首页 > 最新文献

Information Privacy Law eJournal最新文献

英文 中文
Surviving and Thriving in the Digital Economy 在数字经济中生存和发展
Pub Date : 2018-03-15 DOI: 10.11575/sppp.v11i0.43356
Goran Pešić
Cyber-crime is growing exponentially and Canadian governments at all levels have not kept pace quickly enough to protect both themselves and private enterprise. Evolving technology allows for ever-more sophisticated cyber-threats to intellectual property, but some businesses and governments have neither changed their pre-internet thinking nor established adequate safeguards. Protection should start with educational campaigns about the scope and varieties of risk that permeate the private sector, e-commerce and smart cities using the internet of things. Thirty years ago, just 32 per cent of the market value of Standard & Poor’s 500 companies was based on intangible assets, mainly intellectual property. Today, that figure stands at 80 per cent and protecting those assets from cyber-crime is of vital importance. While cyber-criminals look to make money off of phishing scams, their interests have also extended to infiltrating proprietary industrial designs, resource management and information affecting acquisitions. The fact that some countries see this type of crime as a normal way to gain access to foreign business information is often poorly understood by Canadian businesses accustomed to functioning under much higher ethical standards. The e-commerce realm faces its own cyber-threats including those affecting privacy, data sovereignty, location of data centres, data security and legislation. E-commerce merchants must protect themselves by ensuring the security of their clients’ computers, communication channels, web servers and data encryption. It sounds daunting, but it shouldn’t be. Merchants can take steps such as doing risk assessments, developing security policies, establishing a single point of security oversight, instituting authentication processes using biometrics, auditing security and maintaining an emergency reporting system. Government can assist with cyber-security in Canada’s private sector through awareness campaigns, rewarding businesses for best practices, providing tax credits to offset the cost of security measures, and offering preferential lending and insurance deals from government institutions. The federal government’s 2015 Digital Privacy Act was a good first step, but there is much territory left to be covered. The act offers little assistance in making the leap from a pre-internet governmental model of doing business with the private sector. Nor does it acknowledge the full costs organizations must face when contemplating improving their cyber-security.  The growth of smart cities, connected to the internet of things, creates new susceptibilities to cyber-crime. By 2021, there will be approximately 28 billion internet-connected devices globally and 16 billion of those will be related to the internet of things. However, smart cities appear to be low on the list of cyber-security priorities at all levels of government. There is a lack of local guidance and commitment, an absence of funding programs and tax incentives for
网络犯罪呈指数级增长,而加拿大各级政府在保护自己和私人企业方面都跟不上步伐。不断发展的技术允许对知识产权进行越来越复杂的网络威胁,但一些企业和政府既没有改变他们在互联网之前的想法,也没有建立足够的保护措施。保护措施应该从教育活动开始,让人们了解渗透到私营部门、电子商务和使用物联网的智慧城市的风险的范围和种类。30年前,标准普尔500指数(Standard & Poor 's 500)成分股市值中,无形资产(主要是知识产权)仅占32%。如今,这一数字已达到80%,保护这些资产免受网络犯罪侵害至关重要。虽然网络犯罪分子希望通过网络钓鱼诈骗赚钱,但他们的兴趣还扩展到渗透专有工业设计、资源管理和影响收购的信息。一些国家将这类犯罪视为获取外国商业信息的正常方式,而习惯于在更高道德标准下运作的加拿大企业往往对这一事实知之甚少。电子商务领域也面临着自身的网络威胁,包括影响隐私、数据主权、数据中心位置、数据安全和立法的威胁。电子商务商家必须通过确保客户电脑、通信渠道、网络服务器和数据加密的安全来保护自己。这听起来令人生畏,但它不应该。商家可以采取风险评估、制定安全政策、建立单点安全监督、使用生物识别技术建立身份验证流程、审计安全以及维护紧急报告系统等措施。政府可以通过宣传活动,奖励最佳实践的企业,提供税收抵免以抵消安全措施的成本,并提供政府机构的优惠贷款和保险交易,来协助加拿大私营部门的网络安全。联邦政府2015年的《数字隐私法案》(Digital Privacy Act)是良好的第一步,但仍有许多领域有待完善。在从互联网出现之前的政府与私营部门做生意的模式中实现飞跃方面,该法案几乎没有提供什么帮助。它也没有承认组织在考虑提高网络安全时必须面对的全部成本。与物联网相连的智能城市的发展,为网络犯罪创造了新的脆弱性。到2021年,全球将有大约280亿台联网设备,其中160亿台将与物联网有关。然而,智慧城市似乎在各级政府的网络安全优先事项列表中排名较低。缺乏地方指导和承诺,缺乏风险分担安排的资金计划和税收激励,也没有联邦政府发起的智慧城市战略。领先于网络罪犯的关键是重新调整我们对伴随技术而来的威胁的理解。新的想法、新的经济政策、新的保障措施、新的法规和新的经营方式都将有助于加拿大在蓬勃发展的知识经济中保持安全。
