Friday, January 28, 2011
Privacy Laws In The Digital Age
Privacy issues are becoming more of a public interest these days. There are heated debates over the issue like it was never before. For more than twenty years, privacy laws have protected citizens. But times have changed, they need to be revised. Recent developments in information technology have enabled people to be more at home with it. Consequently, some companies have discovered how they can make profit out of user information.
The development of user-friendly online environment has attracted users to share information more easily. However, this information can also be used by those who know how to make money out of it. Tracking online behavior has enabled some companies to gain profit, but for the detriment of owners of data.
It ought to be that privacy laws grow as fast as internet technology develops. But this did not happen because privacy laws became stagnant. In today’s sophisticated online technology, these laws would prove to be outdated. Even when companies would want to uphold privacy, they could not do so. This is because there are many provisions that are no longer applicable. Hence, access to these data can be done by someone even without permission from the owner.
Facebook and Twitter are networking sites that rely so much on data sharing. The volume of user information that they hold is their responsibility. As part of privacy agreement, they cannot just divulge any user’s data. But the existing laws could not guarantee this protection. In fact, the government can look into these data very easily. It is here where the need to uphold national security becomes in conflict with protecting individual privacy.
The call to revise privacy laws was done not by one company alone. Even competing companies have joined forces to push for urgent reforms. Government spokespersons have also taken their stand to start such reforms immediately. The year 2011 has started, and so must this change be implemented. It is expected that this would mark the rebirth of privacy laws. This time, these laws are already updated and relevant. Full coverage of individual privacy is expected, while secured sharing of information is also guaranteed.
Image courtesy of: http://www.freedigitalphotos.net/images/Communications_and_N_g263-Digital_Earth_p25978.html
Privacy Laws Are Obsolete? What Then?
In the Internet world, the year 2011 begins with a big bang! There is a heated debate over the Electronics Communications Privacy Act (ECPA) of 1986 and its provisions. Apparently, there is a need to balance the focus of law implementation on national security and individual privacy. Much has been said by several groups about it, being old and outdated. Critics propose a more updated version of privacy laws which would guarantee individual privacy. Twitter, together with other companies that collect personal data called for an immediate reform the law. This move was done to give emphasis on the company’s concern for enhanced privacy protection.
Twitter has expressed dismay over government’s action to insist on letting it submit its user data to authorities. This prompted the company to air its call for revision of privacy laws. It said the applicability of existing laws is very limited, giving rise to controversies and conflicts. It added further that the situation in 1986 is much different from what is here today.
On the US government side, some officials also gave the same stand on the issue. They said that reforms need to be made and implemented soon. Fine tuning of pertinent privacy protection legislations should be a priority. It had to be made sure that the revamp is complete and thorough. The details of the proposed changes have not been laid yet. But even so, there is no doubt that appropriate action has to be made immediately. As a whole, all actions should be focused at solving whatever problems are there in order to maintain privacy of individuals.
There is one argument that points to the inadequacy of the present privacy laws. With the present setup, it would be easier to access the email accounts from server database than to access similar files stacked in the cabinet. Concerned companies expect of stricter laws that would put forward the confidentiality of such data.
The issue seems so urgent that AT&T, Microsoft and Google have set aside competition to make way for the revision call. Normally, these giants would always find means to outdo one another, but not at this time. By this, the government should accept the challenge and do whatever it could for good.
The objective is to strike a balance between national security and individual privacy. The government cannot choose between the two. Both are its responsibilities, neither should be set aside. Giving too much weight on national security would deprive citizens their privacy rights. This leads us to the conclusion that unless privacy laws need to be repealed. This is the best way to meet both objectives for the best interest of all.
Image courtesy of: http://www.freedigitalphotos.net/images/agree-terms.php?pid=25259&photogname=jscreationzs&photogid=1152
Friday, January 21, 2011
Too Much Laws Or Too Little Privacy?
One thing that many internet users neglect to give due attention to is personal information that they share online. For whatever reasons, it seems that information sharing has become very ordinary and spontaneous. People do not think of any harmful consequence that could come along with such data sharing. Too much personal information have been voluntarily uploaded that privacy laws have to be enhanced. This is because many companies are eyeing on these data to be used for their own profit.
