Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
This year I had the opportunity to give a presentation at the World Bank in Washington DC during one of their "brown bag sessions", focused on Privacy, Drones and IoT.
The World Bank is an organization that works worldwide with a wide range of projects, including some initiatives connected with new technologies, and every time, they should evaluate different risks involved, including privacy risks.
The purpose of the presentation was to understand the concept of ‘privacy’ and its different meanings worldwide, how to define the privacy framework and assess the risks arising from the use of new technologies such as drones or IoT, and introduce the Privacy Impact Assessment as an effective tool that we can use in any jurisdiction.
I am going to share some thoughts of these broad and complex chapters that I had to sum up within one hour in this presentation!
Here the full post: http://www.lauravivet.com
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
APNIC Strategic Engagement Director Pablo Hinojosa explores the key trends seen in Internet governance during the last 20 years at the 2nd ICANN APAC-TWNIC Engagement Forum, held from 15 to 16 April 2021.
An Overview of the Battle for the Control of the InternetDibussi Tande
Presentation to a joint/plenary session of the 16th Highway Africa Conference and the 3rd World Conference of the Global Forum for Media Development (GFMD) in Grahamstown, South Africa, September 10, 2012.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
This year I had the opportunity to give a presentation at the World Bank in Washington DC during one of their "brown bag sessions", focused on Privacy, Drones and IoT.
The World Bank is an organization that works worldwide with a wide range of projects, including some initiatives connected with new technologies, and every time, they should evaluate different risks involved, including privacy risks.
The purpose of the presentation was to understand the concept of ‘privacy’ and its different meanings worldwide, how to define the privacy framework and assess the risks arising from the use of new technologies such as drones or IoT, and introduce the Privacy Impact Assessment as an effective tool that we can use in any jurisdiction.
I am going to share some thoughts of these broad and complex chapters that I had to sum up within one hour in this presentation!
Here the full post: http://www.lauravivet.com
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...APNIC
APNIC Strategic Engagement Director Pablo Hinojosa explores the key trends seen in Internet governance during the last 20 years at the 2nd ICANN APAC-TWNIC Engagement Forum, held from 15 to 16 April 2021.
An Overview of the Battle for the Control of the InternetDibussi Tande
Presentation to a joint/plenary session of the 16th Highway Africa Conference and the 3rd World Conference of the Global Forum for Media Development (GFMD) in Grahamstown, South Africa, September 10, 2012.
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
Vicky Bowman gave a keynote analysis at Myanmar Connect 2015 in Naypyidaw on 16 September. Her presentation focussed on the stakeholder risks for the ICT sector during the coming six months before and after Myanmar’s election on 8 November. She previewed the ICT Sector-wide Impact Assessment, recently completed by MCRB, which will be published on 24 September, and identified some of the main online and offline human rights impacts of the sector which will feature jn the SWIA. She particularly highlighted the question of ‘network shutdown’ and the increased risk of this as a result of the election and its aftermath. She identified commitments which the government could make, as well as steps companies should take to prepare themselves for this risk.
A Civil Rights Based Internet: From Brazil to the World
In a bold move, Brazil has given to the world a example - it passed into law the civil framework for the internet called Marco Civil. What are the lessons learned? Can we extract core values and languages from the Marco Civil that should be present in every legislation coming up in the next decade? Is Marco Civil a model to be followed? What is the importance of this mark to the region? What are the "ifs"? Join Brazilian and Latin Americans in this discussion.
Organizers: Carolina Rossini (Public Knowledge), Laura Tresca (Article 19) and Paz Peña (Derechos Digitales)
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
This presentation briefly outlines how AI governance was being formulated in the United States from 2009 to 2020 during the presidencies of Barack Obama and Donald Trump. Although these two administrations differed on most policy matters, they shared a common approach to AI governance. Generally speaking, both administrations adopted a “light-touch” regulatory and industrial policy stance toward AI. Although both administrations highlighted potential areas of policy concern—safety and security issues, in particular—promoting the growth of AI sectors and technologies was prioritized over preemptively restricting them. “Soft law” mechanisms were typically tapped before hard law solutions. In this sense, AI policy in the Obama-Trump AI governance approach has been an extension of the governance vision previous administrations applied to the internet and digital commerce.
