SlideShare a Scribd company logo
Privacy in a Human Rights and
    Social Justice Context
  Privacy, Security and Forensics in the Digital Age
  NLW/AU event
  6th September 2012
Digital Ecology
What is meant by Privacy?
The right to be let alone. (Brandeis, 1890)
Privacy is an interest of the human personality. It protects the
inviolate personality, the individual's independence, dignity and
integrity. (Bloustein 1964)
The desire of people to choose freely under what circumstances and
to what extent they will expose themselves, their attitudes and their
behaviour to others. (Westin, 1968)
The state of desired inaccess or freedom from unwanted access, with
access meaning perceiving a person with one’s senses (ie seeing,
hearing or touching him or her), obtaining physical proximity to him or
her and/or obtaining information about him or her. (Gavison 1980,
Moreham, 2005)
Types of Privacy
 Information privacy
 Bodily privacy
 Privacy of communication
 Territorial privacy
Why is privacy important?
   Privacy as the right to be let alone – “a man’s
    home is his castle”
   Privacy as an aspect of personhood
   Privacy as control over information
   Privacy as limited access to the self
   Privacy as secrecy
   Privacy as a social and political value
Privacy & Data Protection – Twins
                   but not identical
   Privacy covers issues relating to the protection of an
    individual’s personal space – covering issues such as
    private communication, unwarranted investigation,
    physical integrity, protection of family life etc.
   Data protection– To organise and control the way
    personal data are processed. Focuses on the
    informational rather than spatial or physical
    dimensions of privacy. Right of information self-
    determination – the right to have a say in how data
    relating to oneself are processed by others.
Relevant Legislation: International
Customary International Law
     Universal Declaration of Human Rights – Article 12
     No one shall be subjected to arbitrary interference with his privacy, family, home
     or correspondence, nor to attacks upon his honour or reputation. Everyone has the
     right to the protection of the law against such interference or attacks for the
     protection of the rights and freedoms of others.

Treaties and Covenants
     International Covenant on Civil and Political Rights 1966 - Article 17
   1. No one shall be subjected to arbitrary or unlawful interference with his privacy,
   family, home or correspondence, nor to unlawful attacks on his honour and
   reputation.
   2. Everyone has the right to the protection of the law against such interference or
   attacks.
Relevant Legislation: Regional
    American Convention on Human Rights
    Article 11. Right to Privacy
   1. Everyone has the right to have his honor respected and his dignity recognized.

   2. No one may be the object of arbitrary or abusive interference with his private life, his family,
    his home, or his correspondence, or of unlawful attacks on his honor or reputation.
    3. Everyone has the right to the protection of the law against such interference or attacks.



   European Convention of Human Rights – Article 8 Right to respect for private and family life
    1. Everyone has the right to respect for his private and family life, his home and his
    correspondence.
   2. There shall be no interference by a public authority with the exercise of this right except such
    as is in accordance with the law and is necessary in a democratic society in the interests of
    national security, public safety or the economic well-being of the country, for the prevention of
    disorder or crime, for the protection of health or morals, or for the protection of the rights and
    freedoms of others.
Relevant Legislation – Data Protection
    Data Protection Directive 95/46 EC - was
     adopted in 1995 with two objectives in mind:
        to protect the fundamental right to data
         protection and
         to guarantee the free flow of personal data
         between Member States.
    New draft European Data Protection
     regulation released 25 Jan 2012 –
     harmonisation of laws on data protection.
     One single European Law
State/Government threats to Privacy
   Expansion of government online surveillance powers - threat to the
    individual’s right to privacy?

   USA- Stop Online Privacy Act, Protect IP Act, Trans Pacific Partnership
    Agreement IP Charter




   EU – Anti Counterfeiting Trade Agreement, Council of Europe’s
    Convention on Cyber crime
   Australia – Cybercrime Legislation Amendment Bill 2011
   Egypt/Syria – Arab Spring

   Access to Internet as basic human right – Frank La Rue UN Report
Business Threats to Privacy
Informational Privacy

Information Management/
                            Passive
Governance Sense Making
                            Digital Footprints
                            Digital Exhaust

                            Active
                            Data Mining
                            Data Analytics
                            Computer Assisted Review
GNI: leading
information and
communication
companies,
major HR
organisations,
academics,
investors and
technology
leaders
#11 DP
Protection of Personal
data
Obligations of data
collectors
Minimum Standards on
Use of Personal Data
Monitoring by
Independent Data
Protection Authorities
STAKEHOLDERS


