Vous êtes sur la page 1sur 19

{\rtf1{\fonttbl {\f2 Arial;} {\f3 Arial;} {\f4 Arial;} {\f1000000 Times New Roman;} }{\colortbl; \red0\green0\blue0; \red0\green0\blue0; \red0\green0\blue255;

}\viewkind1\viewscale100\margl0\margr0\margt0\margb0\deftab80\dntblnsbdb\expshrt n\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart Pg1}{\bkmkend Pg1}\par\pard \li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\charscalex100 \ul0\nosuper sub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscalex100 PRESERVING PRIVACY I N THE INFORMATION SOCIETY\par\pard\ql \li3359\sb209\sl-241\slmult0 \up0 \expndtw -3\charscalex100 \ul0\nosupersub\cf2\f3\fs21 PRESERVING PRIVACY IN THE INFORMATI ON SOCIETY \par\pard\ql \li5241\sb0\sl-260\slmult0 \par\pard\ql\li5241\ri5038\sb 4\sl-260\slmult0\tx5769 \up0 \expndtw-3\charscalex100 Mr Marc Rotenberg \line\ta b \up0 \expndtw-3\charscalex100 Director \par\pard\ql \li4424\ri4211\sb17\sl-240 \slmult0\tx4968 \up0 \expndtw-3\charscalex100 Electronic Privacy Information Cen ter \line\tab \up0 \expndtw-3\charscalex100 United States of America \par\pard\l i1044\sb0\sl-241\slmult0\par\pard\li1044\sb49\sl-241\slmult0\fi0\tx1348 \up0 \ex pndtw0\charscalex107 1.\tab \up0 \expndtw0\charscalex107 Introduction\par\pard\q j \li1348\ri517\sb194\sl-260\slmult0 \up0 \expndtw0\charscalex100 The right of p rivacy is well established in international law. The core privacy principle in m odern law may be \up0 \expndtw-1\charscalex100 found in the Universal Declaratio n of Human Rights. Article 12 of the UDHR states ""No one shall be subjected \up 0 \expndtw0\charscalex100 to arbitrary interference with his privacy, family, ho me or correspondence, nor to attacks upon his honour and \up0 \expndtw0\charscal ex100 reputation. Everyone has the right to the protection of the law against su ch interference or attacks." \par\pard\qj \li1348\ri516\sb205\sl-255\slmult0 \up 0 \expndtw0\charscalex102 The UN Guidelines for the Regulation of Computerized P ersonal Data Files (1990) set out Fair Information \up0 \expndtw0\charscalex100 Practices and recommend the adoption of national guidelines to protect personal privacy. Appropriately, the \up0 \expndtw-1\charscalex100 UN Guidelines note th at a derogation from these principles "may be specifically provided for when the purpose \up0 \expndtw-1\charscalex100 of the file is the protection of h uman rights and fundamental freedoms of the individual concerned or \up 0 \expndtw-2\charscalex100 humanitarian assistance." \par\pard\qj \li1348\ri481\ sb201\sl-260\slmult0 \up0 \expndtw-2\charscalex100 More generally, the protec tion of privacy is considered a fundamental human right, indispensable to the \up0 \expndtw0\charscalex103 protection of liberty and democratic instit utions. William Pfaff made this point well when he wrote recently, \up0 \expndtw 0\charscalex102 "The defining characteristic of totalitarianism is its assault o n privacy. The individual in a totalitarian state is \up0 \expndtw0\charscalex10 2 deprived of privacy in order to destroy his or her liberty." \par\pard\qj \li1 348\ri452\sb203\sl-257\slmult0 \up0 \expndtw0\charscalex100 We are asked at the UNESCO forum to explore the ethical and legal dimension of cyberspace and to ide ntify \up0 \expndtw-2\charscalex100 a set of core principles to promote de mocracy and empower citizens. This effort could lead to specific \up0 \ expndtw0\charscalex100 recommendations for UNESCO. Our specific task is to consi der protection of privacy and human rights in the \up0 \expndtw-1\charscalex100 Digital Age. To address this challenge, it is necessary to review what we know a bout the protection of privacy, \up0 \expndtw0\charscalex100 what we know about threats to privacy, and what we do not know about the future of privacy protecti on. Then \up0 \expndtw-1\charscalex100 we should consider the competing views of government, the private sector and citizen organizations as to how \up0 \expndt w-1\charscalex100 we should proceed. Finally, we must review our fundamental concerns as citizens and representatives of \up0 \expndtw-1\charscalex100 o rganizations involved with matters of human rights and outline a plan for future action. \par\pard\ql \li1044\sb0\sl-241\slmult0 \par\pard\ql\li1044\sb0\sl-241\

slmult0 \par\pard\ql\li1044\sb195\sl-241\slmult0 \up0 \expndtw0\charscalex107 2. What We Know About the Protection of Privacy \par\pard\qj \li1348\ri485\sb204\ sl-260\slmult0 \up0 \expndtw0\charscalex103 The protection of privacy is not a new subject. It has multiple dimensions and a well established history. \up0 \expndtw0\charscalex104 Among its key characteristics is the recognition that pr ivacy is a fundamental human right, that it is firmly \up0 \expndtw-1\charscalex 100 established in law, and that Fair Information Practices provided a useful ar ticulation of privacy principles in the \up0 \expndtw-2\charscalex100 informatio n world. \par\pard\ql \li1685\sb216\sl-241\slmult0 \up0 \expndtw0\charscalex108 1. Privacy as a fundamental right \par\pard\qj \li1989\ri473\sb204\sl-260\slmul t0 \up0 \expndtw-1\charscalex100 Philosophers and ethicists have described priva cy as indispensable characteristic of personal freedom. \up0 \expndtw0\charscale x102 Privacy is associated with autonomy, dignity, spirituality, trust, and libe rty. References to the value of \up0 \expndtw0\charscalex100 private life may be found in the bible, the history of Periclean Athens, as well as the history and culture \up0 \expndtw-1\charscalex100 of many people around the world. \par\par d\qj \li1989\ri387\sb204\sl-256\slmult0 \up0 \expndtw0\charscalex103 The America n jurist Louis Brandeis described privacy as "the right to be let alone" and as "the most \up0 \expndtw0\charscalex100 fundamental of all rights cherished by a free people" in a famous article on the Right to Privacy (1890). \up0 \expndtw0\ charscalex100 Brandeis noted that French law provided relief for invasions of pr ivate life and urged the adoption of a \up0 \expndtw0\charscalex100 similar lega l right in the common law countries. The right was first recognized in the Unite d States in a \up0 \expndtw0\charscalex103 1902 case in the state of Georgia. Si nce that time courts in the United States and around the world \up0 \expndtw-3\c harscalex100 have often allowed individual plaintiffs to seek legal remedies for invasions of private life. \par\pard\ql \li1989\sb217\sl-241\slmult0 \up0 \expn dtw0\charscalex102 In the realm of information technology, the right of privacy has focused on the ability of individuals to \par\pard\qj\pvpg\phpg\posx520\posy 15340\absw11209 \up0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1\f2\fs16 http:/ /www.unesco.org/webworld/infoethics_2/eng/papers/paper_10.htm\par\pard\qj\pvpg\p hpg\posx11440\posy15340\absw289 \up0 \expndtw-7\charscalex100 1/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g2}{\bkmkend Pg2}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\ri517\sb 74\sl-260\slmult0 \up0 \expndtw0\charscalex102 \ul0\nosupersub\cf2\f3\fs21 contr