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
Presented by Kristiono (Masyarakat Telematika / Mastel)
ID IGF 2016
Sesi Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber Indonesia
Jakarta, 15 November 2016
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Protection mechanism and collaborations among public and private sectors to enhanced cybersecurity of the information network and to protect privacy and civil liberties of citizens in the digital age.
Panel discussion on “Learn from the Giants, How They Lift Cybersecurity and Privacy Obstacles”
Digital Thailand 2016 conference, Bangkok, 27 May 2016
Discussed by @bact Arthit Suriyawongkul
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Where next for the Regulation of Investigatory Powers Act?blogzilla
Talk at Open Tech 2015 on legal reform of UK interception and surveillance laws, including a comparison of the Intelligence and Security Committee and David Anderson reports.
My presentation at the IGov2 conference at the University of Oslo, 9 Sept 2014. Gave shorter version at Norwegian Board of Technology hearing on 10 Sept 2014. Related journal article at http://ijlit.oxfordjournals.org/content/early/2014/09/01/ijlit.eau007.abstract
Audio at http://www.jus.uio.no/ifp/english/research/projects/nrccl/internet-governance/events/dag-2-del-2-norrm-mp3.mp3
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
Vicky Bowman gave a keynote analysis at Myanmar Connect 2015 in Naypyidaw on 16 September. Her presentation focussed on the stakeholder risks for the ICT sector during the coming six months before and after Myanmar’s election on 8 November. She previewed the ICT Sector-wide Impact Assessment, recently completed by MCRB, which will be published on 24 September, and identified some of the main online and offline human rights impacts of the sector which will feature jn the SWIA. She particularly highlighted the question of ‘network shutdown’ and the increased risk of this as a result of the election and its aftermath. She identified commitments which the government could make, as well as steps companies should take to prepare themselves for this risk.
A Civil Rights Based Internet: From Brazil to the World
In a bold move, Brazil has given to the world a example - it passed into law the civil framework for the internet called Marco Civil. What are the lessons learned? Can we extract core values and languages from the Marco Civil that should be present in every legislation coming up in the next decade? Is Marco Civil a model to be followed? What is the importance of this mark to the region? What are the "ifs"? Join Brazilian and Latin Americans in this discussion.
Organizers: Carolina Rossini (Public Knowledge), Laura Tresca (Article 19) and Paz Peña (Derechos Digitales)
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
This presentation briefly outlines how AI governance was being formulated in the United States from 2009 to 2020 during the presidencies of Barack Obama and Donald Trump. Although these two administrations differed on most policy matters, they shared a common approach to AI governance. Generally speaking, both administrations adopted a “light-touch” regulatory and industrial policy stance toward AI. Although both administrations highlighted potential areas of policy concern—safety and security issues, in particular—promoting the growth of AI sectors and technologies was prioritized over preemptively restricting them. “Soft law” mechanisms were typically tapped before hard law solutions. In this sense, AI policy in the Obama-Trump AI governance approach has been an extension of the governance vision previous administrations applied to the internet and digital commerce.
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
Presented by Kristiono (Masyarakat Telematika / Mastel)
ID IGF 2016
Sesi Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber Indonesia
Jakarta, 15 November 2016
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
This slide presentation was developed to educate and enlighten the Mobile Network Operators, Government Agencies, general public and other stakeholders on how to avert the dangers embedded in lack of privacy laws in the country such that the provisions would eventually give birth to a commission or authority saddled with responsibility of data protection in the country.
Protection mechanism and collaborations among public and private sectors to enhanced cybersecurity of the information network and to protect privacy and civil liberties of citizens in the digital age.
Panel discussion on “Learn from the Giants, How They Lift Cybersecurity and Privacy Obstacles”
Digital Thailand 2016 conference, Bangkok, 27 May 2016
Discussed by @bact Arthit Suriyawongkul
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
In issue 08, we examine the crucial nature and value of social data and why it has become essential for brands to perform all functions of branding, marketing and selling to their customers.
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
The initial perspective on the Future of Privacy kicked off the Future Agenda 2.0 global discussions taking place through 2015. This summary builds on the initial view and is updated as we progress the futureagenda2.0 programme. www.futureagenda.org
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
SXSW wasn’t just about one or two pieces of new tech, what it actually felt like was a glimpse into the not-so-distant future.
Trends you might of heard of like wearables, data and the internet of things are still around, but they’re beginning to grow-up and different industries are beginning to be disrupted as a result.
