerns to legislatures in China and 
the EU/UK 
• However recent history shows that downgrading 
privacy protection in the name of security and profit 
may be counter productive 
• And the global trend is in fact to greater privacy 
protection – by both soft and hard law as well as 
“code” - to restore business and consumer trust and 
confidence

More Related Content

What's hot

Digital economy
Digital economyDigital economy
Digital economyRupaliosho
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Paul Richards
 
Data driven innovation for education
Data driven innovation for education Data driven innovation for education
Data driven innovation for education EduSkills OECD
 
Malaysia's Digital Economy: A New Driver of Development
Malaysia's Digital Economy: A New Driver of DevelopmentMalaysia's Digital Economy: A New Driver of Development
Malaysia's Digital Economy: A New Driver of DevelopmentZiaullah Mirza
 
2. Eleanor Stewart - Key Note: Openness As A Value #pdfua
2. Eleanor Stewart - Key Note: Openness As A Value #pdfua2. Eleanor Stewart - Key Note: Openness As A Value #pdfua
2. Eleanor Stewart - Key Note: Openness As A Value #pdfuaTechSoup Europe
 
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Andrea Omicini
 
Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_toAnne ndolo
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationat MicroFocus Italy ❖✔
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Digital Economy Overview
Digital Economy Overview Digital Economy Overview
Digital Economy Overview Ziaullah Mirza
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
eGovernance Research Grand Challenges
eGovernance Research Grand ChallengeseGovernance Research Grand Challenges
eGovernance Research Grand ChallengesYannis Charalabidis
 
Minnesota iGov a report by the State Chief Information Officer Gopal Khanna
Minnesota iGov a report by the State Chief Information Officer Gopal KhannaMinnesota iGov a report by the State Chief Information Officer Gopal Khanna
Minnesota iGov a report by the State Chief Information Officer Gopal KhannaGopal Khanna
 

What's hot (19)

Digital economy
Digital economyDigital economy
Digital economy
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
Data driven innovation for education
Data driven innovation for education Data driven innovation for education
Data driven innovation for education
 
Malaysia's Digital Economy: A New Driver of Development
Malaysia's Digital Economy: A New Driver of DevelopmentMalaysia's Digital Economy: A New Driver of Development
Malaysia's Digital Economy: A New Driver of Development
 
2. Eleanor Stewart - Key Note: Openness As A Value #pdfua
2. Eleanor Stewart - Key Note: Openness As A Value #pdfua2. Eleanor Stewart - Key Note: Openness As A Value #pdfua
2. Eleanor Stewart - Key Note: Openness As A Value #pdfua
 
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform Operators
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_to
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformation
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Digital Economy Overview
Digital Economy Overview Digital Economy Overview
Digital Economy Overview
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
How Can We Incorporate the Digital Economy into Development Strategies?
How Can We Incorporate the Digital Economy into Development Strategies?How Can We Incorporate the Digital Economy into Development Strategies?
How Can We Incorporate the Digital Economy into Development Strategies?
 
eGovernance Research Grand Challenges
eGovernance Research Grand ChallengeseGovernance Research Grand Challenges
eGovernance Research Grand Challenges
 
Minnesota iGov a report by the State Chief Information Officer Gopal Khanna
Minnesota iGov a report by the State Chief Information Officer Gopal KhannaMinnesota iGov a report by the State Chief Information Officer Gopal Khanna
Minnesota iGov a report by the State Chief Information Officer Gopal Khanna
 

Similar to IT Law: Privacy as a Middle Kingdom Between East and West

The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptGmvViju1
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Meteringnuances
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Meteringnuances
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPiwik PRO
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...e-SIDES.eu
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
Lexing Barcelona Conference
Lexing Barcelona ConferenceLexing Barcelona Conference
Lexing Barcelona ConferenceMarc Gallardo
 
DWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena Capital
DWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena CapitalDWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena Capital
DWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena CapitalIDATE DigiWorld
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Keith Purves
 
D2-5_BIG DATA EmilianoAnzellotti_v2 [
D2-5_BIG DATA EmilianoAnzellotti_v2 [D2-5_BIG DATA EmilianoAnzellotti_v2 [
D2-5_BIG DATA EmilianoAnzellotti_v2 [Emiliano Anzellotti
 

Similar to IT Law: Privacy as a Middle Kingdom Between East and West (20)

The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
DAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.pptDAY 1_ITEM 4_Privacy and personal data protection.ppt
DAY 1_ITEM 4_Privacy and personal data protection.ppt
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Quick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart MeteringQuick Guide: EU General Data Protection Regulation and Smart Metering
Quick Guide: EU General Data Protection Regulation and Smart Metering
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Privacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital SetupPrivacy Regulations and Your Digital Setup
Privacy Regulations and Your Digital Setup
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Lexing Barcelona Conference
Lexing Barcelona ConferenceLexing Barcelona Conference
Lexing Barcelona Conference
 
DWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena Capital
DWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena CapitalDWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena Capital
DWS16 - Plenary - Is trust really necessary - Xavier Lorphelin, Serena Capital
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
D2-5_BIG DATA EmilianoAnzellotti_v2 [
D2-5_BIG DATA EmilianoAnzellotti_v2 [D2-5_BIG DATA EmilianoAnzellotti_v2 [
D2-5_BIG DATA EmilianoAnzellotti_v2 [
 

More from Lilian Edwards

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?Lilian Edwards
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Lilian Edwards
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?Lilian Edwards
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyLilian Edwards
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016 Lilian Edwards
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesLilian Edwards
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Lilian Edwards
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementLilian Edwards
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three ActsLilian Edwards
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Lilian Edwards
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?Lilian Edwards
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three ActsLilian Edwards
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?Lilian Edwards
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Lilian Edwards
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
 

More from Lilian Edwards (19)

Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
 
How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?How to regulate foundation models: can we do better than the EU AI Act?
How to regulate foundation models: can we do better than the EU AI Act?
 
Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.Can ChatGPT be compatible with the GDPR? Discuss.
Can ChatGPT be compatible with the GDPR? Discuss.
 
What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?What Do You Do with a Problem Like AI?
What Do You Do with a Problem Like AI?
 
The GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacyThe GDPR, Brexit, the UK and adequacy
The GDPR, Brexit, the UK and adequacy
 
Slave to the Algorithm 2016
Slave to the Algorithm  2016 Slave to the Algorithm  2016
Slave to the Algorithm 2016
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities Privacy, the Internet of Things and Smart Cities
Privacy, the Internet of Things and Smart Cities
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
From piracy to “The Producers?
From piracy to “The Producers?From piracy to “The Producers?
From piracy to “The Producers?
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?Slave to the Algo-Rhythms?
Slave to the Algo-Rhythms?
 
9worlds robots
9worlds robots9worlds robots
9worlds robots
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinja
 

Recently uploaded

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Divorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfDivorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfdigitalnikesh24
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 

Recently uploaded (20)

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Divorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfDivorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdf
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 