ol the collection and use of personal information held by others. A German court has described \up0 \expndtw0\charscalex102 this as the right of "informational self-determination." This right is often articulated as fair information \up0 \e xpndtw0\charscalex102 practices and codified in civil law. \par\pard\ql \li1685\ sb216\sl-241\slmult0\tx1989 \up0 \expndtw-5\charscalex100 2. \tab \up0 \expndtw0 \charscalex108 The right of privacy is established in law \par\pard\qj \li1989\r i409\sb210\sl-253\slmult0 \up0 \expndtw0\charscalex100 The right of privacy is w ell established in international and national law. Following the adoption of the \up0 \expndtw0\charscalex103 Universal Declaration of Human Rights in 1948 and article 12 which speaks directly to the issue of \up0 \expndtw0\charscalex100 privacy, similar provisions were adopted in the International Covenant on Civil and Political Rights, the \up0 \expndtw0\charscalex100 European Convention on Hu man Rights, and other regional conventions and agreements. \par\pard\qj \li1989\ sb0\sl-256\slmult0 \par\pard\qj\li1989\ri402\sb9\sl-256\slmult0 \up0 \expndtw0\c harscalex102 At the national level, most governments have a general right of pri vacy set out in their Constitutions. \line \up0 \expndtw0\charscalex100 Privacy rights have also been established by means of case law and enactments of legisla tures. Such \line \up0 \expndtw0\charscalex103 laws typically seek to protect pr ivacy in a particular context, such as laws that protect the privacy of \line \u p0 \expndtw0\charscalex104 communication by limiting the circumstances in which police may undertake wiretapping or when a \line \up0 \expndtw-3\charscalex100 m erchant may sell personal data. (A new survey available from Privacy In ternational describes the \line \up0 \expndtw0\charscalex102 current state of privacy protection around the globe. Information about the survey is available o n the \line \up0 \expndtw0\charscalex102 Internet at {\field{\*\fldinst {HYPERLI NK http://www.privacy.org/pi/ }}{\fldrslt {\ul0\nosupersub\cf3\f4\fs21 http://ww w.privacy.org/pi/}}}\ul0\nosupersub\cf2\f3\fs21 and http://www.gilc.org/) \par\ pard\qj \li1989\sb0\sl-254\slmult0 \par\pard\qj\li1989\ri454\sb12\sl-254\slmult0 \up0 \expndtw0\charscalex102 Interestingly, the integration of the European cou ntries and the creation of the European Union have \line \up0 \expndtw0\charscal ex100 underscored the clear establishment of privacy as legal claim. The Eu ropean Union Data Directive \line \up0 \expndtw-2\charscalex100 resulted from th e need to carry forward certain legal rights even as the legal and economic arra ngement \line \up0 \expndtw-1\charscalex100 among the European governments was u ndergoing a substantial transformation. The effort in Europe to \line \up0 \expn dtw-2\charscalex100 extend legal frameworks for privacy protection has en couraged similar efforts in East Asia, North \line \up0 \expndtw0\charscal ex100 America, and Latin America. That privacy protection remains a central conc ern for governments on the \line \up0 \expndtw0\charscalex102 eve of the twentyfirst century is a significant indication of the importance of this fundamental human \line \up0 \expndtw0\charscalex102 right. \par\pard\ql \li1685\sb237\sl-24 1\slmult0\tx1989 \up0 \expndtw-5\charscalex100 3. \tab \up0 \expndtw0\charscalex 109 Fair Information Practices \par\pard\qj \li1348\ri498\sb207\sl-256\slmult0 \ up0 \expndtw0\charscalex100 Privacy principles are often articulated as "Fair In formation Practices." Fair Information Practices set out the \line \up0 \expndtw 0\charscalex100 rights of those who provide their own personally identifiable in formation and the responsibilities of those who \line \up0 \expndtw0\charscalex1 00 collect this information. Although there is not fixed agreement on what specific principles constitute Fair \line \up0 \expndtw0\charscalex100 Infor mation Practices, there is general agreement about the types of principles that are likely to be included in \line \up0 \expndtw0\charscalex103 a set of Fair In formation Practices. These include the right of an individual to limit the colle ction and use of \line \up0 \expndtw0\charscalex102 personal information, to obt ain access to the information when it is collected, to inspect it and to correct it if \line \up0 \expndtw-2\charscalex100 necessary, transparency, and to h ave some means of accountability or enforcement to ensure that the \li ne \up0 \expndtw0\charscalex100 practices will be enforced. The responsibilities of data collectors include the obligation o maintain security of \line \up0 \ex pndtw-1\charscalex100 the information, to ensure that the data is accurate, comp lete and reliable so that inappropriate determinations \line \up0 \expndtw-1\cha

rscalex100 about an individual are not made. Some commentators have recently pro posed that Fair Information Practices \line \up0 \expndtw-1\charscalex100 also i nclude such principles as the right to anonymity and minimization of data collec tion. \par\pard\qj \li1348\ri509\sb205\sl-255\slmult0 \up0 \expndtw-1\charscalex 100 Fair Information Practices provide the basic structure of most privacy laws and polices found around the world. \up0 \expndtw0\charscalex104 They can be see n in such general agreements as the OECD Privacy Guidelines of 1980 as well as m ore \up0 \expndtw-1\charscalex100 detailed legal code as the Subscriber Privacy provision contained in the US Cable Act of 1984. Current efforts \up0 \expndtw-1 \charscalex100 to establish privacy protection for the Internet typically focus on the application of Fair Information Practices to \up0 \expndtw-2\charscalex10 0 Internet-based transactions. \par\pard\ql \li1044\sb0\sl-241\slmult0 \par\pard \ql\li1044\sb0\sl-241\slmult0 \par\pard\ql\li1044\sb215\sl-241\slmult0 \up0 \exp ndtw0\charscalex106 3. What We Know About Threats to Privacy \par\pard\qj \li13 48\ri499\sb204\sl-260\slmult0 \up0 \expndtw0\charscalex104 The threats to privac y came from multiple sources. They can be broadly classified as technologic thre ats, \up0 \expndtw-2\charscalex100 threats from actions of government, and threa ts from the private sector and commercial services. \par\pard\ql \li1685\sb216\s l-241\slmult0 \up0 \expndtw0\charscalex106 1. Technology Threatens Privacy \par \pard\qj \li1989\ri517\sb204\sl-260\slmult0 \up0 \expndtw0\charscalex100 In the modern era, technology has long been viewed as the source of many privacy concer ns. But the \line \up0 \expndtw0\charscalex100 relationship between technology and surveillance is not a simple one. Technology takes on certain \par\pard \qj\pvpg\phpg\posx520\posy15340\absw11209 \up0 \expndtw-7\charscalex100 \ul0\nos upersub\cf1\f2\fs16 http://www.unesco.org/webworld/infoethics_2/eng/papers/paper _10.htm\par\pard\qj\pvpg\phpg\posx11440\posy15340\absw289 \up0 \expndtw-7\charsc alex100 2/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft2982\shptop5065\shpright5305\shpbottom5085\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz2988\shplid2 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 2323}}{\sp{\sn geoBottom}{\sv 20}} {\sp{\sn pVerticies}{\sv 8;4;(0,20);(2323,20);(2323,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167116

80}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g3}{\bkmkend Pg3}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\ri517\sb 78\sl-255\slmult0 \up0 \expndtw0\charscalex100 \ul0\nosupersub\cf2\f3\fs21 forms and may lead to the adoption of new systems for surveillance by a process that might almost be \line \up0 \expndtw0\charscalex102 understood as a dialectic b etween the purposeful creation of particular system for surveillance, the \line \up0 \expndtw0\charscalex100 subsequent development of a means for surveillance not previously considered, and then the resulting \line \up0 \expndtw0\charscal ex102 creation of a new purposeful system for surveillance. It would be tempti ng to view this process as \line \up0 \expndtw0\charscalex102 almost autonomou s, but human accountability should not be ignored in any system of surveillance. \par\pard\qj \li1989\ri515\sb205\sl-256\slmult0 \up0 \expndtw-1\charscalex100 A mong the key characteristics of technology in the surveillance realm are amplifi cation, routininazation, \line \up0 \expndtw0\charscalex100 and sublimation. A mplification refers to the ability of technology to extend the ability to gather \line \up0 \expndtw0\charscalex104 information and intrude into pri vate life. Examples of amplification are linked directly to the sensory \line \u p0 \expndtw0\charscalex103 abilities. A zoom lens on a camera allows a reporter to see further and record events that might not \line \up0 \expndtw0\charscalex1 02 otherwise be observed. A listening device permits a police agent to intercept and overhear a private \line \up0 \expndtw0\charscalex103 communication. New te chniques for the detection of heat behind walls make it possible for police to \ line \up0 \expndtw0\charscalex103 determine whether grow lamps are in use inside a home, possibly indicating the presence of marijuana. \par\pard\qj \li1989\ri4 76\sb225\sl-255\slmult0 \up0 \expndtw-2\charscalex100 Techniques for amplificati on invariably also capture information even beyond that the may be justified by \up0 \expndtw0\charscalex100 the initial inquiry. A papparazzi's lens turned on a celebrity may capture a private or personal moment. \up0 \expndtw0\charscalex1 00 A listening device installed by a police officer to monitor the activities of criminals may also record the \up0 \expndtw0\charscalex100 conversations of inn ocents. The device to detect heat behind walls may detect two people making love \up0 \expndtw-1\charscalex100 upstairs as well as the marijuana grow lamps loca ted downstairs \par\pard\qj \li1989\ri511\sb205\sl-256\slmult0 \up0 \expndtw0\ch arscalex102 There is considerable debate about whether it is appropriate to regu late techniques of amplification. \up0 \expndtw0\charscalex100 While it is true that some of these methods intrude into private life, it is also clearly the cas e that such \up0 \expndtw0\charscalex102 technologies have beneficial applicatio ns. Regulating the technique rather than the activity inevitably \up0 \expndtw-1 \charscalex100 raises the danger of criminalizing behavior that might otherwise be considered permissible. Thus one of \up0 \expndtw0\charscalex100 the first le ssons of legislating to protect privacy is the need to focus on the underlying a ctivity and not \up0 \expndtw0\charscalex100 the technology itself. \par\pard\qj \li1989\ri517\sb204\sl-257\slmult0 \up0 \expndtw0\charscalex100 Routinization i s the process of making intrusion into private life an ongoing process Here tech nology is \up0 \expndtw0\charscalex100 used to establish a pattern or prac tice of surveillance. Again it is possible to conceive of both \up0 \e xpndtw-1\charscalex100 appropriate an inappropriate forms of routinized surveill ance. A camera turned of a bank cashier's desk \up0 \expndtw-1\charscalex100 is probably an appropriate use of surveillance technology as it provides protection to both the bank and \up0 \expndtw0\charscalex103 the customer in the case of a robbery or simple dispute. However, a camera placed in the changing \up0 \expnd tw-2\charscalex100 room of a department store would be more problematic. While i t could be argued that the purpose of the \up0 \expndtw0\charscalex100 camera is to deter shoplifting and lessen the unnecessary costs to the merchants, custome rs are likely \up0 \expndtw-1\charscalex100 to find a camera in a changing room is simply too intrusive. \par\pard\qj \li1989\ri511\sb204\sl-257\slmult0 \up0 \e