Social networking is one venue where people could openly give out their personal information. Facebook for example has about 500 million users worldwide. This number of users have at least their basic personal information open to practically anyone else online. All these data are in the possession of the networking company. These same data are what the government trying to protect in line with privacy laws.
As mentioned earlier, many internet users have become very careless in giving out information. With technology on the go, the government wants to put additional control over data selling. Many government officials place their support for the proposed enhancement of privacy rights protection.
On the other hand, Facebook also has taken the challenge to reposition its strategies in the US. It has recognized the stand of the government leaning towards a stricter implementation of privacy laws. Because of this, the company has taken a step ahead of the rest of its counterparts like Twitter, Zynga and LinkedIn.
Lobbying has become the most suitable strategy. Facebook has strategized to hire additional employees who are experts at public policies. Undoubtedly, it is up to looking for some compromise between the government’s initiative and the company’s objectives. To recall, government specifically wants to beef-up legislations to protect online users. These include among others users’ identities, personal info, and online habits. In addition, policies will also be enacted regarding the tracking, collection and sale of any of this shared information.
There is an apparent indication that the government would introduce “do not track” legislation. Senator Richard Blumenthal opts for policies that would require sites to obtain specific permission to track and sell data. The same stand is taken by Rep. Edward Markey, but focuses more on protecting online behavior and data collecting and profiling.
The brighter side of the issue is that both Facebook and government have the same outlook when comes to privacy protection. Facebook founder Mark Zuckerberg agrees that people should be assured of their privacy. Likewise, people have to be convinced that they have full control over the data that they submit. These are the same objectives of the proposed legislation enhancements by the government.
More or less, there is a possibility that new regulatory actions would be implemented soon. This would be good news not only to Facebook but to other companies as well. It is because if ever, these new policies would benefit both the users and companies. On one hand, users could continue to enjoy the benefits of technology. On the other, companies could make use of personal data but still upholding the privacy of millions of their users.
Image courtesy of: http://www.freedigitalphotos.net/images/agree-terms.php?pid=24154&photogname=jscreationzs&photogid=1152
Sunday, January 16, 2011
When Privacy Becomes a Commodity
Patients’ medical records are private documents that should not be accessed without proper authorization. Many hospitals and other similar establishments in the past have taken for granted this side of medical ethics. Privacy rights of patients were intentionally dishonored. Most of the persons behind were hospital employees themselves.
Most records that are likely to invite unauthorized access are those of high-status individuals. Celebrities and politicians top the list because they make “gossip”. However, privacy violation does not distinguish social, political, or economic standing of the victims. The point is, whether the patient is popular or otherwise, his privacy rights are violated.
In response to the need for stricter security of these documents, many hospitals have implemented policies against patients’ privacy violators. Some hospitals call their system as “zero tolerance policy”. This means that any hospital employee caught violating this policy is automatically terminated.
The current January 8 killing incident outside an area mall in Tucson killed six people and wounded 13 others. Some of the victims including U.S. Rep. Gabrielle Gifford were brought at Tucson’s University Medical Center. Three hospital employees were caught improperly accessing some of the patients’ medical records for whatever reasons. With the hospital’s standing zero tolerance policy, all three were terminated, plus a nurse under contractual status.
This event and many others that went unreported are clear evidences of people who breach patient’s privacy. Thanks to modern IT, hospitals have a better way of protecting the security of these records. There is no need anymore of overseeing these documents by hand. This is done routinely using computer software that could prevent and detect such unauthorized access.
Patient Privacy Rights Foundation founder and Chairwoman, Deborah Peel, was not surprised. She said that such breaches should be accepted as they are expected. She further commented that hospitals should ensure ironclad security of patients’ records. Without such structure in place, patients’ sensitive personal health data remain open to unauthorized access. These are good sources of big news, but a clear risk to patients’ privacy – and honor.
Image courtesy of: http://www.freedigitalphotos.net/images/Computers_g62- File_Search_p25663.html
Thursday, January 13, 2011
Privacy Laws Should Also Be Anti-Crime
Britain’s privacy law provisions were recently criticized by a conservative MP. He alleged these are useless and “just waste of money”. This reaction from MP Heather Wheeler of Derbyshire South resulted from Google’s position over a certain photograph. Google Street View apparently refused to show the photo of a suspect’s vehicle plate number.
