SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
Transboundary	
  challenges	
  	
  
  to	
  privacy	
  protec5on	
  

                         Joanna	
  Kulesza	
  
                           University	
  of	
  Lodz	
  
               Faculty	
  of	
  Law	
  and	
  Administra5on	
  
 Department	
  of	
  Interna5onal	
  Law	
  and	
  Interna5onal	
  Rela5ons	
  
                                        	
  
        Oxford	
  Internet	
  Ins5tute,	
  August	
  15th,	
  2012	
  	
  
scope	
  
•    legal	
  tools	
  for	
  privacy	
  protec5on	
  
•    privacy	
  as	
  an	
  unenforcable	
  human	
  right	
  
•    European	
  approach	
  to	
  privacy	
  protec5on	
  
•    peer-­‐to-­‐peer	
  privacy	
  (Web	
  2.0)	
  
•    safe	
  harbor	
  agreements	
  	
  
•    walled	
  gardens	
  of	
  privacy	
  	
  
•    extra-­‐legal	
  solu5on	
  to	
  the	
  privacy	
  challenge	
  
Universal	
  Declara2on	
  of	
  
Human	
  Rights	
  (UDHR)	
  1948	
  
Ar2cle	
  12.	
  No	
  one	
  shall	
  be	
  subjected	
  
to	
  arbitrary	
  interference	
  with	
  his	
  
privacy,	
  family,	
  home	
  or	
  
correspondence,	
  nor	
  to	
  aPacks	
                               	
  

upon	
  his	
  honour	
  and	
  reputa5on.	
  
Ar2cle	
  29.	
  (2)	
  In	
  the	
  exercise	
  of	
  
his	
  rights	
  and	
  freedoms,	
  
everyone	
  shall	
  be	
  subject	
  only	
  
to	
  such	
  limita2ons	
  as	
  are	
  	
  
	
  	
  •  determined	
  by	
  law	
  
     •  solely	
  for	
  the	
  purpose	
  of	
  securing	
  due	
  recogni5on	
  and	
  respect
                                                                                               	
  
           for	
  the	
  rights	
  and	
  freedoms	
  of	
  others	
  and	
  
     •  of	
  mee5ng	
  the	
  just	
  requirements	
  of	
  morality,	
  public	
  order	
  
           and	
  the	
  general	
  welfare	
  in	
  a	
  democra5c	
  society.	
  
                                                                              author: unknown, source: Wikipedia
Interna5onal	
  Covenant	
  on	
  Civil	
  and	
  
          	
   Poli5cal	
  Rights	
  (ICCPR)
                                           	
  




•    draUed:	
  1954	
  
•    adopted	
  :	
  1966	
  
•    entry	
  into	
  force:	
  1976	
     author: IdiotSavant, source: Wikipedia,
Interna2onal	
                        Ar2cle	
  17	
  	
  
Covenant	
  on	
                      1.	
  No	
  one	
  shall	
  be	
  subjected	
  
Civil	
  and	
                           to	
  arbitrary	
  or	
  unlawful	
  
Poli2cal	
  Rights	
                     interference	
  with	
  his	
  
                                         privacy,	
  family,	
  home	
  or	
  
                                           correspondence,	
  nor	
  to	
  unlawful	
  
                                           aPacks	
  on	
  his	
  honour	
  and	
  
                                           reputa5on.	
  	
  

 UN	
  Human	
  Rights	
  Commi2ee	
  (HRC)	
  
 CCPR	
  General	
  Comment	
  No.	
  16:	
  Ar?cle	
  17	
  (Right	
  to	
  Privacy)	
  	
  
          The	
  Right	
  to	
  Respect	
  of	
  Privacy,	
  Family,	
  Home	
  and	
  
       Correspondence,	
  and	
  Protec?on	
  of	
  Honour	
  and	
  Reputa?on	
              	
  
                                                                              8	
  April	
  1988   	
  
CCPR	
  General	
  Comment	
  No.	
  16	
  
•  States	
  are	
  required	
  to	
  adopt	
  measures	
  to	
  ensure	
  that	
  the	
  
   prohibi5on	
  against	
  privacy	
  interferences	
  and	
  aPacks	
  is	
  
   effec5ve	
  	
  
•  A	
  posi5ve	
  obliga5on	
  of	
  states	
  to	
  ac5vly	
  protect	
  individual	
  
   privacy	
  against	
  interference:	
  „Effec?ve	
  measures	
  have	
  to	
  be	
  
   taken	
  by	
  States	
  to	
  ensure	
  that	
  informa?on	
  concerning	
  a	
  
   person's	
  private	
  life	
  does	
  not	
  reach	
  the	
  hands	
  of	
  persons	
  who	
  
   are	
  not	
  authorized	
  by	
  law	
  to	
  receive,	
  process	
  and	
  use	
  it 	
  
•  Surveillance,	
  whether	
  electronic	
  or	
  otherwise,	
  intercep?ons	
  of	
  
   telephonic,	
  telegraphic	
  and	
  other	
  forms	
  of	
  communica?on,	
  
   wire-­‐tapping	
  and	
  recording	
  of	
  conversa?ons	
  should	
  be	
  
   prohibited.	
  
CCPR	
  General	
  Comment	
  No.	
  16	
  
•  Lawfulness:	
  no	
  interference	
  can	
  take	
  place	
  „except	
  in	
  cases	
  
   envisaged	
  by	
  the	
  law 	
  
•  relevant	
  legisla5on	
  must	
  specify	
  in	
  detail	
  the	
  precise	
  
   circumstances	
  in	
  which	
  such	
  interferences	
  may	
  be	
  permiPed,	
  
   while:	
  „A	
  decision	
  to	
  make	
  use	
  of	
  such	
  authorized	
  interference	
  
   must	
  be	
  made	
  […]	
  on	
  a	
  case-­‐by-­‐case	
  basis 	
  
•  Arbitrariness:	
  „even	
  interference	
  provided	
  for	
  by	
  law	
  should	
  
   be	
  in	
  accordance	
  with	
  the	
  provisions,	
  aims	
  and	
  objec?ves	
  of	
  
   the	
  Covenant	
  and	
  reasonable	
  in	
  the	
  par?cular	
  circumstances 	
  
Why	
  doesn t	
  the	
  ICCPR	
  regime	
  work?	
  
World	
  Court	
  of	
  Human	
  Rights?	
  
World	
  Court	
  of	
  Human	
  Rights?	
  