xpndtw-1\charscalex100 Techniques for routinization are increasingly joined with methods for recording so that a camera trained \up0 \expndtw0\charscalex104 on a street corner now routinely records all activities that are viewed and a phone line for a service \up0 \expndtw0\charscalex103 representative routinely record s all conversations with customers. We are still in the early stages of \up0 \ex pndtw-2\charscalex100 incorporating new techniques in the realm of routinized su rveillance, but it should be anticipated that the \up0 \expndtw0\charscalex105 n ext stage in theses systems will be the adoption of methods for processing infor mation so that it \up0 \expndtw0\charscalex104 would be possible for the camera in a airport to view the facial profiles of passengers in a terminal, \up0 \expn dtw0\charscalex100 compare these images with a massive database of facial profil es, and determine in virtually real-time \up0 \expndtw0\charscalex100 the actual identity of individuals in the terminal. \par\pard\qj \li1989\ri511\sb204\sl-25 6\slmult0 \up0 \expndtw0\charscalex102 Sublimation is the means by which a techn ique for privacy invasion becomes increasingly difficult to \line \up0 \expndtw0 \charscalex100 detect. Hidden cameras, listening devices and similar data gathering techniques are particularly \line \up0 \expndtw0\charscalex100 pr oblematic because there is little opportunity for the data subject to escape det ection and frequently \line \up0 \expndtw-2\charscalex100 little opportunity i n the political realm to challenge the desirability of such techniques. Illegal wire \line \up0 \expndtw0\charscalex102 surveillance by law enforceme nt agencies is a long-standing privacy concern in part because it is so \line \u p0 \expndtw0\charscalex100 difficult to detect, to assess, and to challenge. One legislative approach that has been adopted to \line \up0 \expndtw0\charsc alex100 address this problem \par\pard\qj \li1989\ri517\sb201\sl-260\slmult0 \up 0 \expndtw-1\charscalex100 While technology is not required for an invasion of p rivacy, the ability of techniques to amplify, routinize \up0 \expndtw-1\charscal ex100 and sublimate surveillance has traditionally raised some of the greatest p rivacy concerns. \par\pard\ql \li1685\sb0\sl-241\slmult0 \par\pard\ql\li1685\sb0 \sl-241\slmult0 \par\pard\ql\li1685\sb214\sl-241\slmult0 \up0 \expndtw0\charscal ex106 2. Governments Threaten Privacy \par\pard\li520\sb87\sl-184\slmult0\fi0\t x11440 \up0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1\f2\fs16 http://www.unes co.org/webworld/infoethics_2/eng/papers/paper_10.htm\tab \up0 \expndtw-7\charsca lex100 3/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g4}{\bkmkend Pg4}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal

ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\sb0\sl-2 60\slmult0 \par\pard\qj\li1989\ri517\sb14\sl-260\slmult0 \up0 \expndtw0\charscal ex100 \ul0\nosupersub\cf2\f3\fs21 Many of the most serious threats to privacy co me from government. In the most extreme form, when a \up0 \expndtw0\charscalex10 2 government arrests and imprisons a person it has denied the individual the dig nity of privacy almost \up0 \expndtw0\charscalex100 absolutely. Government can a lso diminish privacy through schemes for compelled identification, drug \up0 \ex pndtw0\charscalex100 testing, physical searches of one's home or person, databas e profiling, genetic testing, and polygraph \up0 \expndtw0\charscalex100 examina tions to name just a few. \par\pard\qj \li1989\ri517\sb209\sl-250\slmult0 \up0 \ expndtw-1\charscalex100 Government threats to privacy are particularly probl ematic because once established, citizens have \up0 \expndtw0\charscalex102 l ittle choice but to comply. There are no alternatives to a requirement for n ational identity, or drug \up0 \expndtw0\charscalex102 testing as a condition f or public employment. \par\pard\qj \li1989\ri511\sb230\sl-250\slmult0 \up0 \expn dtw-2\charscalex100 Those actions by government that have provoked the most outrage oftentimes involve proposals for \up0 \expndtw0\charscalex100 nationa l identity, census enumeration, and recently proposals to regulate the use of pr ivacy enhancing \up0 \expndtw-1\charscalex100 techniques such as encryption. \pa r\pard\qj \li1989\ri517\sb230\sl-250\slmult0 \up0 \expndtw0\charscalex102 Transp arency, which is a laudable goal for the functioning of democratic society, take s on a different \up0 \expndtw-1\charscalex100 meaning in the context of governm ent surveillance. Governments often seek a "transparent citizenry," a \up0 \expn dtw-2\charscalex100 populis whose actions are readily identifiable and easily mo nitored. \par\pard\ql \li1685\sb0\sl-241\slmult0 \par\pard\ql\li1685\sb0\sl-241\ slmult0 \par\pard\ql\li1685\sb216\sl-241\slmult0 \up0 \expndtw0\charscalex106 3. Corporations Threaten Privacy \par\pard\qj \li1348\ri516\sb210\sl-253\slmult0 \up0 \expndtw0\charscalex100 Corporations threaten privacy in a variety of me ans. In the workplace, corporations seek to exert greater \up0 \expndtw0\ch arscalex103 control over workers through a variety of monitoring and surveillanc e practices. Such practices include the \up0 \expndtw-1\charscalex100 monitoring of telephone calls and computer use, the video surveillance of change rooms and bathrooms, drug \up0 \expndtw-1\charscalex100 testing, and polygraphs. \par\par d\qj \li1348\ri494\sb202\sl-260\slmult0 \up0 \expndtw0\charscalex100 More genera lly, corporations threaten privacy in the marketplace through the extraction of commercial value \line \up0 \expndtw0\charscalex100 from consumers in their pe rsonally identified transactions. It is no longer sufficient for customers to offer \line \up0 \expndtw0\charscalex100 payment for goods and services. They must now also provide personal details that can then be used by \line \ up0 \expndtw0\charscalex102 companies for subsequent purposes. Some request s are necessary and appropriate for a particular \line \up0 \expndtw0\cha rscalex103 transaction. For example, a person who wishes an item to be shipped t o his or her home should expect to \line \up0 \expndtw-2\charscalex100 provide a home mailing address. In many more data collections are unrelated to a particul ar purpose. \par\pard\qj \li1348\ri478\sb206\sl-253\slmult0 \up0 \expndtw-2\char scalex100 This process of extracting commercial value in the marketplace might be called the "commodification of \up0 \expndtw0\charscalex100 ident ity." Efforts to limit this process focus on either regulatory restrictions on t he collection of information or \up0 \expndtw0\charscalex100 technical means t o promote commercial transactions that do not require the disclosure o f personally \up0 \expndtw0\charscalex100 identifiable information. \par\pard\q j \li1348\ri492\sb202\sl-260\slmult0 \up0 \expndtw0\charscalex102 In summary, t he danger with corporation is the emergent of the "transparent worker" or th e "transparent \up0 \expndtw0\charscalex103 consumer," individuals who because o f their economic relations with private corporations are compelled to \up0 \expn dtw0\charscalex103 disclose aspects of their personal lives they might otherwise choose to keep private. Transparency in this \up0 \expndtw0\charscalex100 relat ion, as in the relation with government in the context of surveillanc e, is one-sided. It is not the \up0 \expndtw0\charscalex100 transparency o f a window, but that of a one-way mirror. \par\pard\ql \li1044\sb0\sl-241\slmult