More than anything, the conference instilled a sense of responsibility in me. The decisions we make today, as people, as agencies and as brands will define the future we live in tomorrow.
The deck covers the most prominent trends from this year. I'd love to hear your thoughts, say hello @ashikachauhan.
Ashika Chauhan is Big’s Digital Experience Director and is passionate about creative innovation.
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Sif14 How Trade Agreements Mess Up with Internet Freedoms Carolina Rossini
How Trade Agreements Mess Up with Internet Freedom
Time and time again, abusive copyright provisions have been successfully reproduced to multiple trade agreements. These binding instruments are expanding to cover core topics that traditionally were part of the broader internet governance sphere. The impact of these provisions on human rights and Internet are disastrous, but so few are paying attention. Forum shopping and policy laundering are happening at alarming rates as unpopular policies that would likely fail in national public forums are being cycled through non-transparent international negotiations that do not have the same standards of democratic oversight. Clear examples are the Trans Pacific Partnership Agreement, Korea-US trade agreement, the Canadian-EU Trade Agreement (CETA) and the Transatlantic Partnership. But the list goes on.
In a world of policy laundry and forum shopping, this panel aims to identify the challenges ahead for public interest organizations and build a strategy, created through dialogue, on how we should deal with the issues that will arise from these agreements.
Speakers will provide perspectives from different countries, but will foster debate on what could be core coordination and strategy efforts
O X Workshop NPT, esse ano, traz para discussão e aprofundamento o seguinte tema:.”Recursos Educacionais Abertos educam?” Este é um evento realizado anualmente, promovido pelo NPT – Research Group. Este evento já está na sua décima edição.
O X Workshop ocorrerá no dia 8 de Novembro, na Sala da Congregação da FEA-USP (em São Paulo) e está programado para 150 participantes, entre alunos de graduação, pós-graduação e profissionais da área.
O objetivo do evento é enriquecer a formação dos profissionais da área, através de palestras e discussões. Para tanto, contaremos com a presença de renomados profissionais, convidados de diversos institutos e universidades do estado de São Paulo e do Brasil. Este evento é destinado a estudantes e profissionais da área que buscam atualização e excelência na área e demais interessados.
A realização do X Workshop tem como objetivo a participação e incentivo a eventos científicos na área tecnológica e educacional.
Detalhes em http://workshop.npt.com.br.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
1. MARCH 4, 2016
CAROLINA ROSSINI
VP @ PUBLIC KNOWLEDGE
BODY CAMERAS, BIG DATA,
AND PRIVACY: TWENTY FIRST
CENTURY TECHNOLOGY AND
THE FOURTH AMENDMENT
ELON LAW REVIEW SYMPOSIUM
2.
3. International Sources
u the right to privacy is explicitly defined as a right for all people
Universal Declaration of Human Rights,
International Covenant on Civil and Political Rights (ICCPR
American Convention on Human Rights
Charter of Fundamental Rights (Arts. 7 and 8)
OECD Privacy Guidelines
Fair Information Practices.
4. What does privacy enables?
u The right to privacy allows for all people to keep information about themselves out
of the hands of those they don’t want to have the information. This includes
personal data, such as weight or birthplace to more sensitive personal data, such
as personal preferences, religious beliefs, and political views.
u The right to privacy also allows for people to feel empowered to have free flowing
discussions and communications (offline and online) about sensitive issues without
fear of retaliation or censorship.
u The right to privacy is most important because it allows for the rights of freedom of
expression, freedom of speech, freedom of opinion, freedom of association,
access to information, to flourish.
5. Right to be Anonymous
u In addition to privacy, the right to be anonymous online - thus,
the right to say something online without having it be
connected to your real identity - is also a crucial piece of the
discussion around human rights, surveillance, data protection,
and big data.
6. Your Privacy on The Web
What does privacy
mean to you?
“Nothing to hide”?
Or
“Having Control on your
data” ?
7. Online Privacy?
uThe ability to control what information one
reveals about oneself over the internet,
and control who can access that
information.
8. How differently people look at it?
u “Privacy is the future. Get used to it.” - Marc
Rotenberg, Director, Electronic Privacy
Information Centre - EPIC) (Fortune, 2001).
u “You have zero privacy anyway. Get over it.”