   Pluricentric (not unicentric)
   networks (inter- or intraorganisational
   the processes of governing or functions
   specific risks and uncertainties
   normative

    Van Kersbergen and Van Waarden 2004,
Spectrum not Dichotomy
   Individual autonomy      Law enforcement
   Empowering               Cybercrime;
                              network security;
                              child crime, ID
                              theft; access
                              classified
                              information; hate
                              speech
   Non-disclosure           Sharing
Spectrum not Dichotomy
   Open government         Closed government
   FoI                     DP
   Rights of the           Profit-driven data
    Individual               demands
   Private sector-led      Government
    self regulation          regulation
   Soft law                Hard law
   Global                  Regional
   Minimum standard        Beyond national
                             standards
   Rights , duties         Responsibilities
Contact details
   Kirsten Ferguson-Boucher
    Department of Information Studies,
    knb@aber.ac.uk


   Sofia Cavandoli
    Department of Law and Criminology
    sfc@aber.ac.uk

More Related Content

What's hot

Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute
Aishwary Gawate
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
Soundrya Singh
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
Vianney Cantos
 
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideAmber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
The Centre for Internet and Society
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeview
joydev majumdar
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
Yogesh Pandit
 
Reporting and related issues
Reporting and related issuesReporting and related issues
Reporting and related issuesucdcompsci
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
skimkiper
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
Jason Nathu
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
Don Edwards
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issuesGeritt Contillo
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
Right to Information Act
Right to Information ActRight to Information Act
Right to Information Act
Muktha Samrat
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
International Islamic University Malaysia
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
Duc Lai Trung Minh
 

What's hot (20)

Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute Why Privacy is important when you are in a dispute
Why Privacy is important when you are in a dispute
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual GuideAmber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
Amber Sinha and Pooja Saxena - The Fundamental Right to Privacy - A Visual Guide
 
Right to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeviewRight to privacy – a bird’s eyeview
Right to privacy – a bird’s eyeview
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Reporting and related issues
Reporting and related issuesReporting and related issues
Reporting and related issues
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Right to Information Act
Right to Information ActRight to Information Act
Right to Information Act
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
 

Viewers also liked

Human Rights
Human RightsHuman Rights
Human Rights
clairecook
 
How to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the PoliceHow to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the Police
Oludotun Babayemi
 
Human Rights Violations at Home
Human Rights Violations at HomeHuman Rights Violations at Home
Human Rights Violations at Home
Allison Reilly
 
Online Privacy - Survey Report
Online Privacy - Survey ReportOnline Privacy - Survey Report
Online Privacy - Survey ReportJAKPATAPP
 
Concept of CSR in islam
Concept of CSR in islamConcept of CSR in islam
Concept of CSR in islam
Farhan Ahmad
 
stuys human rights powerpoint
stuys human rights powerpointstuys human rights powerpoint
stuys human rights powerpoint
stuyman
 
The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30
David Morris
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social ResponsibilityAditi Upadhyay
 
The Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by ElyxThe Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by Elyx
United Nations
 
intro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rightsintro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rightsverapax
 
Human rights and fundamental rights
Human rights and fundamental rightsHuman rights and fundamental rights
Human rights and fundamental rights
vishnugud
 
corporate social responsibility
corporate social responsibility corporate social responsibility
corporate social responsibility nehamodi274
 
Fundamental rights of indian constitution
Fundamental rights of indian constitutionFundamental rights of indian constitution
Fundamental rights of indian constitution
Aryan Singh
 
The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009
Naim Ahmed
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
StudentPressLawCenter
 
Concept and theory of human right group 12
Concept and theory of human right group 12Concept and theory of human right group 12
Concept and theory of human right group 12Subaidah Abdullah
 
Article XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human RightsArticle XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human Rights
Roxanne Jane Balladares
 
Introduction to csr
Introduction to csrIntroduction to csr
Introduction to csrViren Patel
 
CSR Branding Survey 2010
CSR Branding Survey 2010 CSR Branding Survey 2010
CSR Branding Survey 2010
Burson-Marsteller
 

Viewers also liked (20)