{"title":"Surviving and Thriving in the Digital Economy","authors":"Goran Pešić","doi":"10.11575/sppp.v11i0.43356","DOIUrl":"https://doi.org/10.11575/sppp.v11i0.43356","url":null,"abstract":"Cyber-crime is growing exponentially and Canadian governments at all levels have not kept pace quickly enough to protect both themselves and private enterprise. Evolving technology allows for ever-more sophisticated cyber-threats to intellectual property, but some businesses and governments have neither changed their pre-internet thinking nor established adequate safeguards. Protection should start with educational campaigns about the scope and varieties of risk that permeate the private sector, e-commerce and smart cities using the internet of things. Thirty years ago, just 32 per cent of the market value of Standard & Poor’s 500 companies was based on intangible assets, mainly intellectual property. Today, that figure stands at 80 per cent and protecting those assets from cyber-crime is of vital importance. While cyber-criminals look to make money off of phishing scams, their interests have also extended to infiltrating proprietary industrial designs, resource management and information affecting acquisitions. The fact that some countries see this type of crime as a normal way to gain access to foreign business information is often poorly understood by Canadian businesses accustomed to functioning under much higher ethical standards. The e-commerce realm faces its own cyber-threats including those affecting privacy, data sovereignty, location of data centres, data security and legislation. E-commerce merchants must protect themselves by ensuring the security of their clients’ computers, communication channels, web servers and data encryption. It sounds daunting, but it shouldn’t be. Merchants can take steps such as doing risk assessments, developing security policies, establishing a single point of security oversight, instituting authentication processes using biometrics, auditing security and maintaining an emergency reporting system. Government can assist with cyber-security in Canada’s private sector through awareness campaigns, rewarding businesses for best practices, providing tax credits to offset the cost of security measures, and offering preferential lending and insurance deals from government institutions. The federal government’s 2015 Digital Privacy Act was a good first step, but there is much territory left to be covered. The act offers little assistance in making the leap from a pre-internet governmental model of doing business with the private sector. Nor does it acknowledge the full costs organizations must face when contemplating improving their cyber-security.  The growth of smart cities, connected to the internet of things, creates new susceptibilities to cyber-crime. By 2021, there will be approximately 28 billion internet-connected devices globally and 16 billion of those will be related to the internet of things. However, smart cities appear to be low on the list of cyber-security priorities at all levels of government. There is a lack of local guidance and commitment, an absence of funding programs and tax incentives for ","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121892966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Regulating the IoT: Discrimination, Privacy, and Cybersecurity in the Artificial Intelligence Age 监管物联网:人工智能时代的歧视、隐私和网络安全
Pub Date : 2018-02-24 DOI: 10.2139/ssrn.3129557
Charlotte Tschider
The field of consumer Internet of Things (IoT) has exploded as business and researchers have sought to not only develop Internet-connected products but also define the common structure in which IoT devices will operate, including technological standards and responsive architectures. Yet, consumer IoT continues to present a host of potential risks to consumers, cascading from the multidimensional nature of IoT devices: IoT combines well-known consumer products with cutting-edge infrastructures including big data solutions, distributed data storage or “cloud,” and artificial intelligence (AI) utilities. The consumer device is no longer only the product, it is the product, the data, the algorithms, and the infrastructure. Consumer products have shifted from analog to connected technologies, introducing new risks for consumers related to personal privacy, safety issues, and potential for discriminatory data. Broad, ubiquitous data collection, internet connectivity, predictive algorithms, and overall device functionality opacity threaten to undermine IoT market benefits by causing potential consumer injury: broad unfairness and disparate impact, data breaches, physical safety issues, and property damage. Existing regulatory regimes have not anticipated these damages to effectively avoid injury, and it is yet unknown how existing products liability, common law civil recovery under contracts or torts schemes, and due process procedures will apply to these products and the data they process. This Article explores the technology and market of IoT, potential consumer impacts resulting from a lack of consistent and complete legal framework, whether IoT regulation is appropriate, and how the United States can balance market needs for innovation with consistent oversight for IoT manufacturers and distributors.