0 \par\pard\ql\li1044\sb0\sl-241\slmult0 \par\pard\ql\li1044\sb194\sl-241\slmult 0 \up0 \expndtw0\charscalex104 4. What We Do Not Know \par\pard\ql \li1348\sb22 0\sl-241\slmult0 \up0 \expndtw-2\charscalex100 While the right of privacy and th e threats to privacy are fairy well understood, there is much we do not know. \p ar\pard\ql \li1685\sb0\sl-241\slmult0 \par\pard\ql\li1685\sb0\sl-241\slmult0 \pa r\pard\ql\li1685\sb218\sl-241\slmult0 \up0 \expndtw0\charscalex109 1. Whether t he Internet will provide greater privacy or less \par\pard\qj \li1989\ri517\sb20 4\sl-260\slmult0 \up0 \expndtw-1\charscalex100 It remains an open question at th is point whether the Internet will see a significant increase or decrease \line \up0 \expndtw0\charscalex100 in privacy. There is certainly a strong case that t he Internet will usher a new era of massive, routinized \line \up0 \expndtw-1\ch arscalex100 surveillance. It is possible with the current protocols for Internet communication to record virtually every \line \up0 \expndtw-1\charscalex100 act ivity of an Internet user, the information he receives, the people he communicates with, his \par\pard\qj\pvpg\phpg\posx520\posy15340\absw11209 \u p0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1\f2\fs16 http://www.unesco.org/we bworld/infoethics_2/eng/papers/paper_10.htm\par\pard\qj\pvpg\phpg\posx11440\posy 15340\absw289 \up0 \expndtw-7\charscalex100 4/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g5}{\bkmkend Pg5}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\ri477\sb 79\sl-253\slmult0 \up0 \expndtw-2\charscalex100 \ul0\nosupersub\cf2\f3\fs21 pref erences and his predilections. Such extensive data collection is far m ore instrusive than was \up0 \expndtw0\charscalex102 possible in the previous era of broadcast communication or in typical commercial relations. In the \up0 \expndtw-1\charscalex100 broadcast era, recipients of information were largely anonymous. In typical commercial relations, \up0 \expndtw-2\chars calex100 information is typically obtained only once a purchase occurs. \par\par d\qj \li1989\ri474\sb225\sl-256\slmult0 \up0 \expndtw0\charscalex102 There are a lso strong commercial incentives on the Internet to reduce privacy. Many of th e current \line \up0 \expndtw-1\charscalex100 business models are based on conce pt of "personalization" and "one-to-one marketing" that require far \line \up0 \ expndtw-2\charscalex100 more knowledge about individual preferences and buying h abits than was previously available in a mass \line \up0 \expndtw0\charscalex100 market commercial environment. Many web sites today offer to "personalize" thei r display for users or \line \up0 \expndtw0\charscalex102 ask extensive questi

ons about a users interest before any commercial relationship has been \line \up0 \expndtw0\charscalex102 established. \par\pard\qj \li1989\ri502\sb20 4\sl-256\slmult0 \up0 \expndtw-2\charscalex100 The technical methods of Inte rnet come together with the personalization marketing goals in the \up0 \expndtw0\charscalex102 implementation of such protocols as "cookies," which al low the tracking of users across various web \up0 \expndtw0\charscalex100 sites and the targeting of commercial advertising. Elaborate "ad servers" crate custom ized advertising \up0 \expndtw0\charscalex102 on a web site for a particular use r based on what is known about the user from other web sites he or \up0 \expndtw 0\charscalex100 she has visited. These techniques threaten to make real that wha t is viewed on a computer screen in \up0 \expndtw0\charscalex100 one's home coul d be known to almost anyone around the world. \par\pard\qj \li1989\ri511\sb204\s l-256\slmult0 \up0 \expndtw0\charscalex103 Still, it can not be ignored that the Internet provides a platform for new forms of communication and \up0 \expndtw0\ charscalex100 interaction that can literally builds in privacy safeguards. The u se of encryption techniques in browser \up0 \expndtw0\charscalex100 software, f or example, permits the transfer of credit card numbers and other personally identifiable \up0 \expndtw0\charscalex102 information in a secure manner. Anon ymous payment techniques would allow commerce without the \up0 \expndtw0\charsca lex102 disclosure of personally identifiable information. Anonymous remailers ma ke possible the sending of \up0 \expndtw0\charscalex102 messages without requiri ng the disclosure of the sender's identity. \par\pard\qj \li1989\ri409\sb201\sl260\slmult0 \up0 \expndtw0\charscalex102 Whether these new techniques for privac y will get the upper hand in the on-line world remains to be \up0 \expndtw0\char scalex100 seen. There are government objections to these techniques as well as s trong commercial incentives to \up0 \expndtw0\charscalex100 minimize anonymous activity. But for the first time it is possible to conceive of a t echnological \up0 \expndtw0\charscalex100 environment that properly designed cou ld provide new levels of privacy protection \par\pard\ql \li1685\sb216\sl-241\sl mult0\tx1989 \up0 \expndtw-5\charscalex100 2. \tab \up0 \expndtw0\charscalex109 Whether legal safeguards will survive globalization \par\pard\qj \li1989\ri485\s b204\sl-260\slmult0 \up0 \expndtw0\charscalex100 One of the great challenges to privacy protection is only partially technical in nature. The growth of the \up0 \expndtw0\charscalex100 Internet has coincided with the increased globalization of world trade, the rise of the European Union, \up0 \expndtw0\charscalex102 th e diminished ability of central banks to control currency markets, and even the question of whether \up0 \expndtw0\charscalex102 individual nation states can ef fectively exercise their sovereign authority. \par\pard\qj \li1989\ri516\sb203\s l-257\slmult0 \up0 \expndtw0\charscalex100 In this environment, it has become a commonplace to simply assert that national governments will be \up0 \expndtw0\ch arscalex100 unable to exercise any legal control over the Internet and also that current law is unlikely to have much \up0 \expndtw0\charscalex100 of an impact in this digital world. But this view is wrong in at least two respects. First, g overnments do \up0 \expndtw0\charscalex100 in fact exercise a great deal of c ontrol regardless of what the "cyber-intelligentsia" claim. Internet \up0 \ expndtw0\charscalex104 disputes are resolved in real courts and computer crimina ls are thrown in real jails. Second, as the \up0 \expndtw0\charscalex100 Interne t has become more commercial and more mainstream, the reliance on tra ditional legal \up0 \expndtw0\charscalex100 institutions has increased not dimi nished. There are no formal methods for adjudication in cyberspace \up0 \expndtw -1\charscalex100 and thus governments and private parties have turned na turally to traditional means for dispute \up0 \expndtw-2\charscalex100 reso lution and the prosecution of harmful acts. \par\pard\qj \li1989\ri351\sb204\sl256\slmult0 \up0 \expndtw-3\charscalex100 Third, and perhaps most significan tly, governments have found that where there are interests that \up0 \e xpndtw-1\charscalex100 should be protected, collective action can be taken at th e supra-national level to protect these interests. \up0 \expndtw0\charscalex100 Thus, for example, national governments particularly the United States, have m oved aggressively to \up0 \expndtw0\charscalex100 establish international agree ment to protect copyright in the digital environment. The World Intellectual \up

