SlideShare une entreprise Scribd logo
1  sur  6
IE MDMK09




Borislav Kiprin


                                        Privacy
                  Virtual Companies & Legal Environment
                    Course Leader: Ignacio J. Fernandez




                                                        Plovdiv, Bulgaria
                                                  Phone: +359 879997300
                                E-Mail: bkiprin.mdmk2010@alumno.ie.edu
                                             Web: www.borislavkiprin.com
2                                                                                                       Privacy



Notion
What is privacy?

Privacy is the ability of an individual, group or business entity to reserve the right to disclose information about
himself/herself/themselves and share that information upon their own choice. Sometimes it is difficult to
determine what are the boundaries and this is very subjective notion coming down to personal, cultural,
ethnical etc. In that sense there are common understandings among the majority of people and there are
issues that are considered private only in a particular ethnic or geographical area. In general, when something
is considered private, it comes down to a sensitive issue or a special one that the person/group/entity is not
ready to share with the community or the world. It also depends on how the public opinion will perceive this
private information and there is often a timeframe for relevance and actually interest from the public. In the
case of business entities it might sometimes come down to securing secrets directly related to the normal
performance of the organization and often part of the business itself.

Individual or group privacy is usually part of the legal base in most of the countries in the world – whether under
the form of a privacy laws or even in the constitution. Although we all have a right to some sort of personal
privacy, there are limitations when it comes to national security, taxation, income sources etc. This differs on
country-to-country basis and it has different limitations. For example in the USA the freedom of speech is
described in the First Amendment1 of the constitution, whereas in China or other communist states there are
limitations when people talk about politics, reforms and others. Another example is the fact that there are still
countries in this world that do not reveal bank account information of individuals and this is considered as a
privacy issue.

Privacy types:

   Physical is the immediate proximity of the world we all consider private – such as our house, diary, sexual
    acts and visual materials concerning private moments. For example, in the USA the Fourth Amendment
    guarantees exactly the right of "the right of the people to be secure in their persons, houses, papers, and
    effects, against unreasonable searches and seizures". 2 This however differs to the extreme from the
    legislation in other parts of the world, especially in totalitarian and dictatorship states, where no warrant is
    needed for the arrest of a suspect.

   Informational concerns data that is considered private when it comes, for example, to medical files,
    financial ones, sexual preferences etc. A very interesting issue here is that when one is applying for a job in
    the United States he/she has to be careful enough not to include any private information such as a picture,
    race, religion, sexual preference etc. Whereas in Europe it is considered obligatory to provide most of the
    previously stated personal information. Nonetheless disclosure of this information is considered in the USA as
    a base for voluntary or involuntary discrimination, but in Europe as normal.

   Organizational deals mainly with security issues. Shortly after September 11, 2001’s attacks, the US
    government introduced a much stricter legislation that allowed governmental security agencies to dig into
    the private life of individuals should there be a suspicion of threat for national security. This has raised many
    questions when it comes to an ethnic and religious profiling of the usual suspects – Arabs, Muslims and South
    East Asians.3




1 Source: http://en.wikipedia.org/wiki/First_Amendment_to_the_United_States_Constitution
2 Source: http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution
3 Source: http://www.law.umaryland.edu/Marshall/usccr/documents/cr122004024309.pdf

                                                                                            Borislav Kiprin – IE MDMK09
3                                                                                                    Privacy


Protection of Privacy:

There are many laws around the world that insure the right of protection of privacy. There are even established
courts that deal especially with this issue. In the case of the European Union this will be the European Court of
Human Rights that takes as its prerogative Directive 95/46/EC on the protection of personal data and others
concerning the privacy of European individuals and groups. There are also countries that had established
specific guidelines or governmental bodies that are authorizing any new law that might have privacy
infringement issues - in the United Kingdom by the Data Protection Act 1998 and n France data protection is
also monitored by the CNIL (Commission Nationale de l'Informatique et des Libertés).

On the other hand there are many NGOs that are involved with the follow up of human rights and in particular
with the protection of privacy – such as Internet Privacy Coalition. In fact, these organizations play the role of
creating awareness among the public and put some pressure on the relative legislative power to act properly
upon certain privacy issues and respect them while creating laws that may seem invasive and obstructive.