随着企业和研究人员不仅寻求开发与互联网连接的产品,而且还试图定义物联网设备运行的通用结构,包括技术标准和响应架构,消费者物联网(IoT)领域出现了爆炸式增长。然而,消费者物联网继续给消费者带来一系列潜在风险,这些风险来自物联网设备的多维特性:物联网将知名的消费产品与尖端基础设施相结合,包括大数据解决方案、分布式数据存储或“云”,以及人工智能(AI)实用程序。消费设备不再仅仅是产品,它是产品、数据、算法和基础设施。消费产品已经从模拟技术转向连接技术,这给消费者带来了与个人隐私、安全问题和歧视性数据的可能性相关的新风险。广泛的、无处不在的数据收集、互联网连接、预测算法和整体设备功能的不透明性,可能会损害物联网市场的利益,造成潜在的消费者伤害:广泛的不公平和差异影响、数据泄露、物理安全问题和财产损失。现有的监管制度没有预料到这些损害能够有效地避免伤害,目前尚不清楚现有的产品责任、普通法合同或侵权计划下的民事赔偿以及正当程序程序将如何适用于这些产品及其处理的数据。本文探讨了物联网的技术和市场,缺乏一致和完整的法律框架对消费者的潜在影响,物联网监管是否合适,以及美国如何平衡市场对创新的需求与对物联网制造商和分销商的一致监管。
{"title":"Regulating the IoT: Discrimination, Privacy, and Cybersecurity in the Artificial Intelligence Age","authors":"Charlotte Tschider","doi":"10.2139/ssrn.3129557","DOIUrl":"https://doi.org/10.2139/ssrn.3129557","url":null,"abstract":"The field of consumer Internet of Things (IoT) has exploded as business and researchers have sought to not only develop Internet-connected products but also define the common structure in which IoT devices will operate, including technological standards and responsive architectures. Yet, consumer IoT continues to present a host of potential risks to consumers, cascading from the multidimensional nature of IoT devices: IoT combines well-known consumer products with cutting-edge infrastructures including big data solutions, distributed data storage or “cloud,” and artificial intelligence (AI) utilities. The consumer device is no longer only the product, it is the product, the data, the algorithms, and the infrastructure. Consumer products have shifted from analog to connected technologies, introducing new risks for consumers related to personal privacy, safety issues, and potential for discriminatory data. Broad, ubiquitous data collection, internet connectivity, predictive algorithms, and overall device functionality opacity threaten to undermine IoT market benefits by causing potential consumer injury: broad unfairness and disparate impact, data breaches, physical safety issues, and property damage. Existing regulatory regimes have not anticipated these damages to effectively avoid injury, and it is yet unknown how existing products liability, common law civil recovery under contracts or torts schemes, and due process procedures will apply to these products and the data they process. This Article explores the technology and market of IoT, potential consumer impacts resulting from a lack of consistent and complete legal framework, whether IoT regulation is appropriate, and how the United States can balance market needs for innovation with consistent oversight for IoT manufacturers and distributors.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"6 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120916920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Why Are Norms Ignored? Collective Action and the Privacy Commons 为什么规范被忽视?集体行动和隐私共享
Pub Date : 2018-02-18 DOI: 10.2139/SSRN.3125832
R. Sloan, Richard Warner
Informational privacy is the ability to govern when others may collect your information and how they may use it. Norms can, and do, provide such governance, as Helen Nissenbaum’s seminal work shows. The relevant norms are informational norms, social norms that govern the collection, use, and distribution of information. With noteworthy exceptions (Woodrow Hartzog and Neil Richards, for example), contemporary discussions of privacy rarely mention informational norms, or at best assign them a peripheral role. We claim they should play a central role. Our argument is that ensuring adequate informational privacy is (at least in part) a collective action problem. Norms can, and often do, solve collective action problems. Further, informational norms currently do solve a wide range of important collective action problems centered around privacy. Shouldn’t informational norms take center stage in proposals about informational privacy? We argue they should by answering three objections to giving them that role. (1) Lack of norms: Rapid advances in technology have created a wide variety of situations for which are not governed by relevant norms. (2) Disagreement about norms: Even if relevant norms exist, lack of agreement about their content makes them a poor foundation on which to build public policy. (3) Lack of an adequate theory: Even if norms exist and their content is uncontroversial, norms are a poor tool for public policy because there is no adequate theory that allows one to make accurate predictions about the causes and effects of norms. The first two objections have relatively easy answers. The third is fundamental. We outline a theory that treats norm-created informational privacy as a commons—a special kind of commons, a common pool resource. We thereby link norm-created privacy to a rich body of empirical and theoretical work. We hope the resulting theory of norm-created governance of information flows contributes to the understanding of privacy that Neil Richards and Jonathan King call for in Big Data Ethics: “privacy in the age of big data should be . . . understood as the need to expand the rules we use to govern the flows of personal information.”