0 \expndtw0\charscalex100 Property Organization, the World Trade Organization, the Berne Convention all reflect the ability of \up0 \expndtw0\charscalex100 national governments to act collectively to protect interests that may be impai red by the emergence of \up0 \expndtw-1\charscalex100 digital networks or the in crease in global trade. \par\pard\qj \li1989\ri517\sb201\sl-260\slmult0 \up0 \ex pndtw0\charscalex100 In many respects, privacy protection anticipates the pr oblem of protection across national borders. \line \up0 \expndtw0\charscalex10 0 Indeed, the OECD Privacy Guidelines were a direct response to questi ons about privacy and \line \up0 \expndtw0\charscalex100 transborder dataflo ws. Further, the Data Directive of the European Union is a clear att empt to \par\pard\li520\sb83\sl-184\slmult0\fi0\tx11440 \up0 \expndtw-7\charsca lex100 \ul0\nosupersub\cf1\f2\fs16 http://www.unesco.org/webworld/infoethics_2/e ng/papers/paper_10.htm\tab \up0 \expndtw-7\charscalex100 5/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g6}{\bkmkend Pg6}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\ri517\sb 74\sl-260\slmult0 \up0 \expndtw0\charscalex102 \ul0\nosupersub\cf2\f3\fs21 harmo nize protection across national borders. While it is not clear if national legal norms will survive \up0 \expndtw0\charscalex102 this process of globalization, it is clear that a good foundation has already been put in place. \par\pard\ql \ li1685\sb216\sl-241\slmult0\tx1989 \up0 \expndtw-5\charscalex100 3. \tab \up0 \e xpndtw0\charscalex108 Whether law is a sufficient instrument to protect privacy \par\pard\qj \li1989\ri430\sb208\sl-255\slmult0 \up0 \expndtw-1\charscalex100 Fo r much of the history of privacy law, the relationship between law and technolog y was understood as \line \up0 \expndtw0\charscalex100 a simple equation: techno logy creates the risk to privacy, it is the role of law to protect privacy again st \line \up0 \expndtw0\charscalex102 this incursion of technology. Thus priv acy law has been established to control the use of personal \line \up0 \expndt w-2\charscalex100 information collected by means of computerized databases, private conversations overhead though \line \up0 \expndtw-3\charscalex100 t elephone networks. \par\pard\qj \li1989\ri462\sb226\sl-254\slmult0 \up0 \expndtw -1\charscalex100 Although it has sometimes been said that technology outpaces th e law, raising the question of whether \up0 \expndtw-2\charscalex100 law can ope rate effectively in a technological environment, it should be noted that legal s tandards based \up0 \expndtw0\charscalex100 on fair information practices, rathe r than the regulation of particular technique, have actually withstood \up0 \exp

ndtw0\charscalex103 the test of time fairly well. Thus the US Privacy Act of 197 4 is still operational a quarter of a century \up0 \expndtw0\charscalex100 later and he OECD Guidelines of 1980 continue to exert enormous influence on the shap ing of privacy \up0 \expndtw0\charscalex102 practices almost two decades after t heir adoption. Thus the current discussion regarding concerning \up0 \expndtw0\c harscalex100 the OECD Guidelines is not about updating or revising the principle s, but rather applying the principles \up0 \expndtw-1\charscalex100 in the new i nformation environment. \par\pard\qj \li1989\ri497\sb238\sl-240\slmult0 \up0 \ex pndtw-2\charscalex100 Still, given the opportunity that the Internet provides fo r new technical solutions for privacy protections, it \up0 \expndtw-3\charscalex 100 is worth considering how such methods might be developed and adopted. \par\p ard\ql \li1685\sb240\sl-241\slmult0\tx1989 \up0 \expndtw-5\charscalex100 4. \tab \up0 \expndtw0\charscalex108 Whether new technology can protect privacy \par\pa rd\qj \li1348\ri452\sb208\sl-255\slmult0 \up0 \expndtw0\charscalex100 The limita tions of law have renewed the focus on technical methods to protect privacy. But it remains unclear \line \up0 \expndtw0\charscalex103 whether technology to pro vide a comprehensive solution. It is necessary in the first instance to distingu ish \line \up0 \expndtw-1\charscalex100 between genuine technical means to prote ct privacy and those technical means that in fact promote collection \line \up0 \expndtw-2\charscalex100 of personally identifiable information. Privacy Enhanci ng Technologies (PET) are generally understood as those \line \up0 \expndtw-1\ch arscalex100 that limit or eliminate the collection of personally identifiable in formation. Such methods include techniques for \line \up0 \expndtw0\charscalex10 0 anonymous and pseudo-anonymous payment, communication, and web access. By limi ting the collection of \line \up0 \expndtw0\charscalex100 personal information, these approaches enable transactions avoid the creation of personal informati on. By \line \up0 \expndtw0\charscalex104 analogy to the environmental context, this would be much like the design of an engine that generated no \line \up0 \e xpndtw-3\charscalex100 pollutants \par\pard\qj \li1348\ri515\sb227\sl-253\slmult 0 \up0 \expndtw-1\charscalex100 Privacy Extracting Techniques (~PET) typically c reate a technological framework that facilitates the disclosure \up0 \expndtw-2\ charscalex100 of personal information, often without any assurance of protection or legal safeguards. These techniques which \up0 \expndtw0\charscalex100 are of ten confused with true PETs are put forward by commercial firms and others as a "technical solution" to \up0 \expndtw0\charscalex100 privacy when in fact they a re designed to make it easier to obtain personal data. \par\pard\qj \li1348\ri49 6\sb202\sl-260\slmult0 \up0 \expndtw0\charscalex100 Whether new technology can p rotect privacy will thus depend on several factors, including the progress in th e \up0 \expndtw-1\charscalex100 development of these techniques, their acceptanc e by consumers and others, and the ability to discern actual \up0 \expndtw-1\cha rscalex100 methods for privacy protection from those that are likely to further erode privacy protection. \par\pard\ql \li1044\sb216\sl-241\slmult0\tx1348 \up0 \expndtw-5\charscalex100 5. \tab \up0 \expndtw0\charscalex105 What We Are Asked to Consider \par\pard\qj \li1348\ri517\sb204\sl-260\slmult0 \up0 \expndtw-1\char scalex100 A variety of arguments are put forward about how to address these new privacy challenges. Here I summarize \up0 \expndtw-2\charscalex100 the main char acteristics of these claims. \par\pard\ql \li1685\sb0\sl-241\slmult0 \par\pard\q l\li1685\sb0\sl-241\slmult0 \par\pard\ql\li1685\sb214\sl-241\slmult0 \up0 \expnd tw0\charscalex106 1. Private sector \par\pard\qj \li1989\ri492\sb210\sl-253\slm ult0 \up0 \expndtw-2\charscalex100 The private sector argues that market systems and new technology provide new opportunities to protect \up0 \expndtw0\charscal ex100 privacy that do not require regulation or the rule of law. They believe th at it is possible to use contract\up0 \expndtw-2\charscalex100 based interaction s to negotiate privacy preferences. These preferences, they believe, will vary from \up0 \expndtw-3\charscalex100 individual to individual and circumsta nce to circumstance. \par\pard\ql \li1989\sb237\sl-241\slmult0 \up0 \expndtw0\ch arscalex102 Techniques to implement this approach include P3P, the Platform for Privacy Preferences. P3P is a \par\pard\qj\pvpg\phpg\posx520\posy15340\absw11209 \up0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1\f2\fs16 http://www.unesco.org /webworld/infoethics_2/eng/papers/paper_10.htm\par\pard\qj\pvpg\phpg\posx11440\p

osy15340\absw289 \up0 \expndtw-7\charscalex100 6/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g7}{\bkmkend Pg7}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\ri517\sb 78\sl-255\slmult0 \up0 \expndtw-2\charscalex100 \ul0\nosupersub\cf2\f3\fs21 tech nical standard that allows a web client or user to articulate a privacy preferen ce and a web server to \up0 \expndtw0\charscalex100 specify the level of privacy that will be respected. When a client contact a servers a negotiation takes \up 0 \expndtw-1\charscalex100 place between the two rule sets. If the clients priva cy preferences will be accommodates by the server, \up0 \expndtw0\charscalex100 then the session will begin. If the client's privacy preferences will not be acc ommodated by the server, \up0 \expndtw-1\charscalex100 then the client can decid e whether to continue. \par\pard\qj \li1989\ri503\sb205\sl-256\slmult0 \up0 \exp ndtw0\charscalex105 A related approach is trust labels, which provide a visible image on a web page that is linked to a \line \up0 \expndtw0\charscalex102 priva cy policy. There is no assurance with the seal that any particular p rivacy policy will be \line \up0 \expndtw0\charscalex104 implemented, but the seal does provide a readily identifiable link to a company's privacy policy. An \line \up0 \expndtw-1\charscalex100 example of this program is Truste. There is also an effort underway among the Better Business Bureau \line \up0 \expndtw-2\ charscalex100 in the USA, the European Commission, and the Japanese government t o develop new privacy labels for \line \up0 \expndtw-3\charscalex100 the Interne t. \par\pard\qj \li1989\ri488\sb224\sl-256\slmult0 \up0 \expndtw0\charscalex100 There are many problems with the so-called "self-regulatory " approach to privacy protection. \up0 \expndtw0\charscalex100 Fundamentally the initiat ives eliminate any baseline requirement for privacy protection and eviscerate \u p0 \expndtw0\charscalex102 currently establish privacy rights and norms. One of the consequences of the contract approach is to \up0 \expndtw-2\charscalex100 ex clude from certain activities individuals who express high or even moderate priv acy preferences. Thus \up0 \expndtw-1\charscalex100 the problem of discriminatio n against those who wish to exercise a privacy right emerges. Privacy laws, \up0 \expndtw-1\charscalex100 which generally recognize a principle of fair or lawfu l obtaining of personal information, would generally \up0 \expndtw-2\charscalex1 00 not permit such an open-ended negotiation. \par\pard\qj \li1989\ri512\sb205\s l-255\slmult0 \up0 \expndtw-1\charscalex100 There is also the interesting questi on of whether negotiating privacy relations is actually efficient as the \up0 \e