Evolution of Privacy:

The evolution of privacy has been mainly regarded as a process related to the development of technology.
Such instruments as tapping into phones, looking at personal computer’s content or following other
communication ways (mobile, internet etc.) are well known among the public. But, in fact, it has all started with
the printed media (such as newspapers, magazines and posters). With the spread of such materials, the
misusage of particular content and the breach of privacy was a alarming and the first known publication
concerning privacy was in the USA and represented and article written by Samuel Warren and Louis Brandels –
The right to Privacy, 4 Harvard L.R. 193 (1890).4

Later with the further development of technology, especially the communication channels through mobile
networks and the Internet, more and more concerns were raised with the issue of invasion of privacy. And to
add to this the fact that the world is facing now social threats as drug production and dealing, terrorism, money
laundering from illegal activities, hacking into personal account information in financial, governmental and
medical records, the public is becoming more and more sensitive on how the governments are trying to battle
the issues through legal and more over practical ways. A particular example can be given with the creation of
antiterrorist laws all over the world and in particular in the EU, USA and Russia. These legislations have created
quite a buzz around the world among citizens and personal privacy protectionists. Whether it is because of
miss-communicating the right message when it comes to national and public security and what the law is trying
to achieve, or simply because the government is not really too interested in how the public will accept it, but
the fact is that we all are followed in a certain way and experiencing here and there invasion of our own
privacy.

The reason for this issue to be raised, alarming much and growing at the moment even more is the fact that it
become easier and easier with every leap forward of the technology to gather and analyze information.




4   Source: http://en.wikipedia.org/wiki/Privacy
                                                                                         Borislav Kiprin – IE MDMK09
4                                                                                                          Privacy



Privacy at the Work Place
With the development of technology and the increasing dependence on Internet as a channel of
communication, more and more employer are introducing instrument to monitor employees performance. In
some cases this has a direct impact on the personal privacy of the latter. As explained earlier the line between
personal privacy and the availability of information to the public is very thin. Some of the introduced
instruments and ways to obtain information have resulted into lawsuits, voluntary leave of the companies and
termination of employment contracts. The thing here is, that in most of the cases the employees are even not
aware that their activities are monitors or calls and emails screened.

   Eavesdropping is the act of covertly listening to a private conversation. 5 And this is indeed practiced in the
    nowadays-corporate world to monitor employees’ performance during work time. However, there is a
    morality question involved here. Many people believe that one shall not be expected to have his/her mind
    engaged with work related stuff for the whole duration of the eight hours he/she is paid for.

   Live Video Monitoring is the act of monitoring in live feed the performance of employees at the work place
    or for example traffic control on the street. The question here comes with the fact that people are not
    accustomed to be watched. But I do remember a particular case in Germany in 2007, where a German
    supermarket chain was filming in its shops and recorded many inappropriate acts that were not related to
    the business duties of its employees (i.e. sexual intercourse, stealing articles etc.)

   Whistle blowing - There is also the case of “triggered surveillance” which happens in the event of a lead
    posted by a colleague or a peer to an employer regarding questionable behavior of an employee in
    concern. However, this can be rather volatile and destructive to the organization and the teamwork, should
    that lead be found misleading, inappropriate or irrelevant. The ways that organizations deal with this kind of
    situation differ based on management point of view or established guidelines and standard operating
    procedures. Nonetheless, the chances of having a false lead are always to be considered and evaluated
    properly.

   Communication scanning is covering the security and privacy of mail, telephones, e-mail and other forms
    of communication 6 . In sensitive businesses such as pharmaceuticals, nanotechnologies and arms
    production this is a very common practice, especially concerning key figure employees.

The American Management Association (AMA) conducted a study, named the "2005 Electronic Monitoring &
Surveillance Survey". Of the 526 employers that the AMA surveyed,
most conduct some type of electronic surveillance on employees. 7
                                                                                    76% monitor Website visits
There are also findings that some 92 % of employers deny employee
workplace privacy rights through electronic surveillance of different               55% monitor eMail messages
sort.
                                                                                    50% monitor computer files
Form moral point of view and to the very extend of being legal;
employers are obliged to let employees be aware of the above-
mentioned issues online. These policies can be communicated through the employee’s handbook, memos or
even in the employment contract. It also could be that an employer will inform certain employees working on a
information sensitive project that their private life will be monitored to some extend. However, he must have the
agreement of the later and specifically list the activities that will be performed.