信息隐私是指管理他人何时可以收集您的信息以及如何使用这些信息的能力。正如海伦·尼森鲍姆(Helen Nissenbaum)的开创性著作所显示的那样,规范能够、也确实提供了这样的治理。相关规范是信息规范,即管理信息收集、使用和分发的社会规范。除了值得注意的例外(例如,伍德罗·哈特佐格和尼尔·理查兹),当代关于隐私的讨论很少提及信息规范,或者至多将其置于次要地位。我们认为他们应该发挥核心作用。我们的论点是,确保足够的信息隐私(至少部分)是一个集体行动问题。规范能够而且经常解决集体行动问题。此外,信息规范目前确实解决了一系列以隐私为中心的重要集体行动问题。在有关信息隐私的提案中,信息规范不应该占据中心位置吗?我们通过回答反对赋予他们这一角色的三个反对意见,认为他们应该这样做。(1)缺乏规范:技术的快速进步造成了各种各样的情况,而这些情况不受相关规范的约束。(2)规范的分歧:即使存在相关规范,但由于对其内容缺乏共识,使其成为构建公共政策的不良基础。(3)缺乏适当的理论:即使规范存在,其内容也没有争议,规范也是公共政策的一个糟糕工具,因为没有适当的理论允许人们对规范的因果做出准确的预测。前两个反对意见的答案相对简单。第三点是最根本的。我们概述了一种理论,它将规范创建的信息隐私视为一种公共资源——一种特殊的公共资源,一种公共资源池。因此,我们将规范创造的隐私与丰富的实证和理论工作联系起来。我们希望由此产生的规范创建的信息流治理理论有助于理解尼尔·理查兹(Neil Richards)和乔纳森·金(Jonathan King)在《大数据伦理学》(Big Data Ethics)中所呼吁的隐私:“大数据时代的隐私应该是……理解为需要扩大我们用来管理个人信息流动的规则。”
{"title":"Why Are Norms Ignored? Collective Action and the Privacy Commons","authors":"R. Sloan, Richard Warner","doi":"10.2139/SSRN.3125832","DOIUrl":"https://doi.org/10.2139/SSRN.3125832","url":null,"abstract":"Informational privacy is the ability to govern when others may collect your information and how they may use it. Norms can, and do, provide such governance, as Helen Nissenbaum’s seminal work shows. The relevant norms are informational norms, social norms that govern the collection, use, and distribution of information. With noteworthy exceptions (Woodrow Hartzog and Neil Richards, for example), contemporary discussions of privacy rarely mention informational norms, or at best assign them a peripheral role. We claim they should play a central role. Our argument is that ensuring adequate informational privacy is (at least in part) a collective action problem. Norms can, and often do, solve collective action problems. Further, informational norms currently do solve a wide range of important collective action problems centered around privacy. Shouldn’t informational norms take center stage in proposals about informational privacy? \u0000We argue they should by answering three objections to giving them that role. (1) Lack of norms: Rapid advances in technology have created a wide variety of situations for which are not governed by relevant norms. (2) Disagreement about norms: Even if relevant norms exist, lack of agreement about their content makes them a poor foundation on which to build public policy. (3) Lack of an adequate theory: Even if norms exist and their content is uncontroversial, norms are a poor tool for public policy because there is no adequate theory that allows one to make accurate predictions about the causes and effects of norms. The first two objections have relatively easy answers. The third is fundamental. We outline a theory that treats norm-created informational privacy as a commons—a special kind of commons, a common pool resource. We thereby link norm-created privacy to a rich body of empirical and theoretical work. We hope the resulting theory of norm-created governance of information flows contributes to the understanding of privacy that Neil Richards and Jonathan King call for in Big Data Ethics: “privacy in the age of big data should be . . . understood as the need to expand the rules we use to govern the flows of personal information.”","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132917473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shattering One-Way Mirrors. Data Subject Access Rights in Practice 打碎单向镜子。实务中的资料主体查阅权
Pub Date : 2018-01-20 DOI: 10.1093/IDPL/IPY001
J. Ausloos, Pierre Dewitte