xpndtw-2\charscalex100 economic argument presumes. Consider the application of a negotiated privacy protection to the current \up0 \expndtw-2\charscalex100 regi me of telephone communication. Such an approach would require individuals to con sider at the time \up0 \expndtw0\charscalex103 of each call how much privac y they desire and then determine whether the recipient of the \up0 \ex pndtw-2\charscalex100 communication, or for that matter, the communication carrier, will respect the individual's privacy \up0 \expndtw-2\charscalex 100 preference. On first pass, a call to a doctor may require a high privacy pre ference. A conversation with a \up0 \expndtw-2\charscalex100 friend may require a moderate privacy, while a call to a merchant may be only a low privacy need. W hat \up0 \expndtw0\charscalex100 if the call to the doctor is only to confirm th e time of a previously schedule appointment, while the call \up0 \expndtw0\chars calex100 to a merchant is to purchase a surprised gift for a family member. \par \pard\qj \li1989\ri498\sb230\sl-250\slmult0 \up0 \expndtw-2\charscalex100 Such a negotiation over privacy preferences in routine telephone communicatio ns would certainly \up0 \expndtw-1\charscalex100 introduce new transaction cos ts. Moreover, it would tend to squeeze out the high level of protection that \up 0 \expndtw-1\charscalex100 all telephone users currently enjoy for telephone cal ls of all purposes. \par\pard\qj \li1989\ri499\sb202\sl-260\slmult0 \up0 \expndt w-1\charscalex100 Serious doubts remain about the Private Sector claim that priv acy can be adequately protected by self\up0 \expndtw0\charscalex100 regulatory m eans. Moreover, the self-regulatory approach is likely to result in a substantia l reduction in \up0 \expndtw-1\charscalex100 the protection of privacy. \par\par d\ql \li1685\sb0\sl-241\slmult0 \par\pard\ql\li1685\sb0\sl-241\slmult0 \par\pard \ql\li1685\sb194\sl-241\slmult0 \up0 \expndtw0\charscalex106 2. Government \par \pard\qj \li1989\ri470\sb230\sl-253\slmult0 \up0 \expndtw-2\charscalex100 The g overnment often emphasizes the benefits of new technology to protect pu blic safety and to \up0 \expndtw0\charscalex100 promote efficient administra tion. One of the most problematic recent debates concerns the use of \up0 \expndtw-1\charscalex100 CCTV. The government argument is that these cameras pla ced on street corners reduce the incidence \up0 \expndtw-1\charscalex100 of crim e by subjecting individuals to ongoing surveillance. \par\pard\qj \li1989\ri492\ sb202\sl-260\slmult0 \up0 \expndtw0\charscalex100 Governments have also proposed means of national identity to promote the efficient administration of \up0 \exp ndtw-5\charscalex100 services \par\pard\qj \li1989\ri430\sb200\sl-260\slmult0 \u p0 \expndtw-2\charscalex100 In the development of these new means for mo nitoring the activity of citizens, government might \up0 \expndtw0\charsca lex100 acknowledge a privacy concern but are unlikely to allow a privacy to subs tantially change or preempt \up0 \expndtw0\charscalex104 the development of such systems. Privacy is sometimes accommodated so as to legitimate a new \up0 \expn dtw-2\charscalex100 system for social surveillance. \par\pard\ql \li1685\sb0\sl241\slmult0 \par\pard\ql\li1685\sb0\sl-241\slmult0 \par\pard\ql\li1685\sb194\sl241\slmult0 \up0 \expndtw0\charscalex106 3. Citizen Groups \par\pard\qj\pvpg\ph pg\posx520\posy15340\absw11209 \up0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1 \f2\fs16 http://www.unesco.org/webworld/infoethics_2/eng/papers/paper_10.htm\par \pard\qj\pvpg\phpg\posx11440\posy15340\absw289 \up0 \expndtw-7\charscalex100 7/1 1 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}

{\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g8}{\bkmkend Pg8}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-4\ charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1348\ri506\sb 74\sl-260\slmult0 \up0 \expndtw-1\charscalex100 \ul0\nosupersub\cf2\f3\fs21 Citi zen groups argue that our primary concern should be to extend fundamental legal norms to the new digital \line \up0 \expndtw-1\charscalex100 world. \par\pard\qj \li1348\ri502\sb206\sl-253\slmult0 \up0 \expndtw0\charscalex100 The Global Inte rnet Liberty Campaign, a coalition of more than 50 NGOS in 20 countries, took ac tion on the \line \up0 \expndtw0\charscalex104 question of the citizens right to use cryptography and other technical methods to protect personal privacy \line \up0 \expndtw-1\charscalex100 when the subect was under consideration by the Org anization for Economic Cooperation and Development in \line \up0 \expndtw-1\char scalex100 1996. \par\pard\qj \li1348\ri495\sb225\sl-256\slmult0 \up0 \expndtw-2\ charscalex100 The matter of government efforts to regulate the use of encryption was already a controversial matter, \up0 \expndtw0\charscalex102 particularly among users of the Internet. A noted cryptographer Phil Zimmer man faced prosecution in the \up0 \expndtw-1\charscalex100 United States for the alleged distribution of cryptographic techniques, that were then considered by US export \up0 \expndtw0\charscalex100 regulation to be a munition requiring lic ense. Internet organizations had organized campaigns against the \up0 \expn dtw0\charscalex100 prosecution of Zimmerman and the restrictions on the use of encryption. These campaigns invariably \up0 \expndtw-1\charscalex100 emphasized the excesses of government control in this area. \par\pard\qj \li134 8\ri517\sb204\sl-256\slmult0 \up0 \expndtw0\charscalex103 But it was the GILC t hat first clearly articulated the basis for this claim as a matter of intern ational legal \up0 \expndtw0\charscalex103 norms. The organization issued a Reso lution in Support of the Freedom to Use Cryptography in Paris that \up0 \expndtw 0\charscalex100 stated at the outset that "the use of cryptography implicates hu man rights and matters of personal liberty that \up0 \expndtw0\charscalex102 aff ect individuals around the world," and further that "the privacy of communicatio n is explicitly protected by \up0 \expndtw0\charscalex100 Article 12 of the Univ ersal Declaration of Human Rights, Article 17 of the International Covenant on C ivil and \up0 \expndtw0\charscalex100 Political Rights, and national law." \par\ pard\qj \li1348\ri527\sb201\sl-260\slmult0 \up0 \expndtw0\charscalex100 On the b asis of these norms, the GILC urged the Organization for Economic Cooperation an d Development \up0 \expndtw0\charscalex100 base its cryptography policies "on th e fundamental right of citizens to engage in private communication \par\pard\qj \li1348\ri476\sb200\sl-260\slmult0 \up0 \expndtw-2\charscalex100 The Cryptograph y Guidelines of the OECD included a principle on Protection of Privacy and Perso nal Data that \up0 \expndtw0\charscalex100 stated "The fundamental rights of ind ividual to privacy, including secrecy of communications and protection of \up0 \ expndtw0\charscalex102 personal data, should be respected in national cryptog raphy policies and the implementation and use of \up0 \expndtw0\charscalex102 cryptographic methods." \par\pard\ql \li1044\sb0\sl-241\slmult0 \par\pard\ql\li1 044\sb0\sl-241\slmult0 \par\pard\ql\li1044\sb194\sl-241\slmult0\tx1348 \up0 \exp ndtw-5\charscalex100 6. \tab \up0 \expndtw0\charscalex107 What Should Guide Our Actions \par\pard\qj \li1348\ri500\sb204\sl-260\slmult0 \up0 \expndtw0\charscale x100 Faced with theses new challenges to privacy, and these competing views of h ow best to protect privacy, how \up0 \expndtw0\charscalex100 should we proceed?