The	
  establishment	
  of	
  a	
  World	
  Court	
  of	
  Human	
  Rights	
  
  could	
  help	
  to	
  bridge	
  the	
  gap	
  between	
  codified	
  rights	
  
   and	
  reality.	
  The	
  idea	
  of	
  such	
  a	
  Court	
  dates	
  back	
  to	
  
   1947.	
  Due	
  to	
  the	
  Cold	
  War,	
  however,	
  the	
  proposal	
  
 did	
  not	
  find	
  consensus	
  among	
  States.	
  Thus	
  the	
  World	
  
      Court	
  of	
  Human	
  Rights	
  was	
  never	
  realised	
  and	
  
                remained	
  s?gma?sed	
  as	
  utopian.	
  
                                                       	
  

                                                             Author: Sylvain Savolainen, source: www.udhr60.ch
Privacy	
  protec5on	
  in	
  Europe	
  
Privacy	
  protec5on	
  in	
  Europe	
  (ECHR)
                                              	
  
Conven2on	
  for	
  the	
  Protec2on	
  of	
  Human	
  Rights	
  and	
  Fundamental	
  Freedoms	
  
       (European	
  Conven5on	
  on	
  Human	
  Rights,	
  ECHR),	
  1953	
  (draUed	
  1950)	
  	
  
        ECHR	
  jurisprudence	
  recognizes	
  the	
  right	
  to	
  privacy	
  in	
  its	
  Ar5cle	
  8	
  as	
  a	
  
          deriva5ve	
  of	
  the	
  right	
  to	
  have	
  one’s	
  private	
  and	
  family	
  life	
  respected.            	
  
Ar?cle	
  8	
  
1.	
  Everyone	
  has	
  the	
  right	
  to	
  respect	
  for	
  his	
  private	
  and	
  family	
  life,	
  his	
  home	
  
       and	
  his	
  correspondence.	
  
2.	
  There	
  shall	
  be	
  no	
  interference	
  by	
  a	
  public	
  authority	
  with	
  the	
  exercise	
  of	
  this	
  
       right	
  except	
  such	
  as	
  is	
  in	
  accordance	
  with	
  the	
  law	
  and	
  is	
  necessary	
  in	
  a	
  
       democra?c	
  society	
  in	
  the	
  interests	
  of	
  na?onal	
  security,	
  public	
  safety	
  or	
  the	
  
       economic	
  well-­‐being	
  of	
  the	
  country,	
  for	
  the	
  preven?on	
  of	
  disorder	
  or	
  
       crime,	
  for	
  the	
  protec?on	
  of	
  health	
  or	
  morals,	
  or	
  for	
  the	
  protec?on	
  of	
  the	
  
       rights	
  and	
  freedoms	
  of	
  others.	
  
                                                                                            à	
  rich	
  jurisprudence            	
  
Privacy	
  protec5on	
  in	
  Europe	
  (EU)
                                                	
  
         Charter	
  of	
  Fundamental	
  Rights	
  of	
  the	
  European	
  Union	
  2009	
  (2000)                   	
  
Ar?cle	
  7	
  Respect	
  for	
  private	
  and	
  family	
  life	
  
Everyone	
  has	
  the	
  right	
  to	
  respect	
  for	
  his	
  or	
  her	
  private	
  and	
  family	
  life,	
  home	
  
       and	
  communica5ons.	
  
Ar?cle	
  8	
  Protec2on	
  of	
  personal	
  data	
  
1.	
  Everyone	
  has	
  the	
  right	
  to	
  the	
  protec5on	
  of	
  personal	
  data	
  concerning	
  him	
  
       or	
  her.	
  
2.	
  Such	
  data	
  must	
  be	
  processed	
  fairly	
  for	
  specified	
  purposes	
  and	
  on	
  the	
  basis	
  
       of	
  the	
  consent	
  of	
  the	
  person	
  concerned	
  or	
  some	
  other	
  legi5mate	
  basis	
  laid         	
  
       down	
  by	
  law.	
  Everyone	
  has	
  the	
  right	
  of	
  access	
  to	
  data	
  which	
  has	
  been	
  
       collected	
  concerning	
  him	
  or	
  her,	
  and	
  the	
  right	
  to	
  have	
  it	
  rec5fied.	
  
3.	
  Compliance	
  with	
  these	
  rules	
  shall	
  be	
  subject	
  to	
  control	
  by	
  an	
  independent	
  
       authority.	
  
        effec5veness	
  ques5oned,	
  esp.	
  with	
  the	
  Bri5sh,	
  Czech	
  and	
  Polish	
  opt-­‐out	
  protocol       	
  
privacy	
  and	
  personal	
  data	
  
Privacy	
  protec5on	
  in	
  Europe	
  (EU)
                                                	
  
     Direc5ve	
  95/46/EC	
  of	
  the	
  European	
  Parliament	
  and	
  of	
  the	
  Council	
  of	
  24	
  
              October	
  1995	
  on	
  the	
  protec5on	
  of	
  individuals	
  with	
  regard	
  to	
  the	
  
           processing	
  of	
  personal	
  data	
  and	
  on	
  the	
  free	
  movement	
  of	
  such	
  data	
  
                                                                                                             	
  
                                                           	
  
Ar5cle	
  3	
  	
  Scope	
  
2.	
  This	
  Direc5ve	
  shall	
  not	
  apply	
  to	
  the	
  processing	
  of	
  personal	
  
        data:	
  
-­‐	
  by	
  a	
  natural	
  person	
  in	
  the	
  course	
  of	
  a	
  purely	
  personal	
  or	
  
        household	
  ac2vity.	
  
                                                           	
  


                                                                                                 author/source:	
  promo5onal-­‐items.in	
  
                                                                                                                                        	
  
„a	
  purely	
  personal	
  ac5vity on-­‐line	
  

ü social	
  networks?	
  
ü private	
  pages?	
  weblogs?	
  
criteria?	
  
•  data	
  availability?	
  
•  network	
  character?	
  


                  J. Kulesza, Transboundary challenges to privacy protection
peer-­‐to-­‐peer	
  privacy	
  

     Web	
  2.0	
  challenge	
  




      J. Kulesza, Transboundary challenges to privacy protection
J. Kulesza, Transboundary challenges to privacy protection   18
J. Kulesza, Transboundary challenges
                                       19
         to privacy protection
geolocalisa5on	
  data	
  




                             20
social	
  seman5c	
  web	
  




     J. Kulesza, Transboundary challenges to privacy protection   21
J. Kulesza, Transboundary challenges to privacy protection   22
peer-­‐to-­‐peer	
  privacy	
  

•  new	
  categories	
  of	
  data	
  (geolocalisa5on)	
  

•  new	
  tools	
  enabling	
  detailed	
  personal	
  profiling	
  
   for	
  private	
  purposes	
  	
  	
  

•  no	
  anonymity	
  	
  

•  durability	
  of	
  data	
  (right	
  to	
  be	
  forgoPen?)	
  