Human Rights
Human RightsHuman Rights
Human Rights
 
How to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the PoliceHow to Document Human Right Abuse of the Police
How to Document Human Right Abuse of the Police
 
Human Rights Violations at Home
Human Rights Violations at HomeHuman Rights Violations at Home
Human Rights Violations at Home
 
Online Privacy - Survey Report
Online Privacy - Survey ReportOnline Privacy - Survey Report
Online Privacy - Survey Report
 
Mapping Opportunity for Advocacy and Social Justice
Mapping Opportunity for Advocacy and Social JusticeMapping Opportunity for Advocacy and Social Justice
Mapping Opportunity for Advocacy and Social Justice
 
Concept of CSR in islam
Concept of CSR in islamConcept of CSR in islam
Concept of CSR in islam
 
stuys human rights powerpoint
stuys human rights powerpointstuys human rights powerpoint
stuys human rights powerpoint
 
The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30The Universal Declaration of Human Rights - Articles 21 to 30
The Universal Declaration of Human Rights - Articles 21 to 30
 
Corporate Social Responsibility
Corporate Social ResponsibilityCorporate Social Responsibility
Corporate Social Responsibility
 
The Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by ElyxThe Universal Declaration of Human Rights as seen by Elyx
The Universal Declaration of Human Rights as seen by Elyx
 
intro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rightsintro to Human Rights Violations and Victims' Rights
intro to Human Rights Violations and Victims' Rights
 
Human rights and fundamental rights
Human rights and fundamental rightsHuman rights and fundamental rights
Human rights and fundamental rights
 
corporate social responsibility
corporate social responsibility corporate social responsibility
corporate social responsibility
 
Fundamental rights of indian constitution
Fundamental rights of indian constitutionFundamental rights of indian constitution
Fundamental rights of indian constitution
 
The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009The National Human Right Commission Bangladesh 2009
The National Human Right Commission Bangladesh 2009
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
 
Concept and theory of human right group 12
Concept and theory of human right group 12Concept and theory of human right group 12
Concept and theory of human right group 12
 
Article XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human RightsArticle XIII- Social Justice* and Human Rights
Article XIII- Social Justice* and Human Rights
 
Introduction to csr
Introduction to csrIntroduction to csr
Introduction to csr
 
CSR Branding Survey 2010
CSR Branding Survey 2010 CSR Branding Survey 2010
CSR Branding Survey 2010
 

Similar to Privacy in a Human Rights and Social Justice Context

Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
adnis1
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
i_scienceEU
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
National Information Standards Organization (NISO)
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Santosh Sigdel
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
smile790243
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Vonnegut's Narrator
Vonnegut's NarratorVonnegut's Narrator
Vonnegut's Narrator
Andrew Murray
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
PECB
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor societyConsiderati
 
Privacy in the Virtually Legal Context
Privacy in the Virtually Legal ContextPrivacy in the Virtually Legal Context
Privacy in the Virtually Legal Context
Borislav Kiprin
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
The PRactice
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Human Rights And Internet Regulation
Human Rights And Internet RegulationHuman Rights And Internet Regulation
Human Rights And Internet Regulation
blogzilla
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Benjamin Ang
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 

Similar to Privacy in a Human Rights and Social Justice Context (20)

Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Vonnegut's Narrator
Vonnegut's NarratorVonnegut's Narrator
Vonnegut's Narrator
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Privacy and visibility in the sensor society
Privacy and visibility in the sensor societyPrivacy and visibility in the sensor society
Privacy and visibility in the sensor society
 
Privacy in the Virtually Legal Context
Privacy in the Virtually Legal ContextPrivacy in the Virtually Legal Context
Privacy in the Virtually Legal Context
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Human Rights And Internet Regulation
Human Rights And Internet RegulationHuman Rights And Internet Regulation
Human Rights And Internet Regulation
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)Legal and cybersecurity issues in whistleblowing (Panama Papers)
Legal and cybersecurity issues in whistleblowing (Panama Papers)
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