If we were primarily concerned with the economic benefits of our actions, we mig ht ask \up0 \expndtw0\charscalex103 which course would provide the most short-te rm commercial gain. But as our focus is principles of human \up0 \expndtw0\chars calex100 rights and the realization of the citizen in the Information Society as full participant with meaningful claims in \up0 \expndtw0\charscalex100 the pol itical world, we should take a different approach. \par\pard\qj \li1348\ri510\sb 204\sl-256\slmult0 \up0 \expndtw0\charscalex104 First, we should accept the prem ise that law has a fundamental role in the protection of human rights and \line \up0 \expndtw0\charscalex100 democratic institutions. While is an imperfect inst rument, it also establishes the principle that all people in all \line \up0 \exp ndtw-1\charscalex100 countries of the world, regardless of wealth or social stat us, are entitled to certain essential freedoms and one \line \up0 \expndtw0\char scalex102 of these freedoms is the protection of private life. Law not only imbues citizens with the rights that are \line \up0 \expndtw0\charscalex103 necessary for self-governance it also provides the legitimacy that allow others to rely on a legal system for \line \up0 \expndtw-3\charscalex100 redress. \par \pard\qj \li1348\ri482\sb205\sl-255\slmult0 \up0 \expndtw0\charscalex102 Second, we should not adopt a view of technology that it is autonomous or stands apart from the actions of \up0 \expndtw0\charscalex100 specific individuals or insti tutions. As Thomas Edison said, "What man creates with his hand, he shou ld \up0 \expndtw-1\charscalex100 control with his head." We should call for acco untability for those who develop systems of surveillance while at \up0 \expndtw0 \charscalex104 the same exercising our own responsibility to engage the politica l process to seek technical methods that \up0 \expndtw-3\charscalex100 advance t he aims of privacy protection. \par\pard\qj \li1348\ri466\sb227\sl-253\slmult0 \ up0 \expndtw0\charscalex102 In the end, we must side with the interests of the c itizen. Neither governments nor corporations are in much \up0 \expndtw0\charscal ex100 need of political assistance these days. Both can take care of their inter ests with great efficiency. But citizens \up0 \expndtw0\charscalex100 and citize n organization must continue to engage the political process if the rights of th e individual are to be \up0 \expndtw-4\charscalex100 preserved in the online wor ld. \par\pard\qj\pvpg\phpg\posx520\posy15340\absw11209 \up0 \expndtw-7\charscale x100 \ul0\nosupersub\cf1\f2\fs16 http://www.unesco.org/webworld/infoethics_2/eng /papers/paper_10.htm\par\pard\qj\pvpg\phpg\posx11440\posy15340\absw289 \up0 \exp ndtw-7\charscalex100 8/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g9}{\bkmkend Pg9}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw-2\

charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-2\charscal ex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\li520\sb97\sl-241\s lmult0\fi524\tx1348 \up0 \expndtw-2\charscalex100 \ul0\nosupersub\cf2\f3\fs21 7. \tab \up0 \expndtw-2\charscalex100 What We Should Do\par\pard\qj \li1348\ri493\s b199\sl-256\slmult0 \up0 \expndtw0\charscalex105 We have learned in recent years that privacy is more than a subject for debate among academics. It is a \up0 \e xpndtw0\charscalex100 matter of personal concern that has often resulted in dire ct political action. Citizens in Australia have taken to \up0 \expndtw0\charscal ex100 the streets to protest a national identity card. In Germany, the populatio n objected to a national census. In the \up0 \expndtw-2\charscalex100 United St ates, users of the Internet expressed their opposition to efforts by t he government to limit the \up0 \expndtw0\charscalex100 availability of str ong techniques to protect personal privacy. Currently, the members of the G lobal Internet \up0 \expndtw-1\charscalex100 Liberty Campaign are organizing in more than thirty countries to end the treatment of encryption as a munition \up0 \expndtw-1\charscalex100 so that it could be more widely available to protect t he privacy of citizens. \par\pard\qj \li1348\ri4838\sb36\sl-460\slmult0\tx1685 \ up0 \expndtw-2\charscalex100 The protection of privacy is increasingly a call fo r political action \line\tab \up0 \expndtw-5\charscalex100 1. \up0 \expndtw-2\ch arscalex100 Reaffirm support for fundamental legal instruments \par\pard\qj \li1 989\ri511\sb191\sl-253\slmult0 \up0 \expndtw0\charscalex100 There is a tendency in all discussions of cyberspace to imagine that our society has gone directly f rom \line \up0 \expndtw0\charscalex103 the era of the horse-drawn cart to the ag e of space exploration with hardly a step in between. But of \line \up0 \expndtw 0\charscalex100 course, the history of communications technology is filled with many stages at which time issues such \line \up0 \expndtw0\charscalex100 as tech nological change, internationalization, the role of law and technical standards are considered \par\pard\qj \li1989\ri511\sb202\sl-260\slmult0 \up0 \expndtw-2\c harscalex100 The protection of privacy is one of the issues that has been previo usly considered in the development of \line \up0 \expndtw0\charscalex100 new tec hnology, and it would be wise to recognize and understand the previous efforts t o address this \line \up0 \expndtw-1\charscalex100 issue. \par\pard\qj \li1989\r i511\sb200\sl-260\slmult0 \up0 \expndtw-1\charscalex100 Article 12 of the Univer sal Declaration of Human Rights, the OECD Guidelines, the UN Convention, and \up 0 \expndtw0\charscalex100 other similar documents are all still relevant to the current effort to preserve privacy in the information \up0 \expndtw0\charscalex1 02 society. Indeed, these documents may provide the best, most well informed con sideration to date of \up0 \expndtw0\charscalex102 how best to protect this fund amental human right in light of technological change. \par\pard\qj \li1989\ri475 \sb200\sl-260\slmult0 \up0 \expndtw0\charscalex100 Thus the starting point for a n international effort to protect privacy in our new online world should be to \ up0 \expndtw-1\charscalex100 reaffirm support for international instruments on p rivacy protection. \par\pard\ql \li1685\sb216\sl-241\slmult0\tx1989 \up0 \expndt w-5\charscalex100 2. \tab \up0 \expndtw0\charscalex108 Assert the applicability of legal norms across national borders \par\pard\qj \li1989\ri470\sb207\sl-256\s lmult0 \up0 \expndtw0\charscalex100 A second effort to be to assert the applicab ility of legal norms across national borders. Although it may \up0 \expndtw-2\ch arscalex100 be fashionable to speak about the Internet as a "regulation -free zone," in fact there is plenty of \up0 \expndtw0\charscalex103 regu lation for the Internet, except not enough to protect the privacy of its inhab itants. Users of the \up0 \expndtw0\charscalex104 Internet have at least as muc h right to claim a legal right to protect their personality as authors and \up0 \expndtw0\charscalex103 holders of copyright have to claim a legal right in thei r artistic works. The creation of the borderless \up0 \expndtw0\charscalex100 cy berspace has not slowed the call for the adoption of new laws to protect digital works; it should not \up0 \expndtw0\charscalex100 slow the effort to adopt new safeguards for the digital persona. \par\pard\qj \li1989\ri378\sb201\sl-260\slmu lt0 \up0 \expndtw-2\charscalex100 The protection of privacy across national borders benefits in particular from the establishment of \up0 \expndtw0 \charscalex100 international legal norms, such as Article 12 of the Universal De

claration of Human Rights, as well as \up0 \expndtw-3\charscalex100 previous ef forts to promote the transborder flow of information while respecting the privacy of the \up0 \expndtw-4\charscalex100 individual as was the aim of the OECD Guidelines of 1980. \par\pard\qj \li1989\ri497\sb206\sl-253\slmult0 \u p0 \expndtw-1\charscalex100 It would be a grave mistake for UNESCO and the human rights community generally to turn its back on \up0 \expndtw0\charscalex100 the se well established legal norms and leave the protection of privacy t o the cold logic of the \up0 \expndtw-1\charscalex100 marketplace and the t echnical methods that are intended to promote the disclosure of greater amounts \up0 \expndtw-2\charscalex100 of personal data. \par\pard\ql \li1685\sb237\sl-24 1\slmult0\tx1989 \up0 \expndtw-5\charscalex100 3. \tab \up0 \expndtw0\charscalex 108 Promote the development of technology to protect privacy \par\pard\qj \li198 9\ri527\sb210\sl-253\slmult0 \up0 \expndtw0\charscalex103 While we should not l essen our efforts to ensure the effective application of privacy rights acros s \up0 \expndtw0\charscalex100 national borders, we should also not ignore the p ossibility that technology may provide some solutions \up0 \expndtw0\charscalex1 03 to the protection of privacy. But here we should be careful to distinguish be tween means that in fact \up0 \expndtw0\charscalex103 protect privacy and those that merely appear to. \par\pard\ql \li1989\sb237\sl-241\slmult0 \up0 \expndtw0\ charscalex100 In the first instance, the best form of privacy protection by tech nological means is that which ensures \par\pard\qj\pvpg\phpg\posx520\posy15340\a bsw11209 \up0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1\f2\fs16 http://www.un esco.org/webworld/infoethics_2/eng/papers/paper_10.htm\par\pard\qj\pvpg\phpg\pos x11440\posy15340\absw289 \up0 \expndtw-7\charscalex100 9/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz294\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g10}{\bkmkend Pg10}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw4\charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-4\charsc alex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj \li1989\ri443\ sb77\sl-256\slmult0 \up0 \expndtw0\charscalex100 \ul0\nosupersub\cf2\f3\fs21 ano nymous transactions. Anonymity is the ideal privacy technology because it avoids the creation and \up0 \expndtw0\charscalex100 collection of personally identif iable information. Anonymity exists by custom and practice in many \up0 \ex pndtw0\charscalex100 contexts today. Travel, communication, commerce, as well as the receipt of information typically occur \up0 \expndtw0\charscalex105 with a high degree of anonymity, at least to the extent to the actual identify is rarel y known for the \up0 \expndtw0\charscalex100 person on the sidewalk, the fellow at the payphone, the woman who purchases lunch, the reader of a \up0 \expndtw0\c