The right of access occupies a central role in EU data protection law's arsenal of data subject empowerment measures. It can be seen as a necessary enabler for most other data subject rights as well as an important role in monitoring operations and (en)forcing compliance. Despite some high-profile revelations regarding unsavoury data processing practices over the past few years, access rights still appear to be underused and not properly accommodated. It is especially this last hypothesis we tried to investigate and substantiate through a legal empirical study. During the first half of 2017, around sixty information society service providers were contacted with data subject access requests. Eventually, the study confirmed the general suspicion that access rights are by and large not adequately accommodated. The systematic approach did allow for a more granular identification of key issues and broader problematic trends. Notably, it uncovered an often-flagrant lack of awareness; organisation; motivation; and harmonisation. Despite the poor results of the empirical study, we still believe there to be an important role for data subject empowerment tools in a hyper-complex, automated and ubiquitous data-processing ecosystem. Even if only used marginally, they provide a checks and balances infrastructure overseeing controllers' processing operations, both on an individual basis as well as collectively. The empirical findings also allow identifying concrete suggestions aimed at controllers, such as relatively easy fixes in privacy policies and access rights templates.
访问权在欧盟数据保护法的数据主体授权措施中占有核心地位。它可以被视为大多数其他数据主体权利的必要推动因素,以及在监控操作和强制遵守方面的重要作用。尽管在过去几年中有一些令人不快的数据处理行为被高调曝光,但访问权似乎仍然没有得到充分利用,也没有得到适当的照顾。特别是最后一种假设,我们试图通过法律实证研究来调查和证实。在2017年上半年,约有60家信息社会服务提供商就数据主体访问请求进行了联系。最终,这项研究证实了人们普遍的怀疑,即获取权利基本上没有得到充分的照顾。系统的方法确实能够更细致地确定关键问题和更广泛的问题趋势。值得注意的是,它揭示了一种经常公然缺乏意识的情况;组织;动机;和协调。尽管实证研究结果不佳,但我们仍然相信,在一个超复杂、自动化和无处不在的数据处理生态系统中,数据主体赋权工具将发挥重要作用。即使只是少量使用,它们也提供了一个制衡的基础设施,监督控制人员的处理操作,无论是在个人的基础上还是在集体的基础上。实证研究结果还允许确定针对控制者的具体建议,例如在隐私政策和访问权限模板中相对容易的修复。
{"title":"Shattering One-Way Mirrors. Data Subject Access Rights in Practice","authors":"J. Ausloos, Pierre Dewitte","doi":"10.1093/IDPL/IPY001","DOIUrl":"https://doi.org/10.1093/IDPL/IPY001","url":null,"abstract":"The right of access occupies a central role in EU data protection law's arsenal of data subject empowerment measures. It can be seen as a necessary enabler for most other data subject rights as well as an important role in monitoring operations and (en)forcing compliance. Despite some high-profile revelations regarding unsavoury data processing practices over the past few years, access rights still appear to be underused and not properly accommodated. It is especially this last hypothesis we tried to investigate and substantiate through a legal empirical study. During the first half of 2017, around sixty information society service providers were contacted with data subject access requests. Eventually, the study confirmed the general suspicion that access rights are by and large not adequately accommodated. The systematic approach did allow for a more granular identification of key issues and broader problematic trends. Notably, it uncovered an often-flagrant lack of awareness; organisation; motivation; and harmonisation. Despite the poor results of the empirical study, we still believe there to be an important role for data subject empowerment tools in a hyper-complex, automated and ubiquitous data-processing ecosystem. Even if only used marginally, they provide a checks and balances infrastructure overseeing controllers' processing operations, both on an individual basis as well as collectively. The empirical findings also allow identifying concrete suggestions aimed at controllers, such as relatively easy fixes in privacy policies and access rights templates.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Ownership of Personal Data in the Internet of Things 物联网中个人数据的所有权
Pub Date : 2017-12-01 DOI: 10.2139/ssrn.3111047
V. Janeček
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.