                           J. Kulesza, Transboundary challenges to privacy protection   23
Privacy	
  2.0	
  
„Mash	
  together	
  these	
  technologies	
  (…)	
  and	
  it	
  becomes	
  trivial	
  to	
  
      receive	
  answers	
  to	
  ques?ons	
  like:	
  Where	
  was	
  Jonathan	
  
     Zi2rain	
  last	
  year	
  on	
  the	
  fourteenth	
  of	
  February?,	
  or,	
  Who	
  
       could	
  be	
  found	
  near	
  the	
  entrance	
  to	
  the	
  local	
  Planned	
  
   Parenthood	
  clinic	
  in	
  the	
  past	
  six	
  months?	
  The	
  answers	
  need	
  
   not	
  come	
  from	
  government	
  or	
  corporate	
  cameras,	
  which	
  are	
  
          at	
  least	
  par?ally	
  secured	
  against	
  abuse	
  through	
  well-­‐
     considered	
  privacy	
  policies	
  from	
  Privacy	
  1.0.	
  Instead,	
  the	
  
   answers	
  come	
  from	
  a	
  more	
  powerful,	
  genera?ve	
  source:	
  an	
  
  army	
  of	
  the	
  world’s	
  photographers,	
  including	
  tourists	
  sharing	
  
   their	
  photos	
  online	
  without	
  firm	
  (or	
  legi?mate)	
  expecta?ons	
  
                  of	
  how	
  they	
  might	
  next	
  be	
  used	
  and	
  reused. 	
  
                                       J.	
  Zi2rain,	
  „The	
  Future	
  of	
  Internet	
  and	
  How	
  to	
  Stop	
  It .	
  p.	
  46	
  


                              J. Kulesza, Transboundary challenges to privacy protection
Privacy	
  as	
  a	
  personal	
  right
                                      	
  

     na5onal	
  civil	
  law	
  challenge	
  
Privacy	
  as	
  a	
  personal	
  right
                                      	
  
                public	
  
            sphere	
  (Sozial-­‐/	
  
             Öffentlichkeitssphäre)	
  

               privacy	
  
               sphere	
  
                (Privatsphäre)	
  




               in5mate	
  
                sphere	
  
                (In5msphäre)	
  
Privacy	
  as	
  a	
  personal	
  right
                                      	
  
             public	
  sphere	
  (Sozial-­‐/	
  
               Öffentlichkeitssphäre)	
  


          social	
  sphere	
  (Sozialsphäre)	
  	
  

                 privacy	
  sphere	
  
                     (Privatsphäre)	
  

                      in5mate	
  
                       sphere	
  
                      (In5msphäre)	
  



                        secret	
  
                        sphere	
  
                      (Sekretsphäre)	
  
The	
  transatlan5c	
  challenge	
  
                                	
  
U.S.	
  vs	
  EU	
  concept	
  of	
  data	
  
                               protec5on	
  
                                           	
  
Ar5cle	
  25	
  Direc5ve	
  95/46/EC	
  	
  
1.	
  The	
  Member	
  States	
  shall	
  provide	
  that	
  the	
  transfer	
  to	
  a	
  third	
  country	
  of	
  personal	
  
       data	
  which	
  are	
  undergoing	
  processing	
  or	
  are	
  intended	
  for	
  processing	
  aUer	
  transfer	
  
       may	
  take	
  place	
  only	
  if	
  […]	
  the	
  third	
  country	
  in	
  ques5on	
  ensures	
  an	
  adequate	
  level	
  
       of	
  protec2on.	
  
2.	
  The	
  adequacy	
  of	
  the	
  level	
  of	
  protec5on	
  afforded	
  by	
  a	
  third	
  country	
  shall	
  be	
  
       assessed	
  in	
  the	
  light	
  of	
  all	
  the	
  circumstances	
  surrounding	
  a	
  data	
  transfer	
  opera5on	
  
       or	
  set	
  of	
  data	
  transfer	
  opera5ons;	
  […]	
  
3.	
  The	
  Member	
  States	
  and	
  the	
  Commission	
  shall	
  inform	
  each	
  other	
  of	
  cases	
  where	
  
       they	
  consider	
  that	
  a	
  third	
  country	
  does	
  not	
  ensure	
  an	
  adequate	
  level	
  of	
  protec5on	
  
       within	
  the	
  meaning	
  of	
  paragraph	
  2.	
  
4.	
  Where	
  the	
  Commission	
  finds	
  […]	
  that	
  a	
  third	
  country	
  does	
  not	
  ensure	
  an	
  adequate	
  
       level	
  of	
  protec5on	
  within	
  the	
  meaning	
  of	
  paragraph	
  2	
  of	
  this	
  Ar5cle,	
  Member	
  
       States	
  shall	
  take	
  the	
  measures	
  necessary	
  to	
  prevent	
  any	
  transfer	
  of	
  data	
  of	
  the	
  
       same	
  type	
  to	
  the	
  third	
  country	
  in	
  ques5on.	
  
	
  
U.S.	
  vs	
  EU	
  concept	
  of	
  data	
  
                                 protec5on	
  
                                             	
  
In	
  order	
  to	
  enable	
  personal	
  data	
  transfer	
  from	
  Europe	
  to	
  the	
  U.S.,	
  the	
  Department	
  
          of	
  Commerce	
  (DoC)	
  coordinated	
  the	
  formula5on	
  of	
  Safe	
  Harbor	
  Privacy	
  
                                                        Principles.	
   	
  
	
  
safe	
  harbour	
  agreements
                                          	
  
•  United	
  States	
  entrepreneurs	
  wishing	
  to	
  use	
  personal	
  data	
  
   protected	
  by	
  the	
  EU	
  law	
  must	
  accept	
  the	
  Principles	
  
   (coordinated	
  by	
  the	
  U.S.	
  DoC).	
  	