5 Source: http://en.wikipedia.org/wiki/Eavesdropping
6 Source: http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-559474
7 Source: http://jobsearchtech.about.com/od/laborlaws/a/work_privacy.htm

                                                                                               Borislav Kiprin – IE MDMK09
5                                                                                                       Privacy



Privacy Online
In the age of Internet and especially in Web 2.0 and the coming Web 3.0, the public is more and more
concerned with personal privacy. The optimization of the viewed content and especially the input of personal
content and display for sharing has raised more questions. This issue will be reviewed bellow, divided by issues I
have found interesting to discuss and ponder upon:

   Hackers – This is probably the biggest concern to invasion of privacy when it comes to the Internet. Hacking
    is illegally finding ways to penetrate closed networks or databases and stealing, moderating or erasing
    data. We have been witnessing massive attacked on customer databases especially in Credit Card
    companies, Social Security Databases etc. These are rather sensitive events that are hitting hard the soft
    spot in the public’s heart. A particular case that I can recall is the steal of 180,000 people’s personal data
    from Mastercard database in 2005.8

   Spam – is the abuse of electronic messaging systems (including most broadcast media, digital delivery
    systems) to send unsolicited bulk messages indiscriminately.9 Spamming is not usually considered exactly an
    invasion of privacy issue, however we have to think of the lesser and lesser usage of emails these days.
    There studies that point spam as the main reason for people to set particular timings during the day to
    check their emails. They even go so far as to set auto responses stating that if the email sent to them is
    important they should contacted through the phone (but then, phone number is not stated in the
    message). Some would say that spam feeding is exactly invasion of privacy, since it is obtrusive, bothering
    and basically unwanted.

   Gmail Adver-feeding – If you have a Gmail account, you have probably noticed those Google Adwords
    commercials displayed on the very right side of your window. When this service was introduced initially, the
    public and the authorities have raised the question firstly on the searchability and findability of personal
    messages in Google’s search engine. This technological issue was solved pretty fast, but now the issue
    comes with the adfeeding. In order to get relevant adfeeding the personal messages in the mailbox must
    be scanned and analyzed. But the real question here is are these messages stored somewhere and kept by
    Google or even more disturbing are all the users being profiled based on send and received
    communications. This issue is not yet address by any legislative power around the world, for all I know, but I
    believe it will be becoming one as soon as enough awareness among the public’s opinion is raised.

   Social Networks Profiles – This relatively new communication channel gives the ability to share personal
    content and keep in touch with friends and peers. And since this is still regarded as an innovative channel,
    a part of the user base is not really leveraging the opportunities to find themselves in situation of sharing
    more than they are ready to give. We can even talk of social exhibitionism that comes either intentionally or
    unintentionally and inconsiderately, but nonetheless it presents a growing problem. Adjustments of the
    Privacy base on these websites are common and in fact difficult to notice. For example, Facebook has tried
    to change its Privacy statement on few occasions and received a lot of angry statement from users that
    found the changes a threat to their privacy (Beacon10 – for example). It is also interesting to learn that data
    mining is possible in Facebook and in 2005 two MIT students were able to download the profiles of 70,000
    colleagues (MIT, NYU, the University of Oklahoma, and Harvard) through an automated algorithm. 11
    Another threat is the fact that deactivating one’s account with Facebook does not necessarily mean that
    all the published content will disappear with the deletion.


8 Source: http://news.cnet.com/Some-MasterCard-holders-exposed-to-data-theft/2100-7348_3-5670509.html
9 Source: http://en.wikipedia.org/wiki/Spam_(electronic)
10 Source: http://en.wikipedia.org/wiki/Criticism_of_Facebook
11 Source: http://en.wikipedia.org/wiki/Criticism_of_Facebook

                                                                                           Borislav Kiprin – IE MDMK09
6                                                                                                     Privacy

There are many other issues that are addressed, being addressed at the moment or will be addressed soon or
later by the legislative powers and/or Social Networks themselves. However, the Internet and the content
published in this medium will be playing a bigger and bigger role when it comes protection of privacy and
concerns related to this.



Reflections
Giving the constant progress of technology and the establishment of more and more complicated channel of
communications, privacy becomes a major issue when it comes to finding an employment, establishing
employee guidelines and standard operating procedures, labor codex etc. The players in this game are rather
clear – employees, private citizens, governments, corporations & private businesses etc. And all of these have
different points of view and regard their privacy and that of others in a very subjective way. In order for them to
come to the same page, I regard the following factors as very important:

   Consensus on privacy limits – a well established and agreed upon set of rules – what is allowed and what
    not to be monitored and picked in. The important thing here is for all the parties to be involved and actively
    participate in the privacy policy setting.