Allegedly, the photograph taken by Google Street View showed a robbery suspect and his vehicle. The vehicle’s plate number however, was deliberately blurred. The photo could probably give the lead to the key of the crime. This stand, according to the search giant, is in conformity to existing privacy laws.
Google maintained their stand. They would only show the unblurred photograph if the police could produce a court order to that effect. Wheeler then reiterated that Google should “enter into a protocol with British police forces to receive and acquiesce to police requests”.
Wheeler further insisted that Google should identify crime as a situation that should not need a court order. Google however defended its position by virtue of existing privacy laws. It further added that should the government legitimately allow such procedures as suggested by Wheeler, then they would abide by. However, the present condition regarding privacy laws puts Google tied up to its privacy agreement with its users.
A government representative gave a hint of information related to the case at hand. According to him, the Data Protection Act does not disallow companies to provide information connected to investigation of a crime. What is needed now is official ruling from the right government agency. In its entirety, privacy laws are broad, but there should be definite provisions applicable in special cases.
Allegedly, the photograph taken by Google Street View showed a robbery suspect and his vehicle. The vehicle’s plate number however, was deliberately blurred. The photo could probably give the lead to the key of the crime. This stand, according to the search giant, is in conformity to existing privacy laws.
Google maintained their stand. They would only show the unblurred photograph if the police could produce a court order to that effect. Wheeler then reiterated that Google should “enter into a protocol with British police forces to receive and acquiesce to police requests”.
Wheeler further insisted that Google should identify crime as a situation that should not need a court order. Google however defended its position by virtue of existing privacy laws. It further added that should the government legitimately allow such procedures as suggested by Wheeler, then they would abide by. However, the present condition regarding privacy laws puts Google tied up to its privacy agreement with its users.
A government representative gave a hint of information related to the case at hand. According to him, the Data Protection Act does not disallow companies to provide information connected to investigation of a crime. What is needed now is official ruling from the right government agency. In its entirety, privacy laws are broad, but there should be definite provisions applicable in special cases.
Sunday, January 9, 2011
Is It Time to Reveal the Identity of Sperm Donors?
In Canada, there are about 16,000 citizens who were conceived from donated sperm. In many areas of the country, the personality of sperm donors remained anonymous as provided by law. In British Columbia, sperm donor records are destroyed after six years by either shredding or incinerating. Evidently, their children can no longer have access to these records when they attain legal age.
For many years, children of these unknown fathers did not ask about their fathers’ whole story. Some children do not know that they are products of sperm donation. There are those who know this fact but do not want to know more. The remaining others know this fact but do not know what to do to discover more.
Olivia Pratten wants to be one of the few who want to search for more. She is willing to get what it takes to know more about her father. Pratten has very limited details about her biological father. She was born in 1981 after her mother visited a fertility expert in Vancouver. Her mother only told her that he is Caucasian, with a solid build, brown hair, blue eyes and type “A” blood.
Pratten is now 28 years old working as journalist in Toronto. She is determined to continue the fight in order to know her father. She is now hoping that the British Columbia Supreme Court will give in to what she pleaded. Never before has this court settled to disclose the identity of sperm donors. If this is granted favorably, this will be the first of its sort in North America.
North America has upheld its ruling of maintaining secrecy rights of donors. Sweden, the U.K. and some other European countries, however, have laws that force donors not to remain unknown.
With Pratten’s case now in the B.C. Supreme Court, she is in anticipation of the court’s decision. She asked for the court to include children conceived via egg and sperm donation in a new Adoption law. She also wanted a new law that would oblige physicians to maintain donor records for an indefinite period. If this is approved, children of donors could ask for these records once they become adults.
The matter at hand is not much about Pratten wanting to know about the donor’s identity. Rather, it is whether the secret identity of past sperm donors should be exposed.
According to a critic, granting an affirmative judgment by the court would mean two things to future donors. First, donors would need enhanced monetary incentives. Second, they would think of themselves as serving other individuals build families by donating sperm. Either way, the current concern about sperm donors' identity remains the same: should their anonymity be kept intact?
For many years, children of these unknown fathers did not ask about their fathers’ whole story. Some children do not know that they are products of sperm donation. There are those who know this fact but do not want to know more. The remaining others know this fact but do not know what to do to discover more.