  
•  They	
  need	
  to	
  repeatedly	
  cer5fy	
  that	
  they	
  meet	
  the	
  aims	
  
   declared	
  in	
  the	
  principles	
  by	
  joining	
  one	
  of	
  the	
  self-­‐regula5ng	
  
   programs,	
  for	
  example,	
  TRUSTe	
  or	
  BBBOnline,	
  verify	
  
   compliance	
  with	
  the	
  Safe	
  Harbor	
  Privacy	
  Principles.	
  	
  
•  The	
  declara5on	
  of	
  each	
  company	
  to	
  adhere	
  to	
  the	
  program	
  
   includes	
  an	
  obliga5on	
  to	
  meet	
  the	
  seven	
  basic	
  aims	
  of	
  the	
  
   Direc5ve	
  (no5ce,	
  choice,	
  onward	
  transfer,	
  security,	
  data	
  
   integrity,	
  access	
  and	
  enforcement).	
  	
  
	
  
safe	
  harbour	
  agreements
                                           	
  
•  Safe	
  Harbor	
  Privacy	
  Principles	
  are	
  not	
  an	
  act	
  of	
  law.	
  Their	
  only	
  
   legal	
  effect	
  is	
  to	
  encourage	
  voluntary	
  corporate	
  compliance	
  
   with	
  the	
  principles	
  verified	
  by	
  authorized	
  organiza5ons.	
  	
  
•  Viola5ons	
  of	
  the	
  Principles	
  are	
  deemed	
  acts	
  of	
  unfair	
  or	
  
   decep5ve	
  trade	
  prac5ce	
  by	
  the	
  Federal	
  Trade	
  Commission	
  
   (FTC).	
  	
  
•  U.S.-­‐based	
  companies,	
  opera5ng	
  in	
  Europe	
  may	
  be	
  subject	
  to	
  
   European	
  states’	
  jurisdic5on	
  if	
  they	
  fail	
  to	
  meet	
  their	
  data	
  
   protec5on	
  obliga5ons	
  based	
  on	
  na5onal	
  personal	
  data	
  
   regula5ons.	
  	
  
safe	
  harbour	
  agreements
                                              	
  
•  The	
  execu5on	
  and	
  enforcement	
  of	
  Safe	
  Harbor	
  Privacy	
  Principles	
  has	
  been	
  
   subject	
  to	
  cri5cism,	
  primarily	
  because	
  of	
  the	
  lack	
  of	
  transparency	
  on	
  the	
  
   introduc5on	
  and	
  verifica5on	
  of	
  privacy	
  policies.	
  	
  
•  The	
  2004	
  EU	
  review	
  of	
  the	
  implementa5on	
  of	
  the	
  Principles	
  included	
  
   repeated	
  concern	
  “about	
  the	
  number	
  of	
  self-­‐cer5fied	
  organiza5ons	
  that	
  
   have	
  not	
  published	
  a	
  privacy	
  policy	
  or	
  that	
  have	
  published	
  a	
  policy	
  that	
  is	
  
   not	
  compliant	
  with	
  the	
  Principles.”	
  	
  
•  The	
  crucial,	
  prac5cal	
  problem	
  originated	
  from	
  the	
  voluntary	
  character	
  of	
  
   the	
  guidelines.	
  Since	
  some	
  companies	
  did	
  not	
  introduce	
  any	
  privacy	
  policy,               	
  
   the	
  FTC	
  had	
  no	
  jurisdic5on	
  to	
  enforce	
  their	
  compliance	
  with	
  the	
  Principles.           	
  
   The	
  Commission	
  also	
  depicted	
  the	
  lack	
  of	
  a	
  proac5ve	
  aptude	
  in	
  
   monitoring	
  organiza5ons’	
  compliance	
  with	
  the	
  Principles.	
  	
  
•  An	
  independent	
  2008	
  review	
  showed	
  a	
  growing	
  number	
  of	
  false	
  claims	
  by	
  
   U.S.	
  organiza5ons	
  on	
  their	
  Safe	
  Harbor	
  compliance	
  and	
  recognized	
  it	
  as	
  a	
  
   new	
  and	
  significant	
  threat	
  to	
  consumers’	
  privacy.	
  	
  
interna5onal	
  privacy	
  protec5on	
  




                           http://www.privacyinternational.org/survey/dpmap.jpg


                                                                                  34
the	
  source	
  of	
  the	
  problem	
  
                                     	
  
shape	
  of	
  law	
  	
  
     	
  
           	
  




                                          36
                             http://www.jimmymack.org
shape	
  of	
  cyberspace	
  
               	
  




                                                         37
                        author: Dmitri Krioukov, source: SDSC/CAIDA
Na5onal	
  privacy	
  standards	
  in	
  cyberspace?	
  




                                                                                      38
                             author: Dmitri Krioukov, source: SDSC/CAIDA http://www.jimmymack.org
extralegal	
  solu5ons?	
  

services	
  and	
  self-­‐regula5on	
  




        J. Kulesza, Transboundary challenges to privacy protection
services	
  




J. Kulesza, Transboundary challenges to privacy protection   40
walled	
  gardens	
  of	
  privacy	
  




                              simondseconoart/ sundaypearls.wordpress.com
J. Kulesza, Transboundary challenges
                                       42
         to privacy protection
summary	
  
•  liPle	
  chance	
  for	
  a	
  binding	
  and	
  executable	
  
   interna5onal	
  treaty	
  on	
  privacy	
  protec5on	
  	
  
•  a	
  good	
  chance	
  of	
  common	
  business	
  prac5ces	
  
   sepng	
  a	
  global	
  standard	
  	
  
•  alterna5ve:	
  na5onally	
  „secured 	
  spaces	
  of	
  
   privacy	
  protec5on	
  according	
  to	
  na5onal	
  laws	
  
   (e.g.	
  china)	
  	
  
Joanna	
  Kulesza   	
  
        University	
  of	
  Lodz
                               	
  
                               	
  
joannakulesza@gmail.com        	
  
                               	
  

Contenu connexe

Tendances

International human rights law
International human rights lawInternational human rights law
International human rights lawFAROUQ
 
Hr guidelines on demolition2
Hr guidelines on demolition2Hr guidelines on demolition2
Hr guidelines on demolition2Milabel Cristobal
 
THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)
THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)
THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)VogelDenise
 
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)EmmanuelGillet
 
Complaint against the UK in re: International Covenant on Civil and Political...
Complaint against the UK in re: International Covenant on Civil and Political...Complaint against the UK in re: International Covenant on Civil and Political...
Complaint against the UK in re: International Covenant on Civil and Political...Lola Heavey
 
Laws & acts relating to the media industry
Laws & acts relating to the media industryLaws & acts relating to the media industry
Laws & acts relating to the media industryAdam Grundy
 