- Scott McNealy, CEO, Sun Microsystems, 1999
11. Behavioral Marketing
u Retargeting marks or tags online users who visit a certain brand website with a pixel or
a cookie,[2] and then serves banner ads only to the people who have shown at least some
amount of engagement with the original brand. In the milliseconds before you land on a
web site where a retargeting company has either directly placed or has access to the site
users cookie information, they present you with a highly targeted real-time and
personalized advert for that very thing that you were looking at while you were on the
retailers website earlier.
u Pretargeting is a form of online targeted advertising by which online advertising is targeted
to consumers based on their previous actions on many websites. PreTargeting is a method
to identify websites that people have likely or actually visited before coming to a retailer or
publishers website and that information can be then used by them to better target the
content that you see while browsing their website.
12. Behavioral Marketing
u The giants of the marketing world, namely Facebook and Google, already have an unimaginable
amount of data regarding shopping trends and experiences. They can use this to spot the next big
trends with a 90% degree of accuracy. With these types of insights they can predict the shopper's
future and send out messages to encourage the customer towards a purchase.
u Amazon does a fantastic job of pretargeting with the customers that connect with Facebook.
Shoppers can see their friends and Amazon starts building a shopping list, which is frightfully
accurate.
16. Not only your social media
u Walmart is an example that combines offline and online tracking with data
aggregation. Walmart has gathered a large amount of consumer
information from offline and online behaviors, and enhance their tracking
abilities with the additional information sought from third parties.
Consumers, Big Data,andOnline Tracking in the Retail Industry: ACase Study of Walmart, Center for MediaJustice(November 2013),
http://centerformediajustice.org/wp-content/uploads/2014/06/WALMART_PRIVACY_.pdf
17. Profiling goes global
u The current business model for global companies is
“connected recognition ,” gathering and analyzing the
information about your locations and activities across a
number of devices you may own.
19. “As big data becomes more commonplace and embedded in everyday interactions, it could be used to
automate discrimination and unfairness, both when data analytics delivers inaccurate profiles of individuals,
for instance, but also when correct personal profiling is used to take advantage of a person’s weaknesses,
such as with predatory lending. In both cases, she stressed that it could have profound impacts on people’s
stability, mobility, and ability to determine their personal destinies.” Profa. Seeta Peña Gangadharan
Consequences – nothing funny
Barocas, Solon and Rosenblat, Alex and boyd, danah and Gangadharan, Seeta Peña and Yu, Corrine,
Data & Civil Rights: Technology Primer (October 30, 2014). Data & Civil Rights Conference, October
2014. Availableat SSRN: http://ssrn.com/abstract=2536579 or http://dx.doi.org/10.2139/ssrn.2536579
20. Privacy and IoT
"The Internet of Things" (IoT) refers to the capability of
everyday devices to connect to other devices and people
through the existing Internet infrastructure.
21. u Like it or not, technology is becoming inextricably entwined with the fabric of our lives. Our cars,
our homes, even our bodies, are collecting, storing and streaming more personal data than ever
before. In 2015, Gartner, Inc. forecasts the number of connected “things” will reach 4.9 billion, up
30 percent from 2014. By the year 2020, that number is expected to reach 25 billion.
u They are able to communicate with consumers, collect and transmit data to companies, and
compile large amounts of data for third parties.
Privacy and IoT
22.
23. Car Privacy and Security
As vehicle manufacturers rush to adopt mobile-
friendly platforms and wireless technologies,
they've neglected to plug security and privacy
gaps, a new report revealed.
"Nearly 100% of vehicles on the market include
wireless technologies that could pose
vulnerabilities to hacking or privacy intrusions,”
Source: https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-
Tracking_Hacking_CarSecurity%202.pdf
26. hackers turn your baby monitor into a spy cam
“Eight of the nine cameras got an
F and one got a D minus,” security researcher
Mark Stanislav told Fusion’s Kashmir Hill. Security
flaws included issues such as a lack of encryption,
the use of default passwords, and access to
Internet portals with the device’s serial number or
account number.
Source: http://www.wired.com/2015/09/security-news-week-turns-baby-monitors-w ildly -easy-hack/
Baby monitors are crazy easy to hack
27. Why is metadata important?
u We generate metadata unknowingly, in an organized format and over the long term.