IT Law: Privacy as a Middle Kingdom Between East and West

  • 1. IT Law: the Middle Kingdom between East and West Lilian Edwards Professor of E-Governance and Director, Centre for Internet law and Policy University of Strathclyde
  • 3. Privacy as a Middle Kingdom Security Privacy Business profits Freedom of speech Consumer convenience
  • 4. Lessons for China? • Privacy vs security – recent Western experience • Impact of lack of privacy on profit – recent Western experience • Does limiting privacy law in favour of other values work? • What can China learn from this?
  • 6. Richard Hannigan, Director GCHQ, 3 November 2014 • Calling for technology firms such as as Facebook and Google to share personal data of users more readily with security service s eg by not supplying stronger encryption to consumers in the wake of Snowden • Tech firms “little more than “command and control networks of choice for terrorists and criminals” • “GCHQ is happy to be part of a mature debate on privacy in the digital age. But privacy has never been an absolute right and the debate about this should not become a reason for postponing urgent and difficult decisions.”
  • 8. OBA: data as “the new oil” of the economy • “Advertising based on the observation of the behaviour of individuals over time. Behavioural advertising seeks to study the characteristics of this behaviour through their actions (repeated site visits, interactions, keywords, online content production etc) in order to develop a specific profile and provide data subjects with adverts tailored to match their inferred interests” (Art 29 WP 2/2010) • Online advertising now largest sector in UK (since 2009) c 30% – bigger than TV, radio, newsprint etc. c 59% spend of this on search ads , mainly AdWords (Google revenues). • IAB: Social media revenues - advertising delivered on social platforms, inc social networking and social gaming -> rose by 58% H1 2014. Mobile revenues increased 76%. • Wired: “every industry that becomes digital eventually becomes free” (Anderson, 2008) • Failure to find other business models for digital world?
  • 9. Big data • “If information wants to be free, data wants to merge” (Grossman) • UK Government Information Economy Strategy 2013: 90% of global data generated in the last 2 years -> “business sectors across the economy have the potential to be transformed by data, analytics and modelling” • “..UK Government will continue to drive and influence EU …to ensure that growth opportunities are not inhibited by new or existing levels of regulation” • ? Challenges DP princs of data minimisation and purpose specification (Tene and Polonetsky, 2013) – “fishing expedition”
  • 10. Big bureaucracy? • Considerable opposition by both UK and US to enactment of General Data Protection Regulation to improve data privacy in EU – not “business friendly” • HMG Seizing the Data Opportunity 2013 : “the GDPR does not strike the correct balance between ’privacy and innovation.. we should be careful about overly prescriptive regulation that increases red tape and costs for businesses, the public sector, and for regulators” • Similar earlier reactions by industry to new laws on cookies consent 2009-2011 – OUT-law “Please kill this cookie monster to save EU websites” • And to the “right to be forgotten” (Google Spain), HL, 2014: “..judgment of the Court is unworkable. It does not take into account the effect the ruling will have on smaller search engines which, unlike Google, are unlikely to have the resources to process the thousands of removal requests they are likely to receive.”
  • 11. Privacy and consumer enjoyment C4, May 2010
  • 12. From virtual to real world “sharing”: consumers gain? Smart meters
  • 13. Privacy and freedom of expression
  • 14. How does the law protect informational privacy? • International human rights law eg ECHR, UNDHR • Specific international guidelines/treaties/supranational law – OECD guidelines on personal data,1980 – Council of Europe Convention on Automatic Processing of Personal Data 1981 – EC Data protection law – required minimum in EU states - taken up as “gold standard” in many overseas states – US : no similar omnibus protection of personal data – but some strong sectoral laws eg health, financial info, kids data – China : no omnibus “DP” law but increasing legal protection in Internet related sector • What lessons can China learn from current concerns about balancing privacy, security and profit?
  • 15. Data Protection Principles – DP Directive 95/46/EC 1. Personal Data shall be processed lawfully and fairly (“collection limitation”). 2. Personal Data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in a manner incompatible with those purposes (“purpose /use limitation”). 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose for which it was processed (add “data minimisation” principle? – DP Reg) 4. Personal data shall be accurate and kept to date if necessary (“data quality”). 5. Personal data shall not be kept for a longer time than it is necessary for its purpose. (“retention”) 6. Personal data can only be processed in accordance with the rights of the data subjects (“openness”) 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing (“security”). 8. Data export principle PLUS – independent regulator/watchdog + some degree of bureaucracy for business?
  • 16. Global adoption of DP law (or DP+)as a standard for privacy rights? • Greenleaf 2012 – not EU v US anymore • DP laws fast becoming a comprehensive global standard – 89 such laws 2012, growing fast • Only just over half are in European states (56%) • 2/3 of APEC members have data privacy laws in private or public sector • Some new laws exceed current EU DP norms, rts of interoperability, privacy by design, etc – “third wave” • Remaining outliers among “digital” nations – China and the US!
  • 17. Privacy vs security OR loss of privacy -> loss of profit? 1. Does promoting security over privacy help industry? Snowden – loss of consumer confidence in both B2C and B2B markets in EU • Evidence from EU industry – Information Technology & Innovation Foundation report, 2014 – US cloud providers may lose 10-20% of their EU market share = $35 billion over the next three years – Cloud Security Alliance report,10% of 207 non EU companies had cancelled contracts with US cloud cos since Snowden – NTT Comms report: c 25-30% of IT decisionmakers in Germany, France, UK “wanted to keep data in own country” – AWS setting up German data centre – “"Right now, there are many customers who don't want to buy American -- or to buy from a NATO country in general," F-Secure – Impact on government procurement - • Evidence from non-EU states – Election officials in India canceled a deal with Google to improve voter registration. – In China, sales of Cisco routers dropped 10 percent (Huffington Post) – Russia ban on user data being stored in US -> possible ban on all Apple products ( • Reaction from UK industry and government- – Plea for ethical codes and MORE privacy restraints/supervision for industry not LESS – “Addressing consumer confidence in the Digital Economy” – DP plus ethical approval for new big data products, security by design, privacy by design – IEC committee – “A Unified Ethical Frame for Big Data Analysis” , industry, lead by Hewlett Packard
  • 18. Privacy vs consumer convenience? • Do consumers care about privacy after all? Not just about business attitudes? • Citizen attitudes towards data privacy – EuroBarometer 201 • People disclose personal data, including biographical information (almost 90%), social information (almost 50%) and sensitive information (almost 10%) on these sites. • 70% said they were concerned about how companies use this data and they think that they have only partial, if any, control of their own data. • 74% want to give their specific consent before their ` data is collected and processed on the Internet. • Privacy affecting if not ending data market – cf rise of Snapchat, Whatsapp, Ello – privacy as a feature not a bug
  • 19. Conclusions • Privacy is seen as a value which may be damaging to other more crucial societal goals such as (crucially) national security, business profits • These are both concerns to legislatures in China and the EU/UK • However recent history shows that downgrading privacy protection in the name of security and profit may be counter productive • And the global trend is in fact to greater privacy protection – by both soft and hard law as well as “code” - to restore business and consumer trust and confidence

Editor's Notes

  1. "I believe that 'Central Kingdom' is a more accurate translation for 'Zhong Guo' (China) than 'Middle Kingdom'. The term 'Middle Kingdom' does not imply that China is superior to other peoples and nations around it — China just happens to be located in the middle geographically; the term 'Central Kingdom', however, implies that China is superior to any other people and nation 'under the heaven' and that it thus occupies a 'central' position in the known universe."
  2. “secrets are lies”, “sharing is caring” and “privacy is theft Weibo
  3. “US tech firms are already dealing with intense public skepticism for their role in assisting government-lead, privacy-invading programmes like Prism. I would surmise that Hannigan is well aware of the PR (and potentially economic) disaster that would ensue upon closer collaboration between companies like Facebook or Google and government intelligence agencies