ECHR grand chamber judgment s.a.s v. france ban on wearing in public clothin...
ECHR grand chamber judgment s.a.s v. france  ban on wearing in public clothin...ECHR grand chamber judgment s.a.s v. france  ban on wearing in public clothin...
ECHR grand chamber judgment s.a.s v. france ban on wearing in public clothin...REITER LEGAL
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
 
International humanitarian law (ihl)
International humanitarian law  (ihl)International humanitarian law  (ihl)
International humanitarian law (ihl)bhagya913
 
Ch19 & 20 Am Gov
Ch19 & 20 Am GovCh19 & 20 Am Gov
Ch19 & 20 Am Govgrieffel
 
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsInternational Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsNilendra Kumar
 
Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...NikoYanev
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Informationamypollock1
 
Gender and the ICC
Gender and the ICCGender and the ICC
Gender and the ICCguest7ebcc3
 
International Covenant on Economics, Social & Cultural Rights (ICESCR)
International Covenant on Economics, Social & Cultural Rights (ICESCR)International Covenant on Economics, Social & Cultural Rights (ICESCR)
International Covenant on Economics, Social & Cultural Rights (ICESCR)Bhargav Dangar
 

Tendances (20)

International human rights law
International human rights lawInternational human rights law
International human rights law
 
Hr guidelines on demolition2
Hr guidelines on demolition2Hr guidelines on demolition2
Hr guidelines on demolition2
 
International Humanitarian Law
International Humanitarian LawInternational Humanitarian Law
International Humanitarian Law
 
THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)
THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)
THANK YOU To The Republic of Ecuador (ASYLUM Of Julian Assange)
 
Hr and un
Hr and unHr and un
Hr and un
 
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
Free Speech (Lecture at the Hong Kong Polytechnic University, 2014)
 
Complaint against the UK in re: International Covenant on Civil and Political...
Complaint against the UK in re: International Covenant on Civil and Political...Complaint against the UK in re: International Covenant on Civil and Political...
Complaint against the UK in re: International Covenant on Civil and Political...
 
Laws & acts relating to the media industry
Laws & acts relating to the media industryLaws & acts relating to the media industry
Laws & acts relating to the media industry
 
ECHR grand chamber judgment s.a.s v. france ban on wearing in public clothin...
ECHR grand chamber judgment s.a.s v. france  ban on wearing in public clothin...ECHR grand chamber judgment s.a.s v. france  ban on wearing in public clothin...
ECHR grand chamber judgment s.a.s v. france ban on wearing in public clothin...
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
International humanitarian law (ihl)
International humanitarian law  (ihl)International humanitarian law  (ihl)
International humanitarian law (ihl)
 
Ch19 & 20 Am Gov
Ch19 & 20 Am GovCh19 & 20 Am Gov
Ch19 & 20 Am Gov
 
Iccpr
IccprIccpr
Iccpr
 
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsInternational Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
 
Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...Shall we learn how to protect out personal data? An introduction to personal ...
Shall we learn how to protect out personal data? An introduction to personal ...
 
Sources of International Criminal Law
Sources of International Criminal LawSources of International Criminal Law
Sources of International Criminal Law
 
Freedom of Information
Freedom of InformationFreedom of Information
Freedom of Information
 
Gender and the ICC
Gender and the ICCGender and the ICC
Gender and the ICC
 
International Covenant on Economics, Social & Cultural Rights (ICESCR)
International Covenant on Economics, Social & Cultural Rights (ICESCR)International Covenant on Economics, Social & Cultural Rights (ICESCR)
International Covenant on Economics, Social & Cultural Rights (ICESCR)
 
Autonomy
Autonomy Autonomy
Autonomy
 

En vedette

Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...i_scienceEU
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schooli_scienceEU
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer schooli_scienceEU
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...i_scienceEU
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...i_scienceEU
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...i_scienceEU
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...i_scienceEU
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer Schooli_scienceEU
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...i_scienceEU
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 

En vedette (11)

Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer school
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 

Similaire à Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Protection

Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 
To Be A Foreigner In Austria
To Be A Foreigner In AustriaTo Be A Foreigner In Austria
To Be A Foreigner In Austriaginsep
 
Universal_Declaration_of_Human_Rights (1).pdf
Universal_Declaration_of_Human_Rights (1).pdfUniversal_Declaration_of_Human_Rights (1).pdf
Universal_Declaration_of_Human_Rights (1).pdfGoogle
 
Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resourcelawexchange.co.uk
 
OF HUMAN RIGHTS.ppt
OF HUMAN RIGHTS.pptOF HUMAN RIGHTS.ppt
OF HUMAN RIGHTS.pptVinit Varma
 
HUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPS
HUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPSHUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPS
HUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPSdominadorumaliiii
 
UN Declaration of Human Rights.pptx
UN Declaration of Human Rights.pptxUN Declaration of Human Rights.pptx
UN Declaration of Human Rights.pptxLevenmartlacuna1
 
Strings and the India Report
Strings and the India ReportStrings and the India Report
Strings and the India ReportMarco Castro
 
Universal declaration of human rights
Universal declaration of human rightsUniversal declaration of human rights
Universal declaration of human rightsKarlos Svoboda
 
Freedom in European System
Freedom in European SystemFreedom in European System
Freedom in European SystemFermila Yousaf
 
Right to be forgotten
Right to be forgottenRight to be forgotten
Right to be forgottenOjijo P
 
Das leben der anderen: The lives of others.
Das leben der anderen: The lives of others. Das leben der anderen: The lives of others.
Das leben der anderen: The lives of others. Eccentric Monika
 
Spiritual and-faith-traditions-as-resources-for-peace and Human Rights
Spiritual and-faith-traditions-as-resources-for-peace and Human Rights Spiritual and-faith-traditions-as-resources-for-peace and Human Rights
Spiritual and-faith-traditions-as-resources-for-peace and Human Rights Machine shop ni Don Bosco
 
Inalienability of human rights
Inalienability of human rightsInalienability of human rights
Inalienability of human rightsAlexander Decker
 

Similaire à Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Protection (20)

Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Eu law to print
Eu law to printEu law to print
Eu law to print
 
To Be A Foreigner In Austria
To Be A Foreigner In AustriaTo Be A Foreigner In Austria
To Be A Foreigner In Austria
 
Universal_Declaration_of_Human_Rights (1).pdf
Universal_Declaration_of_Human_Rights (1).pdfUniversal_Declaration_of_Human_Rights (1).pdf
Universal_Declaration_of_Human_Rights (1).pdf
 
Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resource
 
OF HUMAN RIGHTS.ppt
OF HUMAN RIGHTS.pptOF HUMAN RIGHTS.ppt
OF HUMAN RIGHTS.ppt
 
Human rights
Human rightsHuman rights
Human rights
 
HUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPS
HUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPSHUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPS
HUMAN RIGHTS NAVAL SCIENCE RESERVE OFFICER TRAINING CORPS
 
ASSIGNMENT
ASSIGNMENTASSIGNMENT
ASSIGNMENT
 
UN Declaration of Human Rights.pptx
UN Declaration of Human Rights.pptxUN Declaration of Human Rights.pptx
UN Declaration of Human Rights.pptx
 
Strings and the India Report
Strings and the India ReportStrings and the India Report
Strings and the India Report
 
Universal declaration of human rights
Universal declaration of human rightsUniversal declaration of human rights
Universal declaration of human rights
 
12.pptx
12.pptx12.pptx
12.pptx
 
Freedom in European System
Freedom in European SystemFreedom in European System
Freedom in European System
 
The Right to Privacy.docx
The Right to Privacy.docxThe Right to Privacy.docx
The Right to Privacy.docx
 
Right to be forgotten
Right to be forgottenRight to be forgotten
Right to be forgotten
 
UDHR.pptx
UDHR.pptxUDHR.pptx
UDHR.pptx
 
Das leben der anderen: The lives of others.
Das leben der anderen: The lives of others. Das leben der anderen: The lives of others.
Das leben der anderen: The lives of others.
 
Spiritual and-faith-traditions-as-resources-for-peace and Human Rights
Spiritual and-faith-traditions-as-resources-for-peace and Human Rights Spiritual and-faith-traditions-as-resources-for-peace and Human Rights
Spiritual and-faith-traditions-as-resources-for-peace and Human Rights
 
Inalienability of human rights
Inalienability of human rightsInalienability of human rights
Inalienability of human rights
 

Plus de i_scienceEU

Internet science conference
Internet science conferenceInternet science conference
Internet science conferencei_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...i_scienceEU
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...i_scienceEU
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...i_scienceEU
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...i_scienceEU
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...
Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...
Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...i_scienceEU
 
Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...
Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...
Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...i_scienceEU
 
Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...
Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...
Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...i_scienceEU
 
Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...
Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...
Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...i_scienceEU
 
Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...
Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...
Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...i_scienceEU
 
Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...
Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...
Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...i_scienceEU
 
Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...
Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...
Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...i_scienceEU
 
The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)
The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)
The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)i_scienceEU
 
Strategic Relevance of the Internet Science Network of Excellence to Future I...
Strategic Relevance of the Internet Science Network of Excellence to Future I...Strategic Relevance of the Internet Science Network of Excellence to Future I...
Strategic Relevance of the Internet Science Network of Excellence to Future I...i_scienceEU
 

Plus de i_scienceEU (19)

Internet science conference
Internet science conferenceInternet science conference
Internet science conference
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...
Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...
Network of Excellence in Internet Science (JRA8, Internet for Sustainability,...
 
Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...
Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...
Network of Excellence in Internet Science (JRA6, Virtual Communities, C. Mars...
 
Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...
Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...
Network of Excellence in Internet Science (JRA4, Governance, Regulation & Sta...
 
Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...
Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...
Network of Excellence in Internet Science (JRA2, Emerging Theories and Design...
 
Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...
Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...
Network of Excellence in Internet Science (JRA1, Towards a Theory of Internet...
 
Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...
Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...
Network of Excellence in Internet Science (IA2, Joint Courses, Graduate Progr...
 
Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...
Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...
Network of Excellence in Internet Science (IA1, Facilitation of Researcher Mo...
 
The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)
The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)
The vision of Network of Excellence in Internet Science (L. Tassiulas, CERTH)
 
Strategic Relevance of the Internet Science Network of Excellence to Future I...
Strategic Relevance of the Internet Science Network of Excellence to Future I...Strategic Relevance of the Internet Science Network of Excellence to Future I...
Strategic Relevance of the Internet Science Network of Excellence to Future I...
 

Dernier

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Dernier (20)