本文分析、定义和细化所有权和个人数据的概念,以探索它们在欧盟法律背景下的兼容性。它批判性地审视了个人数据和非个人数据之间的传统分界线,并主张对个人数据和个人信息进行严格的概念分离。本文还考虑了所有权的概念是否以及在多大程度上可以应用于物联网(IoT)背景下的个人数据。这种考虑是围绕塑造所有所有权理论的两种主要方法:自下而上和自上而下的方法。通过这些双重视角,本文回顾了与支持引入个人数据所有权的四个要素有关的现有争论,即个人数据的控制、保护、评估和分配要素。然后探讨了这两种方法在每个元素以及物联网中个人数据所有权方面的解释性优点和缺点。最后,本文概述了物联网中个人数据所有权的修订方法,可以作为该领域未来工作的蓝图,并为监管和政策辩论提供信息。
{"title":"Ownership of Personal Data in the Internet of Things","authors":"V. Janeček","doi":"10.2139/ssrn.3111047","DOIUrl":"https://doi.org/10.2139/ssrn.3111047","url":null,"abstract":"This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Deterring Cybercrime: Focus on Intermediaries 阻止网络犯罪:关注中介机构
Pub Date : 2017-12-01 DOI: 10.15779/Z387M04086
Aniket Kesari, C. Hoofnagle, Damon McCoy
This Article discusses how governments, intellectual property owners, and technology companies use the law to disrupt access to intermediaries used by financially-motivated cybercriminals. Just like licit businesses, illicit firms rely on intermediaries to advertise, sell and deliver products, collect payments, and maintain a reputation. Recognizing these needs, law enforcers use the courts, administrative procedures, and self-regulatory frameworks to execute a deterrence by denial strategy. Enforcers of the law seize the financial rewards and infrastructures necessary for the operation of illicit firms to deter their presence. Policing illicit actors through their intermediaries raises due process and fairness concerns because service-providing companies may not be aware of the criminal activity, and because enforcement actions have consequences for consumers and other, licit firms. Yet, achieving direct deterrence by punishment suffers from jurisdictional and resource constraints, leaving enforcers with few other options for remedy. This Article integrates literature from the computer science and legal fields to explain enforcers' interventions, explore their efficacy, and evaluate the merits and demerits of enforcement efforts focused on the intermediaries used by financially-motivated cybercriminals.