Olivia Pratten wants to be one of the few who want to search for more. She is willing to get what it takes to know more about her father. Pratten has very limited details about her biological father. She was born in 1981 after her mother visited a fertility expert in Vancouver. Her mother only told her that he is Caucasian, with a solid build, brown hair, blue eyes and type “A” blood.
Pratten is now 28 years old working as journalist in Toronto. She is determined to continue the fight in order to know her father. She is now hoping that the British Columbia Supreme Court will give in to what she pleaded. Never before has this court settled to disclose the identity of sperm donors. If this is granted favorably, this will be the first of its sort in North America.
North America has upheld its ruling of maintaining secrecy rights of donors. Sweden, the U.K. and some other European countries, however, have laws that force donors not to remain unknown.
With Pratten’s case now in the B.C. Supreme Court, she is in anticipation of the court’s decision. She asked for the court to include children conceived via egg and sperm donation in a new Adoption law. She also wanted a new law that would oblige physicians to maintain donor records for an indefinite period. If this is approved, children of donors could ask for these records once they become adults.
The matter at hand is not much about Pratten wanting to know about the donor’s identity. Rather, it is whether the secret identity of past sperm donors should be exposed.
According to a critic, granting an affirmative judgment by the court would mean two things to future donors. First, donors would need enhanced monetary incentives. Second, they would think of themselves as serving other individuals build families by donating sperm. Either way, the current concern about sperm donors' identity remains the same: should their anonymity be kept intact?
Friday, January 7, 2011
Privacy Laws In Action
For many times, criticisms were hurled at government’s alleged inaction to protect internet privacy. This time, Facebook cites privacy law so as not to disclose a subscriber’s posts, thus protecting his privacy.
The name Killa Mobb is unheard of, but attained instant popularity just very recently. Way back in Halloween of 2008, Mobb together with co-members of a street gang, attacked a San Francisco man This happened at a gas station near Arden Fair mall. Mobb and six other gang members were convicted on June 25 of last year.
A new-trial motion was filed by Mobb’s lawyer Mike Wise. The defendants this time were Mobb and four other members. It was during this time that Facebook got involved.
Juror Arturo Ramirez has a Facebook account. It is here where he posted his thoughts about the just concluded Mobb trial. The giant social networking company refused to turn over the postings to the defense lawyers’ team that included Wise. Purposely, Wise and company were trying to find out if Ramirez was fair in his decision.
Despite two subpoenas issued by Wise, Facebook lawyers did not lift a finger to produce Ramirez’s postings. Wise even went to the extent of attaching to each subpoena orders signed by Judge Michael P. Kenney of the Sacramento Superior Court.
Due to inaction, Kenney ordered the company to show cause in order not to be charged for contempt of court. In response, Facebook lawyers acted with a motion to quash. However, it still asserted that it cannot turn over the postings to anybody. Under the Stored Communication Act, only a governmental entity with a search warrant or a court order could be given such documents.
On Ramirez’s side, he said his postings included nothing that would affect the merits of the case. Finally he expressed his willingness to turn over the said postings.
On one hand, this is an example of how privacy laws can protect the privacy of a person. In this case it is Juror Ramirez. On the other, Wise sees the law as interference to Mobb’s constitutional rights. He insisted that those postings might contain some evidence that would help his client’s case. Whether favorable to a person or otherwise, privacy laws are critical to his freedom.
The name Killa Mobb is unheard of, but attained instant popularity just very recently. Way back in Halloween of 2008, Mobb together with co-members of a street gang, attacked a San Francisco man This happened at a gas station near Arden Fair mall. Mobb and six other gang members were convicted on June 25 of last year.
A new-trial motion was filed by Mobb’s lawyer Mike Wise. The defendants this time were Mobb and four other members. It was during this time that Facebook got involved.
Juror Arturo Ramirez has a Facebook account. It is here where he posted his thoughts about the just concluded Mobb trial. The giant social networking company refused to turn over the postings to the defense lawyers’ team that included Wise. Purposely, Wise and company were trying to find out if Ramirez was fair in his decision.