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Protection

  • 1. Transboundary  challenges     to  privacy  protec5on   Joanna  Kulesza   University  of  Lodz   Faculty  of  Law  and  Administra5on   Department  of  Interna5onal  Law  and  Interna5onal  Rela5ons     Oxford  Internet  Ins5tute,  August  15th,  2012    
  • 2. scope   •  legal  tools  for  privacy  protec5on   •  privacy  as  an  unenforcable  human  right   •  European  approach  to  privacy  protec5on   •  peer-­‐to-­‐peer  privacy  (Web  2.0)   •  safe  harbor  agreements     •  walled  gardens  of  privacy     •  extra-­‐legal  solu5on  to  the  privacy  challenge  
  • 3. Universal  Declara2on  of   Human  Rights  (UDHR)  1948   Ar2cle  12.  No  one  shall  be  subjected   to  arbitrary  interference  with  his   privacy,  family,  home  or   correspondence,  nor  to  aPacks     upon  his  honour  and  reputa5on.   Ar2cle  29.  (2)  In  the  exercise  of   his  rights  and  freedoms,   everyone  shall  be  subject  only   to  such  limita2ons  as  are        •  determined  by  law   •  solely  for  the  purpose  of  securing  due  recogni5on  and  respect   for  the  rights  and  freedoms  of  others  and   •  of  mee5ng  the  just  requirements  of  morality,  public  order   and  the  general  welfare  in  a  democra5c  society.   author: unknown, source: Wikipedia
  • 4. Interna5onal  Covenant  on  Civil  and     Poli5cal  Rights  (ICCPR)   •  draUed:  1954   •  adopted  :  1966   •  entry  into  force:  1976   author: IdiotSavant, source: Wikipedia,
  • 5. Interna2onal   Ar2cle  17     Covenant  on   1.  No  one  shall  be  subjected   Civil  and   to  arbitrary  or  unlawful   Poli2cal  Rights   interference  with  his   privacy,  family,  home  or   correspondence,  nor  to  unlawful   aPacks  on  his  honour  and   reputa5on.     UN  Human  Rights  Commi2ee  (HRC)   CCPR  General  Comment  No.  16:  Ar?cle  17  (Right  to  Privacy)     The  Right  to  Respect  of  Privacy,  Family,  Home  and   Correspondence,  and  Protec?on  of  Honour  and  Reputa?on     8  April  1988  
  • 6. CCPR  General  Comment  No.  16   •  States  are  required  to  adopt  measures  to  ensure  that  the   prohibi5on  against  privacy  interferences  and  aPacks  is   effec5ve     •  A  posi5ve  obliga5on  of  states  to  ac5vly  protect  individual   privacy  against  interference:  „Effec?ve  measures  have  to  be   taken  by  States  to  ensure  that  informa?on  concerning  a   person's  private  life  does  not  reach  the  hands  of  persons  who   are  not  authorized  by  law  to  receive,  process  and  use  it   •  Surveillance,  whether  electronic  or  otherwise,  intercep?ons  of   telephonic,  telegraphic  and  other  forms  of  communica?on,   wire-­‐tapping  and  recording  of  conversa?ons  should  be   prohibited.  
  • 7. CCPR  General  Comment  No.  16   •  Lawfulness:  no  interference  can  take  place  „except  in  cases   envisaged  by  the  law   •  relevant  legisla5on  must  specify  in  detail  the  precise   circumstances  in  which  such  interferences  may  be  permiPed,   while:  „A  decision  to  make  use  of  such  authorized  interference   must  be  made  […]  on  a  case-­‐by-­‐case  basis   •  Arbitrariness:  „even  interference  provided  for  by  law  should   be  in  accordance  with  the  provisions,  aims  and  objec?ves  of   the  Covenant  and  reasonable  in  the  par?cular  circumstances  
  • 8. Why  doesn t  the  ICCPR  regime  work?  
  • 9. World  Court  of  Human  Rights?  
  • 10. World  Court  of  Human  Rights?   The  establishment  of  a  World  Court  of  Human  Rights   could  help  to  bridge  the  gap  between  codified  rights   and  reality.  The  idea  of  such  a  Court  dates  back  to   1947.  Due  to  the  Cold  War,  however,  the  proposal   did  not  find  consensus  among  States.  Thus  the  World   Court  of  Human  Rights  was  never  realised  and   remained  s?gma?sed  as  utopian.     Author: Sylvain Savolainen, source: www.udhr60.ch
  • 12. Privacy  protec5on  in  Europe  (ECHR)   Conven2on  for  the  Protec2on  of  Human  Rights  and  Fundamental  Freedoms   (European  Conven5on  on  Human  Rights,  ECHR),  1953  (draUed  1950)     ECHR  jurisprudence  recognizes  the  right  to  privacy  in  its  Ar5cle  8  as  a   deriva5ve  of  the  right  to  have  one’s  private  and  family  life  respected.   Ar?cle  8   1.  Everyone  has  the  right  to  respect  for  his  private  and  family  life,  his  home   and  his  correspondence.   2.  There  shall  be  no  interference  by  a  public  authority  with  the  exercise  of  this   right  except  such  as  is  in  accordance  with  the  law  and  is  necessary  in  a   democra?c  society  in  the  interests  of  na?onal  security,  public  safety  or  the   economic  well-­‐being  of  the  country,  for  the  preven?on  of  disorder  or   crime,  for  the  protec?on  of  health  or  morals,  or  for  the  protec?on  of  the   rights  and  freedoms  of  others.   à  rich  jurisprudence  
  • 13. Privacy  protec5on  in  Europe  (EU)   Charter  of  Fundamental  Rights  of  the  European  Union  2009  (2000)   Ar?cle  7  Respect  for  private  and  family  life   Everyone  has  the  right  to  respect  for  his  or  her  private  and  family  life,  home   and  communica5ons.   Ar?cle  8  Protec2on  of  personal  data   1.  Everyone  has  the  right  to  the  protec5on  of  personal  data  concerning  him   or  her.   2.  Such  data  must  be  processed  fairly  for  specified  purposes  and  on  the  basis   of  the  consent  of  the  person  concerned  or  some  other  legi5mate  basis  laid   down  by  law.  Everyone  has  the  right  of  access  to  data  which  has  been   collected  concerning  him  or  her,  and  the  right  to  have  it  rec5fied.   3.  Compliance  with  these  rules  shall  be  subject  to  control  by  an  independent   authority.   effec5veness  ques5oned,  esp.  with  the  Bri5sh,  Czech  and  Polish  opt-­‐out  protocol  
  • 15. Privacy  protec5on  in  Europe  (EU)   Direc5ve  95/46/EC  of  the  European  Parliament  and  of  the  Council  of  24   October  1995  on  the  protec5on  of  individuals  with  regard  to  the   processing  of  personal  data  and  on  the  free  movement  of  such  data       Ar5cle  3    Scope   2.  This  Direc5ve  shall  not  apply  to  the  processing  of  personal   data:   -­‐  by  a  natural  person  in  the  course  of  a  purely  personal  or   household  ac2vity.     author/source:  promo5onal-­‐items.in    
  • 16. „a  purely  personal  ac5vity on-­‐line   ü social  networks?   ü private  pages?  weblogs?   criteria?   •  data  availability?   •  network  character?   J. Kulesza, Transboundary challenges to privacy protection
  • 17. peer-­‐to-­‐peer  privacy   Web  2.0  challenge   J. Kulesza, Transboundary challenges to privacy protection
  • 18. J. Kulesza, Transboundary challenges to privacy protection 18
  • 19. J. Kulesza, Transboundary challenges 19 to privacy protection
