e. bryan - governance and personal privacy

Upload: emerson-o-st-g-bryan

Post on 30-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    1/19

    eGovernmenteGovernment & Personal& PersonalPr vacyPr vacy

    . . .Information Management Specialist

    2008 March 24

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    2/19

    uest onuest onr ca y scuss e v ew a e governmen

    needs to track and store a citizens personal

    society versus a citizens right to protect his/ here r s o n a l i n f o r m a t i o n .

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    3/19

    Session Outline:Session Outline:

    First Things, First

    Political, social and technological

    Orwellian State?

    Legislative Matters

    10/04/2010

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    4/19

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    5/19

    rst t ngs, rstrst t ngs, rstWhat is Personal Information?

    "Personal information" is information

    identifiable to that individual, such as'

    telephone number.

    Thomas Riley, 2007

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    6/19

    technological dimensionstechnological dimensions

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    7/19

    Political, social and technologicalPolitical, social and technological

    dimensions (1)dimensions (1) Advantages

    Ability to introduce legislations, programmes, and technology if there is buy in by the head of the political directorate.Centralized authority with responsibility for e-monitoring

    Usually one-way flow of information (national security)

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    8/19

    Political, social and technologicalPolitical, social and technological

    dimensions (2)dimensions (2)

    surveillance (political promises):

    Border control s stems e. . Barbados GAIA Common User Terminal Equipment - CUTE)Machine readable passportsMobile police scanners for crime fighting e.g. RBPF, JCF

    rac ng governmen ranspor a on n ama caMagnetic card readers (Jamaican Urban Transit Corporation)TTPF Blimps to monitor criminal activities (Trinidad)

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    9/19

    Political, social and technologicalPolitical, social and technological

    dimensions (3)dimensions (3) Advantages

    People are eager to use the technology- .

    Disadvantages

    Privacy and Access issues (content not being properly

    mana ed/ oor communications etc.

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    10/19

    Political, social and technologicalPolitical, social and technological

    dimensions (4)dimensions (4)

    ECHELON is a name used in global media and in popular culture todescribe a signals intelligencecollection and analysis network operatedon behalf of the five signatory states to the UKUSA agreement;

    Australia, Canada, New Zealand, the United Kingdom and the UnitedStates, known as AUSCANZUKUS CARNIVORE is a system that was used by the FBI to trace the

    .

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    11/19

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    12/19

    Orwellian State?Orwellian State?

    The world has

    When I speak of anrwe an a e mean a

    Police State where the

    government regulates everysin le action of thecitizenry.See: Enemy of the State, Equilibrium,Time Cop, Matrix Trilogy etc. wherethe State la s an im ortant role in the lives of everyday people to ensure a securesociety

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    13/19

    rwe an taterwe an tateAccording to Edwards (2005)According to Edwards (2005)

    databases to form more complete profiles of consumers/citizens.v v r -

    with OFF-line. New data can be extracted fromlarge databases.

    Eg. Tescos Crucible database ( Guardian, Sept 05)Eg Doubleclick/Abacus scandal, 1999

    Eg joined up government projects often linkgovernment t dbs eg to promote child safety, toenable terrorist detection (see failed US TotalInformation Awareness project), to detect illegal

    r u rv rdatabase?)

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    14/19

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    15/19

    eg s at ve atterseg s at ve attersStates argue that they must have ther g o nva e persona pr vacy or efollowing reasons:

    Monitoring narcotic and other nefarious activities;

    Due diligence for financial activities;Pe op a an ot er sex cr mes;

    Terrorism and national security

    Espionage

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    16/19

    ome nota e awsome nota e aws The US Patriot Act ;

    IMs exchange, personal documents etc.IMs exchange, personal documents etc.Personal Information within databases;Personal Information within databases;

    New data storage and processing devices, etc. biometricsNew data storage and processing devices, etc. biometrics

    in passports, drivers licenses, etc.in passports, drivers licenses, etc.- , ,CARICOM states);Freedom of Information Acts (Antigua & Barbuda, Belize, Jamaica,

    Trinidad & Toba o and St. Vincent & the Grenadines Data Protection & Privacy Acts These are usually not present inCaribbean jurisdictions, and instead enjoy coverage under FOI (exemptedareas0

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    17/19

    Some final thoughtsSome final thoughts

    It is good that governments, agencies, and departments are wor ng oge er w common a a n orma on se s;

    E-Commerce can flourish if secured and managed properly;

    (ICC CWC 07, InterPol, Border control). We share personal information already (social networks: hi5,facebook, myspace etc.)

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    18/19

    Any Questions?

  • 8/9/2019 E. Bryan - Governance and Personal Privacy

    19/19

    Works/ Sites Consulted:Works/ Sites Consulted:Anderson, Paige & Jim Dempsey, 2002, Privacy and E-Government: Privacy Impact Assessments and Privacy Commissioners Two Mechanisms for Protecting Privacy to Promote Citizen Trust Online . 11March 2008.

    Branscomb, Wells A. 1994, Who Owns Information? From Privacy to Public Access, Basic Books, Newor

    Commonwealth Centre for E-Governance

    Dempsey, James et al, 2003, Privacy & E-Government < p: www. n erne po cy.ne pr vacy c .p >

    Edwards, Lillian, 2004, Taking the Personal Out of Personal Data: Durant v FSA and its Impact on theLegal Regulation of CCTV (2004) 1:2 SCRIPT-ed.

    Escalante, Richard, 2005, E-government and Information Privacy in Caribbean Developing Societies ,or orum rocee ngs o e n erna ona esearc oun a on or eve opmen , umm .

    March 2008

    Koster, Erica, Zero Privacy: Personal Data on the Internet , The Computer Lawyer, May 1999. 23 March 2008

    rwe , eorge, , , ec er ar urg, on on

    Riley, Thomas, 2005, E-Privacy, Anonymity and Public Spaces: What is this all about? 24 March 2008