harscalex100 magazine or the viewer of a television program. \par\pard\qj \li198 9\ri477\sb201\sl-260\slmult0 \up0 \expndtw0\charscalex102 Techniques for anony mity should be robust, trust-worthy, and simple to implement in routin e \line \up0 \expndtw-2\charscalex100 commercial transactions. All reasonable efforts should be made to promote the development and \line \up0 \expn dtw-2\charscalex100 adoption of techniques for anonymity and related approaches for the protection of actual identity. \par\pard\qj \li1989\ri472\sb204\sl-256\s lmult0 \up0 \expndtw0\charscalex105 This defense of anonymity is not intended to promote the life of the hermit or to discourage social \up0 \expndtw-1\charscal ex100 relations. Quite the opposite. A strong right of anonymity gives ind ividuals the opportunity to freely \up0 \expndtw0\charscalex103 choose with wh om to share aspects of personality and to form bonds of trust. Anonymity is not a \up0 \expndtw0\charscalex105 description of a static state. It is a rathe r the starting point for a dynamic, evolving series of social \up0 \expndtw-1\ch arscalex100 relations that derive their authenticity and value from the opportun ity for each individual to choose his or \up0 \expndtw-2\charscalex100 her frien ds, colleagues, neighbors and lovers. \par\pard\qj \li1989\ri517\sb201\sl-260\sl mult0 \up0 \expndtw0\charscalex102 In the second instance, the next best form of privacy protection by technological means is that which \up0 \expndtw0\charscal ex102 ensures the application and enforcement of Fair Information Practices. For example, techniques that \up0 \expndtw0\charscalex104 allow individuals to limi t the use of data, to gain access to their own data, and to make corrections \up 0 \expndtw-1\charscalex100 where appropriate should be encouraged as they seek t o establish by technical means those rights and \up0 \expndtw-2\charscalex100 re sponsibilities that would otherwise be accomplished in law. \par\pard\qj \li1989 \ri511\sb204\sl-256\slmult0 \up0 \expndtw-1\charscalex100 The least desirable means to protect privacy by technology are those proposals that encou rage \up0 \expndtw0\charscalex100 individuals to enter into negotiation with the purpose of obtaining consent for the collection and use of \up0 \expndtw-1\char scalex100 personal data. Such techniques have no independent privacy component a nd simply offer a framework \up0 \expndtw-2\charscalex100 for market-based trans action over privacy claims. Such techniques may be appropriate for the purchase \up0 \expndtw0\charscalex100 of soap or shoes but they are hardly compatible wit h the protection of fundamental human rights that \up0 \expndtw0\charscalex100 a re well established in law. \par\pard\ql \li1685\sb217\sl-241\slmult0\tx1989 \up 0 \expndtw-5\charscalex100 4. \tab \up0 \expndtw0\charscalex109 Encourage citize n participation in decision-making \par\pard\qj \li708\sb0\sl-253\slmult0 \par\p ard\qj\li708\ri436\sb17\sl-253\slmult0 \up0 \expndtw0\charscalex104 Finally, it important to emphasize the procedural consideration that should guide the develo pment of all law and \up0 \expndtw0\charscalex100 policy concerning the developm ent of the Information Society and that is the active and meaningful participati on of \up0 \expndtw-1\charscalex100 citizens in the decision-making process. Such interests are invariably underrepresented in decisions taken by \ up0 \expndtw-2\charscalex100 national and international governing borders. \par\ pard\qj \li708\ri496\sb202\sl-260\slmult0 \up0 \expndtw0\charscalex102 No group has a greater stake in the protection of privacy than the new inhabitants of cyb erspace. Let us enjoy the \up0 \expndtw-2\charscalex100 benefits of the future while preserving the freedoms of our past. That is the promise and the challenge of the \up0 \expndtw-3\charscalex100 Information Society. \par\p ard\ql \li708\sb0\sl-241\slmult0 \par\pard\ql\li708\sb0\sl-241\slmult0 \par\pard \ql\li708\sb214\sl-241\slmult0 \up0 \expndtw0\charscalex104 Resources \par\pard\ qj \li1348\ri2842\sb39\sl-460\slmult0 \up0 \expndtw-4\charscalex100 Agre and Rot enberg, Technology and Privacy: The New Landscape (MIT Press 1997) \up0 \expnd tw-5\charscalex100 Bennet, Regulating Privacy (University of Illinois 1992) \par \pard\ql \li1348\sb181\sl-241\slmult0 \up0 \expndtw-3\charscalex100 EPIC web sit e [www.epic.org] \par\pard\qj \li1348\ri3351\sb22\sl-480\slmult0 \up0 \expndtw-1 \charscalex100 Gandy, The Panoptic Sort : A Political Economy of Personal Inform ation (1993) \up0 \expndtw-3\charscalex100 Global Internet Liberty Campaign web site [www.gilc.org] \par\pard\ql \li1348\sb178\sl-241\slmult0 \up0 \expndtw-3\ch arscalex100 Privacy International web site [www.privacy.org/pi/] \par\pard\ql \l

i1348\sb220\sl-241\slmult0 \up0 \expndtw-5\charscalex100 Rotenberg, The Privacy Law Sourcebook (EPIC 1998) \par\pard\qj\pvpg\phpg\posx520\posy15340\absw11209 \up0 \expndtw-7\charscalex100 \ul0\nosupersub\cf1\f2\fs16 http://www.unesco.org/ webworld/infoethics_2/eng/papers/paper_10.htm\par\pard\qj\pvpg\phpg\posx11360\po sy15340\absw369 \up0 \expndtw-7\charscalex100 10/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom15268\shpfhdr0\shp bxpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz296\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 14682}} {\sp{\sn pVerticies}{\sv 8;4;(11094,14682);(0,14682);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24\paperw12240\paperh15840\pard\sb0\sl-240{\bkmkstart P g11}{\bkmkend Pg11}\par\pard\li520\sb88\sl-184\slmult0\fi0\tx4420 \up0 \expndtw5\charscalex100 \ul0\nosupersub\cf1\f2\fs16 20/3/2014\tab \up0 \expndtw-5\charsc alex100 PRESERVING PRIVACY IN THE INFORMATION SOCIETY\par\pard\qj\pvpg\phpg\posx 520\posy15340\absw11209 \up0 \expndtw-5\charscalex100 http://www.unesco.org/webw orld/infoethics_2/eng/papers/paper_10.htm\par\pard\qj\pvpg\phpg\posx11360\posy15 340\absw369 \up0 \expndtw-5\charscalex100 11/11 {\shp {\*\shpinst\shpleft0\shptop0\shpright20\shpbottom15840\shpfhdr0\shpbxpage\ shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz12\shplid0 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 20}}{\sp{\sn geoBottom}{\sv 15840}} {\sp{\sn pVerticies}{\sv 8;4;(0,15840);(20,15840);(20,0);(0,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }} {\shp {\*\shpinst\shpleft586\shptop586\shpright11680\shpbottom1973\shpfhdr0\shpb xpage\shpbypage\shpwr3\shpwrk0\shpfblwtxt1\shpz296\shplid1 {\sp{\sn shapeType}{\sv 0}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{ \sn geoRight}{\sv 11094}}{\sp{\sn geoBottom}{\sv 1387}} {\sp{\sn pVerticies}{\sv 8;4;(11094,1387);(0,1387);(0,0);(11094,0)}} {\sp{\sn pSegmentInfo}{\sv 2;10;16384;45824;1;45824;1;45824;1;45824;24577;32768} } {\sp{\sn fFillOK}{\sv 1}}{\sp{\sn fFilled}{\sv 1}}{\sp{\sn fillColor}{\sv 167772 15}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn lineType}{\sv 0}}{\sp{\sn fArrowheadsOK}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn lineColor}{\sv 0}} }}\par\pard\sect\sectd\fs24}

Vous aimerez peut-être aussi