   Arbitrage ruling – in case of disagreement there should be an established and unbiased way to solve issues
    between two parties where one is accused of invading illegally the privacy of the other. And naturally that
    should a third party that has nothing to do with the conflict discussed.

   Consent – employees and private citizens shall be asked for consent in order to be monitored. However,
    there is always the doubt in the head of an employee that comes to the fact whether he/she has other
    choice than consenting or not. Normally, the upper hand in this situation seems to be with the organization,
    rather than with the individual.

   Communicating the policy – often a misunderstanding or un-acceptance of policies can be triggered
    through wrongful or badly communicated guidelines. Usually, this problem can be solved by pointing out
    the benefits and explaining entirely the situational analysis, causes & effects for all parties involved.

   Strict management based on the policy already set – there is no place for practicing double standards
    here. From an employee point of view it is going to be extremely hard to stay motivated if he/she sees that
    for the same situation different approaches and solutions are reprimanded.

As described above, privacy differs on regional and cultural basis. For that reason it will be very hard to come
up with a common law that serves the world on a global perspective. Nonetheless, with the globalization and
the world turning into a very small place, there seem to be signs that borders and wall are falling apart and
people and cultures grow closer together. How this is going to affect the treatment of invasion of privacy and
actually the privacy in the online medium is yet to be seen.




                                                                                          Borislav Kiprin – IE MDMK09

Contenu connexe

Tendances

Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Now Dentons
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1James Williams
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher educationAnne Arendt
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Social media - employer considerations
Social media - employer considerationsSocial media - employer considerations
Social media - employer considerationsMalcolm York
 
The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-Kenneth Muhangi Esq.
 
Website and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesWebsite and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesPageFreezer
 
About Internet
About InternetAbout Internet
About Internetjanetcc
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 

Tendances (20)

Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
Twitter On The Use of Social Media by Bargaining Unit and Non Union Employees...
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher education
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Social media - employer considerations
Social media - employer considerationsSocial media - employer considerations
Social media - employer considerations
 
The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-The Right to be forgotten by the Internet-
The Right to be forgotten by the Internet-
 
Website and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government AgenciesWebsite and Social Media Archiving: A Growing Necessity for Government Agencies
Website and Social Media Archiving: A Growing Necessity for Government Agencies
 
About Internet
About InternetAbout Internet
About Internet
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
SOPA
SOPASOPA
SOPA
 

Similaire à Privacy in the Virtually Legal Context

Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdfanurag1231
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 

Similaire à Privacy in the Virtually Legal Context (6)

Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 

Plus de Borislav Kiprin

Plus de Borislav Kiprin (7)

Travelling With The User - BWS 2017 Talk
Travelling With The User - BWS 2017 Talk Travelling With The User - BWS 2017 Talk
Travelling With The User - BWS 2017 Talk
 
iPhone Apps
iPhone Apps iPhone Apps
iPhone Apps
 
Vodafone Club 2020
Vodafone Club 2020Vodafone Club 2020
Vodafone Club 2020
 
Advergaming Strategy Proposal
Advergaming Strategy ProposalAdvergaming Strategy Proposal
Advergaming Strategy Proposal
 
SEO RFP
SEO RFPSEO RFP
SEO RFP
 
Emerging Media Trends
Emerging Media TrendsEmerging Media Trends
Emerging Media Trends
 
Obama's Online Campaign
Obama's Online CampaignObama's Online Campaign
Obama's Online Campaign
 

Dernier

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 

Dernier (20)

Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 

Privacy in the Virtually Legal Context

  • 1. IE MDMK09 Borislav Kiprin Privacy Virtual Companies & Legal Environment Course Leader: Ignacio J. Fernandez Plovdiv, Bulgaria Phone: +359 879997300 E-Mail: bkiprin.mdmk2010@alumno.ie.edu Web: www.borislavkiprin.com
  • 2. 2 Privacy Notion What is privacy? Privacy is the ability of an individual, group or business entity to reserve the right to disclose information about himself/herself/themselves and share that information upon their own choice. Sometimes it is difficult to determine what are the boundaries and this is very subjective notion coming down to personal, cultural, ethnical etc. In that sense there are common understandings among the majority of people and there are issues that are considered private only in a particular ethnic or geographical area. In general, when something is considered private, it comes down to a sensitive issue or a special one that the person/group/entity is not ready to share with the community or the world. It also depends on how the public opinion will perceive this private information and there is often a timeframe for relevance and actually interest from the public. In the case of business entities it might sometimes come down to securing secrets directly related to the normal performance of the organization and often part of the business itself. Individual or group privacy is usually part of the legal base in most of the countries in the world – whether under the form of a privacy laws or even in the constitution. Although we all have a right to some sort of personal privacy, there are limitations when it comes to national security, taxation, income sources etc. This differs on country-to-country basis and it has different limitations. For example in the USA the freedom of speech is described in the First Amendment1 of the constitution, whereas in China or other communist states there are limitations when people talk about politics, reforms and others. Another example is the fact that there are still countries in this world that do not reveal bank account information of individuals and this is considered as a privacy issue. Privacy types:  Physical is the immediate proximity of the world we all consider private – such as our house, diary, sexual acts and visual materials concerning private moments. For example, in the USA the Fourth Amendment guarantees exactly the right of "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures". 2 This however differs to the extreme from the legislation in other parts of the world, especially in totalitarian and dictatorship states, where no warrant is needed for the arrest of a suspect.  Informational concerns data that is considered private when it comes, for example, to medical files, financial ones, sexual preferences etc. A very interesting issue here is that when one is applying for a job in the United States he/she has to be careful enough not to include any private information such as a picture, race, religion, sexual preference etc. Whereas in Europe it is considered obligatory to provide most of the previously stated personal information. Nonetheless disclosure of this information is considered in the USA as a base for voluntary or involuntary discrimination, but in Europe as normal.  Organizational deals mainly with security issues. Shortly after September 11, 2001’s attacks, the US government introduced a much stricter legislation that allowed governmental security agencies to dig into the private life of individuals should there be a suspicion of threat for national security. This has raised many questions when it comes to an ethnic and religious profiling of the usual suspects – Arabs, Muslims and South East Asians.3 1 Source: http://en.wikipedia.org/wiki/First_Amendment_to_the_United_States_Constitution 2 Source: http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution 3 Source: http://www.law.umaryland.edu/Marshall/usccr/documents/cr122004024309.pdf Borislav Kiprin – IE MDMK09
  • 3. 3 Privacy Protection of Privacy: There are many laws around the world that insure the right of protection of privacy. There are even established courts that deal especially with this issue. In the case of the European Union this will be the European Court of Human Rights that takes as its prerogative Directive 95/46/EC on the protection of personal data and others concerning the privacy of European individuals and groups. There are also countries that had established specific guidelines or governmental bodies that are authorizing any new law that might have privacy infringement issues - in the United Kingdom by the Data Protection Act 1998 and n France data protection is also monitored by the CNIL (Commission Nationale de l'Informatique et des Libertés). On the other hand there are many NGOs that are involved with the follow up of human rights and in particular with the protection of privacy – such as Internet Privacy Coalition. In fact, these organizations play the role of creating awareness among the public and put some pressure on the relative legislative power to act properly upon certain privacy issues and respect them while creating laws that may seem invasive and obstructive. Evolution of Privacy: The evolution of privacy has been mainly regarded as a process related to the development of technology. Such instruments as tapping into phones, looking at personal computer’s content or following other communication ways (mobile, internet etc.) are well known among the public. But, in fact, it has all started with the printed media (such as newspapers, magazines and posters). With the spread of such materials, the misusage of particular content and the breach of privacy was a alarming and the first known publication concerning privacy was in the USA and represented and article written by Samuel Warren and Louis Brandels – The right to Privacy, 4 Harvard L.R. 193 (1890).4 Later with the further development of technology, especially the communication channels through mobile networks and the Internet, more and more concerns