本文讨论了政府、知识产权所有者和技术公司如何利用法律来破坏出于经济动机的网络犯罪分子使用的中介机构。就像合法企业一样,非法企业依靠中介机构来做广告、销售和交付产品、收款和维护声誉。认识到这些需求,执法人员使用法院、行政程序和自我监管框架来执行拒绝战略的威慑。执法人员夺取非法公司运作所必需的财政奖励和基础设施,以阻止它们的存在。通过中间人对非法行为者进行监管引发了正当程序和公平问题,因为提供服务的公司可能不知道犯罪活动,而且执法行动会对消费者和其他合法公司产生影响。然而,通过惩罚实现直接威慑受到管辖权和资源限制,使执法者几乎没有其他补救办法。本文整合了来自计算机科学和法律领域的文献,以解释执法者的干预措施,探讨其有效性,并评估专注于经济动机网络罪犯使用的中介机构的执法工作的优点和缺点。
{"title":"Deterring Cybercrime: Focus on Intermediaries","authors":"Aniket Kesari, C. Hoofnagle, Damon McCoy","doi":"10.15779/Z387M04086","DOIUrl":"https://doi.org/10.15779/Z387M04086","url":null,"abstract":"This Article discusses how governments, intellectual property owners, and technology companies use the law to disrupt access to intermediaries used by financially-motivated cybercriminals. Just like licit businesses, illicit firms rely on intermediaries to advertise, sell and deliver products, collect payments, and maintain a reputation. Recognizing these needs, law enforcers use the courts, administrative procedures, and self-regulatory frameworks to execute a deterrence by denial strategy. Enforcers of the law seize the financial rewards and infrastructures necessary for the operation of illicit firms to deter their presence. \u0000Policing illicit actors through their intermediaries raises due process and fairness concerns because service-providing companies may not be aware of the criminal activity, and because enforcement actions have consequences for consumers and other, licit firms. Yet, achieving direct deterrence by punishment suffers from jurisdictional and resource constraints, leaving enforcers with few other options for remedy. This Article integrates literature from the computer science and legal fields to explain enforcers' interventions, explore their efficacy, and evaluate the merits and demerits of enforcement efforts focused on the intermediaries used by financially-motivated cybercriminals.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy Interests In Public Records: An Empirical Investigation 公共记录中的隐私利益:一项实证调查
Pub Date : 2017-07-01 DOI: 10.2139/ssrn.2875720
Kirsten E. Martin, H. Nissenbaum
The construct of an information dichotomy has played a defining role in regulating privacy: information deemed private or sensitive typically earns high levels of protection, while lower levels of protection are accorded to information deemed public or non-sensitive. Challenging this dichotomy, the theory of contextual integrity associates privacy with complex typologies of information, each connected with respective social contexts. Moreover, it contends that information type is merely one among several variables that shape people’s privacy expectations and underpin privacy’s normative foundations. Other contextual variables include key actors - information subjects, senders, and recipients - as well as the principles under which information is transmitted, such as whether with subjects’ consent, as bought and sold, as required by law, and so forth. Prior work revealed the systematic impact of these other variables on privacy assessments, thereby debunking the defining effects of so-called private information. In this paper, we shine a light on the opposite effect, challenging conventional assumptions about public information. The paper reports on a series of studies, which probe attitudes and expectations regarding information that has been deemed public. Public records established through the historical practice of federal, state, and local agencies, as a case in point, are afforded little privacy protection, or possibly none at all. Motivated by progressive digitization and creation of online portals through which these records have been made publicly accessible our work underscores the need for more concentrated and nuanced privacy assessments, even more urgent in the face of vigorous open data initiatives, which call on federal, state, and local agencies to provide access to government records in both human and machine readable forms. Within a stream of research suggesting possible guard rails for open data initiatives, our work, guided by the theory of contextual integrity, provides insight into the factors systematically shaping individuals’ expectations and normative judgments concerning appropriate uses of and terms of access to information. Using a factorial vignette survey, we asked respondents to rate the appropriateness of a series of scenarios in which contextual elements were systematically varied; these elements included the data recipient (e.g. bank, employer, friend,.), the data subject, and the source, or sender, of the information (e.g. individual, government, data broker). Because the object of this study was to highlight the complexity of people’s privacy expectations regarding so-called public information, information types were drawn from data fields frequently held in public government records (e.g. voter registration, marital status, criminal standing, and real property ownership). Our findings are noteworthy on both theoretical and practical grounds. In the first place, they reinforce key assertions of contextual integ
发送方和接收方(与数据主体相关),以及访问条款(即使是轻量级的),例如身份或角色身份验证、不同的特权级别或对有限目的的承诺,都可以用来调整公共访问,以更好地符合合法的隐私期望。在围绕公共记录和开放数据倡议制定政策时,应该系统地考虑这些期望。