Despite two subpoenas issued by Wise, Facebook lawyers did not lift a finger to produce Ramirez’s postings. Wise even went to the extent of attaching to each subpoena orders signed by Judge Michael P. Kenney of the Sacramento Superior Court.
Due to inaction, Kenney ordered the company to show cause in order not to be charged for contempt of court. In response, Facebook lawyers acted with a motion to quash. However, it still asserted that it cannot turn over the postings to anybody. Under the Stored Communication Act, only a governmental entity with a search warrant or a court order could be given such documents.
On Ramirez’s side, he said his postings included nothing that would affect the merits of the case. Finally he expressed his willingness to turn over the said postings.
On one hand, this is an example of how privacy laws can protect the privacy of a person. In this case it is Juror Ramirez. On the other, Wise sees the law as interference to Mobb’s constitutional rights. He insisted that those postings might contain some evidence that would help his client’s case. Whether favorable to a person or otherwise, privacy laws are critical to his freedom.
Thursday, January 6, 2011
Warrantless Domestic Wiretapping Violates Privacy
Warrantless domestic wiretapping in the U.S. was publicly revealed in 2005. Needless to say, millions of Americans suspected that their private communications through phones and e-mails were illegally monitored. This resulted into filing of lawsuits against telecommunications companies by about forty groups and individuals.
In 2008, amendments to the Foreign Intelligence Surveillance (FISA) Act of 1978 were passed. In principle, it attempted to give balance between two important considerations. These were privacy rights and the government’s effort to protect citizens against terrorism.
Still haunted by the 9/11 experience, government needed to strengthen its laws and foil any plans of another attack. There was pressure on the government to shield the whole country by all means and in any way possible.
Privacy issues got into the picture because of at least two effects of these amendments:
First, it granted immunity to telecommunications companies against lawsuits. According to critics, this would further aggravate abuses of power and illegal activities against privacy. Actually, even before the September 11 attack, they contended that such activities had been going on.
Second, it allowed government to conduct warrantless surveillance. Again, criticisms were directed to further violations of privacy.
For up to one week or 160 hours, any suspected individual could be put under surveillance. This was an increase from the former 48 hours only. The only provision required was that FISA should be notified at the time the surveillance begins.
On a much larger scale, it appeared that government was given more leeway to conduct mass untargeted surveillance. Anyone could be wiretapped just with the simple reason of not losing important intelligence. Imagine how the privacy of millions of Americans would be invaded. Overseas communications by Americans would not be adequately protected. Even without court approval, government could tap foreigner’s calls. It is clear that the likelihood of invading private conversations is possible.
As more and more laws and protocols are passed to thwart terrorism plans, privacy is even more compromised. Mere allegation of intent even without the presence of fact could put one under surveillance. Come to think of better ways of fighting terrorism without so much violation of privacy.
In 2008, amendments to the Foreign Intelligence Surveillance (FISA) Act of 1978 were passed. In principle, it attempted to give balance between two important considerations. These were privacy rights and the government’s effort to protect citizens against terrorism.
Still haunted by the 9/11 experience, government needed to strengthen its laws and foil any plans of another attack. There was pressure on the government to shield the whole country by all means and in any way possible.
Privacy issues got into the picture because of at least two effects of these amendments:
First, it granted immunity to telecommunications companies against lawsuits. According to critics, this would further aggravate abuses of power and illegal activities against privacy. Actually, even before the September 11 attack, they contended that such activities had been going on.
Second, it allowed government to conduct warrantless surveillance. Again, criticisms were directed to further violations of privacy.
For up to one week or 160 hours, any suspected individual could be put under surveillance. This was an increase from the former 48 hours only. The only provision required was that FISA should be notified at the time the surveillance begins.
On a much larger scale, it appeared that government was given more leeway to conduct mass untargeted surveillance. Anyone could be wiretapped just with the simple reason of not losing important intelligence. Imagine how the privacy of millions of Americans would be invaded. Overseas communications by Americans would not be adequately protected. Even without court approval, government could tap foreigner’s calls. It is clear that the likelihood of invading private conversations is possible.
As more and more laws and protocols are passed to thwart terrorism plans, privacy is even more compromised. Mere allegation of intent even without the presence of fact could put one under surveillance. Come to think of better ways of fighting terrorism without so much violation of privacy.
Subscribe to:
Posts (Atom)