were raised with the issue of invasion of privacy. And to add to this the fact that the world is facing now social threats as drug production and dealing, terrorism, money laundering from illegal activities, hacking into personal account information in financial, governmental and medical records, the public is becoming more and more sensitive on how the governments are trying to battle the issues through legal and more over practical ways. A particular example can be given with the creation of antiterrorist laws all over the world and in particular in the EU, USA and Russia. These legislations have created quite a buzz around the world among citizens and personal privacy protectionists. Whether it is because of miss-communicating the right message when it comes to national and public security and what the law is trying to achieve, or simply because the government is not really too interested in how the public will accept it, but the fact is that we all are followed in a certain way and experiencing here and there invasion of our own privacy. The reason for this issue to be raised, alarming much and growing at the moment even more is the fact that it become easier and easier with every leap forward of the technology to gather and analyze information. 4 Source: http://en.wikipedia.org/wiki/Privacy Borislav Kiprin – IE MDMK09
  • 4. 4 Privacy Privacy at the Work Place With the development of technology and the increasing dependence on Internet as a channel of communication, more and more employer are introducing instrument to monitor employees performance. In some cases this has a direct impact on the personal privacy of the latter. As explained earlier the line between personal privacy and the availability of information to the public is very thin. Some of the introduced instruments and ways to obtain information have resulted into lawsuits, voluntary leave of the companies and termination of employment contracts. The thing here is, that in most of the cases the employees are even not aware that their activities are monitors or calls and emails screened.  Eavesdropping is the act of covertly listening to a private conversation. 5 And this is indeed practiced in the nowadays-corporate world to monitor employees’ performance during work time. However, there is a morality question involved here. Many people believe that one shall not be expected to have his/her mind engaged with work related stuff for the whole duration of the eight hours he/she is paid for.  Live Video Monitoring is the act of monitoring in live feed the performance of employees at the work place or for example traffic control on the street. The question here comes with the fact that people are not accustomed to be watched. But I do remember a particular case in Germany in 2007, where a German supermarket chain was filming in its shops and recorded many inappropriate acts that were not related to the business duties of its employees (i.e. sexual intercourse, stealing articles etc.)  Whistle blowing - There is also the case of “triggered surveillance” which happens in the event of a lead posted by a colleague or a peer to an employer regarding questionable behavior of an employee in concern. However, this can be rather volatile and destructive to the organization and the teamwork, should that lead be found misleading, inappropriate or irrelevant. The ways that organizations deal with this kind of situation differ based on management point of view or established guidelines and standard operating procedures. Nonetheless, the chances of having a false lead are always to be considered and evaluated properly.  Communication scanning is covering the security and privacy of mail, telephones, e-mail and other forms of communication 6 . In sensitive businesses such as pharmaceuticals, nanotechnologies and arms production this is a very common practice, especially concerning key figure employees. The American Management Association (AMA) conducted a study, named the "2005 Electronic Monitoring & Surveillance Survey". Of the 526 employers that the AMA surveyed, most conduct some type of electronic surveillance on employees. 7 76% monitor Website visits There are also findings that some 92 % of employers deny employee workplace privacy rights through electronic surveillance of different 55% monitor eMail messages sort. 50% monitor computer files Form moral point of view and to the very extend of being legal; employers are obliged to let employees be aware of the above- mentioned issues online. These policies can be communicated through the employee’s handbook, memos or even in the employment contract. It also could be that an employer will inform certain employees working on a information sensitive project that their private life will be monitored to some extend. However, he must have the agreement of the later and specifically list the activities that will be performed. 5 Source: http://en.wikipedia.org/wiki/Eavesdropping 6 Source: http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-559474 7 Source: http://jobsearchtech.about.com/od/laborlaws/a/work_privacy.htm Borislav Kiprin – IE MDMK09
  • 5. 5 Privacy Privacy Online In the age of Internet and especially in Web 2.0 and the coming Web 3.0, the public is more and more concerned with personal privacy. The optimization of the viewed content and especially the input of personal content and display for sharing has raised more questions. This issue will be reviewed bellow, divided by issues I have found interesting to discuss and ponder upon:  Hackers – This is probably the biggest concern to invasion of privacy when it comes to the Internet. Hacking is illegally finding ways to penetrate closed networks or databases and stealing, moderating or erasing data. We have been witnessing massive attacked on customer databases especially in Credit Card companies, Social Security Databases etc. These are rather sensitive events that are hitting hard the soft spot in the public’s heart. A particular case that I can recall is the steal of 180,000 people’s personal data from Mastercard database in 2005.8  Spam – is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.9 Spamming is not usually considered exactly an invasion of privacy issue, however we have to think of the lesser and lesser usage of emails these days. There studies that point spam as the main reason for people to set particular timings during the day to check their emails. They even go so far as to set auto responses stating that if the email sent to them is important they should contacted through the phone (but then, phone number is not stated in the message). Some would say that spam feeding is exactly invasion of privacy, since it is obtrusive, bothering and basically unwanted.  