  • 21. social  seman5c  web   J. Kulesza, Transboundary challenges to privacy protection 21
  • 22. J. Kulesza, Transboundary challenges to privacy protection 22
  • 23. peer-­‐to-­‐peer  privacy   •  new  categories  of  data  (geolocalisa5on)   •  new  tools  enabling  detailed  personal  profiling   for  private  purposes       •  no  anonymity     •  durability  of  data  (right  to  be  forgoPen?)   J. Kulesza, Transboundary challenges to privacy protection 23
  • 24. Privacy  2.0   „Mash  together  these  technologies  (…)  and  it  becomes  trivial  to   receive  answers  to  ques?ons  like:  Where  was  Jonathan   Zi2rain  last  year  on  the  fourteenth  of  February?,  or,  Who   could  be  found  near  the  entrance  to  the  local  Planned   Parenthood  clinic  in  the  past  six  months?  The  answers  need   not  come  from  government  or  corporate  cameras,  which  are   at  least  par?ally  secured  against  abuse  through  well-­‐ considered  privacy  policies  from  Privacy  1.0.  Instead,  the   answers  come  from  a  more  powerful,  genera?ve  source:  an   army  of  the  world’s  photographers,  including  tourists  sharing   their  photos  online  without  firm  (or  legi?mate)  expecta?ons   of  how  they  might  next  be  used  and  reused.   J.  Zi2rain,  „The  Future  of  Internet  and  How  to  Stop  It .  p.  46   J. Kulesza, Transboundary challenges to privacy protection
  • 25. Privacy  as  a  personal  right   na5onal  civil  law  challenge  
  • 26. Privacy  as  a  personal  right   public   sphere  (Sozial-­‐/   Öffentlichkeitssphäre)   privacy   sphere   (Privatsphäre)   in5mate   sphere   (In5msphäre)  
  • 27. Privacy  as  a  personal  right   public  sphere  (Sozial-­‐/   Öffentlichkeitssphäre)   social  sphere  (Sozialsphäre)     privacy  sphere   (Privatsphäre)   in5mate   sphere   (In5msphäre)   secret   sphere   (Sekretsphäre)  
  • 29. U.S.  vs  EU  concept  of  data   protec5on     Ar5cle  25  Direc5ve  95/46/EC     1.  The  Member  States  shall  provide  that  the  transfer  to  a  third  country  of  personal   data  which  are  undergoing  processing  or  are  intended  for  processing  aUer  transfer   may  take  place  only  if  […]  the  third  country  in  ques5on  ensures  an  adequate  level   of  protec2on.   2.  The  adequacy  of  the  level  of  protec5on  afforded  by  a  third  country  shall  be   assessed  in  the  light  of  all  the  circumstances  surrounding  a  data  transfer  opera5on   or  set  of  data  transfer  opera5ons;  […]   3.  The  Member  States  and  the  Commission  shall  inform  each  other  of  cases  where   they  consider  that  a  third  country  does  not  ensure  an  adequate  level  of  protec5on   within  the  meaning  of  paragraph  2.   4.  Where  the  Commission  finds  […]  that  a  third  country  does  not  ensure  an  adequate   level  of  protec5on  within  the  meaning  of  paragraph  2  of  this  Ar5cle,  Member   States  shall  take  the  measures  necessary  to  prevent  any  transfer  of  data  of  the   same  type  to  the  third  country  in  ques5on.    
  • 30. U.S.  vs  EU  concept  of  data   protec5on     In  order  to  enable  personal  data  transfer  from  Europe  to  the  U.S.,  the  Department   of  Commerce  (DoC)  coordinated  the  formula5on  of  Safe  Harbor  Privacy   Principles.      
  • 31. safe  harbour  agreements   •  United  States  entrepreneurs  wishing  to  use  personal  data   protected  by  the  EU  law  must  accept  the  Principles   (coordinated  by  the  U.S.  DoC).     •  They  need  to  repeatedly  cer5fy  that  they  meet  the  aims   declared  in  the  principles  by  joining  one  of  the  self-­‐regula5ng   programs,  for  example,  TRUSTe  or  BBBOnline,  verify   compliance  with  the  Safe  Harbor  Privacy  Principles.     •  The  declara5on  of  each  company  to  adhere  to  the  program   includes  an  obliga5on  to  meet  the  seven  basic  aims  of  the   Direc5ve  (no5ce,  choice,  onward  transfer,  security,  data   integrity,  access  and  enforcement).      
  • 32. safe  harbour  agreements   •  Safe  Harbor  Privacy  Principles  are  not  an  act  of  law.  Their  only   legal  effect  is  to  encourage  voluntary  corporate  compliance   with  the  principles  verified  by  authorized  organiza5ons.     •  Viola5ons  of  the  Principles  are  deemed  acts  of  unfair  or   decep5ve  trade  prac5ce  by  the  Federal  Trade  Commission   (FTC).     •  U.S.-­‐based  companies,  opera5ng  in  Europe  may  be  subject  to   European  states’  jurisdic5on  if  they  fail  to  meet  their  data   protec5on  obliga5ons  based  on  na5onal  personal  data   regula5ons.    
  • 33. safe  harbour  agreements   •  The  execu5on  and  enforcement  of  Safe  Harbor  Privacy  Principles  has  been   subject  to  cri5cism,  primarily  because  of  the  lack  of  transparency  on  the   introduc5on  and  verifica5on  of  privacy  policies.     •  The  2004  EU  review  of  the  implementa5on  of  the  Principles  included   repeated  concern  “about  the  number  of  self-­‐cer5fied  organiza5ons  that   have  not  published  a  privacy  policy  or  that  have  published  a  policy  that  is   not  compliant  with  the  Principles.”     •  The  crucial,  prac5cal  problem  originated  from  the  voluntary  character  of   the  guidelines.  Since  some  companies  did  not  introduce  any  privacy  policy,   the  FTC  had  no  jurisdic5on  to  enforce  their  compliance  with  the  Principles.   The  Commission  also  depicted  the  lack  of  a  proac5ve  aptude  in   monitoring  organiza5ons’  compliance  with  the  Principles.     •  An  independent  2008  review  showed  a  growing  number  of  false  claims  by   U.S.  organiza5ons  on  their  Safe  Harbor  compliance  and  recognized  it  as  a   new  and  significant  threat  to  consumers’  privacy.    
  • 34. interna5onal  privacy  protec5on   http://www.privacyinternational.org/survey/dpmap.jpg 34
  • 35. the  source  of  the  problem    
  • 36. shape  of  law         36 http://www.jimmymack.org
  • 37. shape  of  cyberspace     37 author: Dmitri Krioukov, source: SDSC/CAIDA
  • 38. Na5onal  privacy  standards  in  cyberspace?   38 author: Dmitri Krioukov, source: SDSC/CAIDA http://www.jimmymack.org
  • 39. extralegal  solu5ons?   services  and  self-­‐regula5on   J. Kulesza, Transboundary challenges to privacy protection
  • 40. services   J. Kulesza, Transboundary challenges to privacy protection 40
  • 41. walled  gardens  of  privacy   simondseconoart/ sundaypearls.wordpress.com
  • 42. J. Kulesza, Transboundary challenges 42 to privacy protection
  • 43. summary   •  liPle  chance  for  a  binding  and  executable   interna5onal  treaty  on  privacy  protec5on     •  a  good  chance  of  common  business  prac5ces   sepng  a  global  standard     •  alterna5ve:  na5onally  „secured  spaces  of   privacy  protec5on  according  to  na5onal  laws   (e.g.  china)    
  • 44. Joanna  Kulesza   University  of  Lodz     joannakulesza@gmail.com