Metadata makes it easy to analyze, recognize patterns and draw conclusions about
who we are, and what we are doing.
u Companies that are central to our communications - like our mobile phone provider or
internet/email service provider - have detailed logs of this metadata, and this gives
them, and anyone else who can access this information, an unprecedentedly detailed
picture.
u Metadata can also reveal things we might not want to reveal. If our phone shows up in
a certain location at the time that there is a protest, this can reveal that we were one
of the protesters.
28. Big Data, Privacy and Profiling
u Big data has a variety of definitions, but is often described as:
u the fastly growing, massive data sets that contain a large volume, velocity, and variety
of information. Big data sets, including those scraped from social media, online
shopping sites, GPS devices, banks, entertainments sites, and others are usually too
large to be analyzed by most modern data analyzing tools. Hundreds of trillions of
bytes of data have been created, just on the Internet, and for many, big data paves
the way for more efficient research, marketing, polling, and health/scientific research.
Private sector companies havebegun to invest more into big data research and
analysis, as have a number of individual governments.
29. Who “regulates” privacy?
u The United States Federal Trade Commission (FTC) has
been involved in oversight of the behavioral targeting
techniques used by online advertisers since the mid-1990s.
These techniques, initially called "online profiling", are now
referred to as "behavioral targeting"; they are used to
target online behavioral advertising (OBA) to consumers
based on preferences inferred from their online behavior.
31. the public-private surveillance partnership
u What companies know, governments can & will know
u Any reform must take into account this relationship
35. Encryption and Cryptography
The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography's potential for use as a tool for espionage and sedition has led many governments to
classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where
the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption
keys for documents relevant to an investigation.
Modern cryptography is increasingly being used by human rights and nonprofit community activist
groups around the world to protect sensitive data from governments and hostile organizations.
36. Tor Usage and Political Rights
u Opportunity vs. Need
Source: The Dark Web Dilemma: Tor, Anonymity and
Online Policing Eric Jardine (CIGI, 2016)
https://www.cigionline.org/sites/default/files/no.21_1.pdf
37. Free Flow and Trade
u Forum Shopping: The total number of new data privacy laws globally, viewed by decade, shows
that their growth is accelerating, not merely expanding linearly: 8 (1970s), 13 (1980s), 21 (1990s),
35 (2000s) and 12 (2 years of the 2010s), giving the total of 89.
u It is not about freedom of expression
u It is about trade, it is about e-commerce
u Privacy considered as a trade barrier
38. u countries should not use trade agreements to challenge privacy laws as trade
barriers
u we need to make clear about what type of information we are discussing when
discussing “free-flow”, which historically is related to cross-personal-data flow
u and if we want the language to go beyond cross-data-flow and actually deal with
freedom of expression, the e-commerce chapter is a limited venue for that
Moreat: Information Flow and TradeAgreements: History and Implications for Consumers’ Privacy Alberto Cerda and Carolina
Rossini – May, 20131http://a2knetwork.org/sites/default/files/tpp_and_free_flow.pdf
The Digital TradeImbalance and Its Implications for Internet Governance, Susan Ariel Aaronson, (CIGI, 2016)
https://www.ourinternet.org/publication/the-digital-trade-imbalance-and-its-implications-for-internet-governance/
41. What it means for companies
https://www.ccianet.org/2015/10/ccia-urges-senate-to-improve-cybersecurity-information-sharing-act/
http://www.law360.com/articles/760952/information-sharing-under-cisa-what-it-means-for-companies
42. Wearables and Health Privacy
https://cdt.org/blog/recent-health-privacy-work-cdt/
43. Wearables + cutting-edge consent process
= good science
Mole Mapper, a patient-centered iPhone-
app based study to quantitatively track moles
and help detect early signs of the deadly skin
cancer melanoma.
Share the Journey: Mind, Body, and
Wellness after Breast Cancer -
Research on cognition after cancer is
diagnosed
http://sagebase.org/mole-mapper/http://parkinsonmpower.org/
http://sharethejourneyapp.org/
45. Privacy + Consent = TRUST
u over 75 percent of the more than 12,000 mPower
participants chose to share their data broadly with
researchers.
u This cutting-edge consent process is outlined in a
third paper published today in Nature
Biotechnology, and represents a sea of change in
participant control over data sharing.
48. Understand your technology
Video @ https://www.article19.org/resources.php/resource/38278/en/a-net-of-rights?-new-
film-links-human-rights-and-internet-protocols