Gmail Adver-feeding – If you have a Gmail account, you have probably noticed those Google Adwords commercials displayed on the very right side of your window. When this service was introduced initially, the public and the authorities have raised the question firstly on the searchability and findability of personal messages in Google’s search engine. This technological issue was solved pretty fast, but now the issue comes with the adfeeding. In order to get relevant adfeeding the personal messages in the mailbox must be scanned and analyzed. But the real question here is are these messages stored somewhere and kept by Google or even more disturbing are all the users being profiled based on send and received communications. This issue is not yet address by any legislative power around the world, for all I know, but I believe it will be becoming one as soon as enough awareness among the public’s opinion is raised.  Social Networks Profiles – This relatively new communication channel gives the ability to share personal content and keep in touch with friends and peers. And since this is still regarded as an innovative channel, a part of the user base is not really leveraging the opportunities to find themselves in situation of sharing more than they are ready to give. We can even talk of social exhibitionism that comes either intentionally or unintentionally and inconsiderately, but nonetheless it presents a growing problem. Adjustments of the Privacy base on these websites are common and in fact difficult to notice. For example, Facebook has tried to change its Privacy statement on few occasions and received a lot of angry statement from users that found the changes a threat to their privacy (Beacon10 – for example). It is also interesting to learn that data mining is possible in Facebook and in 2005 two MIT students were able to download the profiles of 70,000 colleagues (MIT, NYU, the University of Oklahoma, and Harvard) through an automated algorithm. 11 Another threat is the fact that deactivating one’s account with Facebook does not necessarily mean that all the published content will disappear with the deletion. 8 Source: http://news.cnet.com/Some-MasterCard-holders-exposed-to-data-theft/2100-7348_3-5670509.html 9 Source: http://en.wikipedia.org/wiki/Spam_(electronic) 10 Source: http://en.wikipedia.org/wiki/Criticism_of_Facebook 11 Source: http://en.wikipedia.org/wiki/Criticism_of_Facebook Borislav Kiprin – IE MDMK09
  • 6. 6 Privacy There are many other issues that are addressed, being addressed at the moment or will be addressed soon or later by the legislative powers and/or Social Networks themselves. However, the Internet and the content published in this medium will be playing a bigger and bigger role when it comes protection of privacy and concerns related to this. Reflections Giving the constant progress of technology and the establishment of more and more complicated channel of communications, privacy becomes a major issue when it comes to finding an employment, establishing employee guidelines and standard operating procedures, labor codex etc. The players in this game are rather clear – employees, private citizens, governments, corporations & private businesses etc. And all of these have different points of view and regard their privacy and that of others in a very subjective way. In order for them to come to the same page, I regard the following factors as very important:  Consensus on privacy limits – a well established and agreed upon set of rules – what is allowed and what not to be monitored and picked in. The important thing here is for all the parties to be involved and actively participate in the privacy policy setting.  Arbitrage ruling – in case of disagreement there should be an established and unbiased way to solve issues between two parties where one is accused of invading illegally the privacy of the other. And naturally that should a third party that has nothing to do with the conflict discussed.  Consent – employees and private citizens shall be asked for consent in order to be monitored. However, there is always the doubt in the head of an employee that comes to the fact whether he/she has other choice than consenting or not. Normally, the upper hand in this situation seems to be with the organization, rather than with the individual.  Communicating the policy – often a misunderstanding or un-acceptance of policies can be triggered through wrongful or badly communicated guidelines. Usually, this problem can be solved by pointing out the benefits and explaining entirely the situational analysis, causes & effects for all parties involved.  Strict management based on the policy already set – there is no place for practicing double standards here. From an employee point of view it is going to be extremely hard to stay motivated if he/she sees that for the same situation different approaches and solutions are reprimanded. As described above, privacy differs on regional and cultural basis. For that reason it will be very hard to come up with a common law that serves the world on a global perspective. Nonetheless, with the globalization and the world turning into a very small place, there seem to be signs that borders and wall are falling apart and people and cultures grow closer together. How this is going to affect the treatment of invasion of privacy and actually the privacy in the online medium is yet to be seen. Borislav Kiprin – IE MDMK09