Privacy in a Human Rights and Social Justice Context

  • 1. Privacy in a Human Rights and Social Justice Context Privacy, Security and Forensics in the Digital Age NLW/AU event 6th September 2012
  • 3. What is meant by Privacy? The right to be let alone. (Brandeis, 1890) Privacy is an interest of the human personality. It protects the inviolate personality, the individual's independence, dignity and integrity. (Bloustein 1964) The desire of people to choose freely under what circumstances and to what extent they will expose themselves, their attitudes and their behaviour to others. (Westin, 1968) The state of desired inaccess or freedom from unwanted access, with access meaning perceiving a person with one’s senses (ie seeing, hearing or touching him or her), obtaining physical proximity to him or her and/or obtaining information about him or her. (Gavison 1980, Moreham, 2005)
  • 4. Types of Privacy  Information privacy  Bodily privacy  Privacy of communication  Territorial privacy
  • 5. Why is privacy important?  Privacy as the right to be let alone – “a man’s home is his castle”  Privacy as an aspect of personhood  Privacy as control over information  Privacy as limited access to the self  Privacy as secrecy  Privacy as a social and political value
  • 6. Privacy & Data Protection – Twins but not identical  Privacy covers issues relating to the protection of an individual’s personal space – covering issues such as private communication, unwarranted investigation, physical integrity, protection of family life etc.  Data protection– To organise and control the way personal data are processed. Focuses on the informational rather than spatial or physical dimensions of privacy. Right of information self- determination – the right to have a say in how data relating to oneself are processed by others.
  • 7. Relevant Legislation: International Customary International Law Universal Declaration of Human Rights – Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour or reputation. Everyone has the right to the protection of the law against such interference or attacks for the protection of the rights and freedoms of others. Treaties and Covenants International Covenant on Civil and Political Rights 1966 - Article 17 1. No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. 2. Everyone has the right to the protection of the law against such interference or attacks.
  • 8. Relevant Legislation: Regional American Convention on Human Rights Article 11. Right to Privacy  1. Everyone has the right to have his honor respected and his dignity recognized.  2. No one may be the object of arbitrary or abusive interference with his private life, his family, his home, or his correspondence, or of unlawful attacks on his honor or reputation. 3. Everyone has the right to the protection of the law against such interference or attacks.  European Convention of Human Rights – Article 8 Right to respect for private and family life 1. Everyone has the right to respect for his private and family life, his home and his correspondence.  2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.
  • 9. Relevant Legislation – Data Protection  Data Protection Directive 95/46 EC - was adopted in 1995 with two objectives in mind:  to protect the fundamental right to data protection and  to guarantee the free flow of personal data between Member States.  New draft European Data Protection regulation released 25 Jan 2012 – harmonisation of laws on data protection. One single European Law
  • 10. State/Government threats to Privacy  Expansion of government online surveillance powers - threat to the individual’s right to privacy?  USA- Stop Online Privacy Act, Protect IP Act, Trans Pacific Partnership Agreement IP Charter  EU – Anti Counterfeiting Trade Agreement, Council of Europe’s Convention on Cyber crime  Australia – Cybercrime Legislation Amendment Bill 2011  Egypt/Syria – Arab Spring  Access to Internet as basic human right – Frank La Rue UN Report
  • 11. Business Threats to Privacy Informational Privacy Information Management/ Passive Governance Sense Making Digital Footprints Digital Exhaust Active Data Mining Data Analytics Computer Assisted Review
  • 12. GNI: leading information and communication companies, major HR organisations, academics, investors and technology leaders
  • 13. #11 DP Protection of Personal data Obligations of data collectors Minimum Standards on Use of Personal Data Monitoring by Independent Data Protection Authorities
  • 14.
  • 15. STAKEHOLDERS  Pluricentric (not unicentric)  networks (inter- or intraorganisational  the processes of governing or functions  specific risks and uncertainties  normative  Van Kersbergen and Van Waarden 2004,
  • 16. Spectrum not Dichotomy  Individual autonomy  Law enforcement  Empowering  Cybercrime; network security; child crime, ID theft; access classified information; hate speech  Non-disclosure  Sharing
  • 17. Spectrum not Dichotomy  Open government  Closed government  FoI  DP  Rights of the  Profit-driven data Individual demands  Private sector-led  Government self regulation regulation  Soft law  Hard law  Global  Regional  Minimum standard  Beyond national standards  Rights , duties  Responsibilities
  • 18. Contact details  Kirsten Ferguson-Boucher Department of Information Studies, knb@aber.ac.uk  Sofia Cavandoli Department of Law and Criminology sfc@aber.ac.uk

Editor's Notes

  1. Information privacy