{"title":"Privacy Interests In Public Records: An Empirical Investigation","authors":"Kirsten E. Martin, H. Nissenbaum","doi":"10.2139/ssrn.2875720","DOIUrl":"https://doi.org/10.2139/ssrn.2875720","url":null,"abstract":"The construct of an information dichotomy has played a defining role in regulating privacy: information deemed private or sensitive typically earns high levels of protection, while lower levels of protection are accorded to information deemed public or non-sensitive. Challenging this dichotomy, the theory of contextual integrity associates privacy with complex typologies of information, each connected with respective social contexts. Moreover, it contends that information type is merely one among several variables that shape people’s privacy expectations and underpin privacy’s normative foundations. Other contextual variables include key actors - information subjects, senders, and recipients - as well as the principles under which information is transmitted, such as whether with subjects’ consent, as bought and sold, as required by law, and so forth. Prior work revealed the systematic impact of these other variables on privacy assessments, thereby debunking the defining effects of so-called private information. In this paper, we shine a light on the opposite effect, challenging conventional assumptions about public information. The paper reports on a series of studies, which probe attitudes and expectations regarding information that has been deemed public. Public records established through the historical practice of federal, state, and local agencies, as a case in point, are afforded little privacy protection, or possibly none at all. Motivated by progressive digitization and creation of online portals through which these records have been made publicly accessible our work underscores the need for more concentrated and nuanced privacy assessments, even more urgent in the face of vigorous open data initiatives, which call on federal, state, and local agencies to provide access to government records in both human and machine readable forms. Within a stream of research suggesting possible guard rails for open data initiatives, our work, guided by the theory of contextual integrity, provides insight into the factors systematically shaping individuals’ expectations and normative judgments concerning appropriate uses of and terms of access to information. Using a factorial vignette survey, we asked respondents to rate the appropriateness of a series of scenarios in which contextual elements were systematically varied; these elements included the data recipient (e.g. bank, employer, friend,.), the data subject, and the source, or sender, of the information (e.g. individual, government, data broker). Because the object of this study was to highlight the complexity of people’s privacy expectations regarding so-called public information, information types were drawn from data fields frequently held in public government records (e.g. voter registration, marital status, criminal standing, and real property ownership). Our findings are noteworthy on both theoretical and practical grounds. In the first place, they reinforce key assertions of contextual integ","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Relative Privacy Valuations Under Varying Disclosure Characteristics 不同披露特征下的相对隐私价值
Pub Date : 2017-05-18 DOI: 10.2139/ssrn.3033975
J. Buckman, J. Bockstedt, Matthew J. Hashim
We investigate changes to the value that individuals place on the online disclosure of their private information in the presence of multiple privacy factors. We capture individuals’ willingness-to-...
我们调查了在多种隐私因素存在的情况下,个人对在线披露其私人信息的价值的变化。我们捕捉到个人……的意愿。
{"title":"Relative Privacy Valuations Under Varying Disclosure Characteristics","authors":"J. Buckman, J. Bockstedt, Matthew J. Hashim","doi":"10.2139/ssrn.3033975","DOIUrl":"https://doi.org/10.2139/ssrn.3033975","url":null,"abstract":"We investigate changes to the value that individuals place on the online disclosure of their private information in the presence of multiple privacy factors. We capture individuals’ willingness-to-...","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Revisiting 'The Governance of Privacy': Contemporary Policy Instruments in Global Perspective 重新审视“隐私治理”:全球视角下的当代政策工具
Pub Date : 2017-05-05 DOI: 10.2139/ssrn.2972086
Colin J. Bennett, C. Raab
In the early 2000s, we surveyed and analyzed the global repertoire of policy instruments deployed to protect personal data in “The Governance of Privacy: Policy Instruments in Global Perspective.” In this article, we explore how those instruments have changed as a result of 15 years of fundamental transformations in information technologies, and the new digital economy that they have brought in their wake. We review the contemporary range of transnational, regulatory, self-regulatory and technical instruments according to the same framework, and conclude that the types of policy instrument have remained relatively stable, even though they are now deployed on a global scale, rather than in association with particular national legal and administrative traditions. While the labels remain the same, however, the conceptual foundations for their legitimation and justification are shifting as a greater emphasis on accountability, risk, ethics and the social/political value of privacy have gained purchase in the policy community. Our exercise in self-reflection demonstrates both continuity and change within the governance of privacy, and displays how we would have tackled the same research project today. As a broader case study of regulation, it also highlights the importance of going beyond the technical and instrumental labels. The change or stability of policy instruments do not take place in isolation from the wider conceptualizations that shape their meaning, purpose and effect.
在21世纪初,我们在“隐私治理:全球视角下的政策工具”一文中调查并分析了用于保护个人数据的全球政策工具。在本文中,我们将探讨15年来信息技术的根本性变革及其带来的新数字经济如何改变了这些工具。我们根据同一框架审查了当代跨国、管制、自我管制和技术手段的范围,并得出结论认为,政策手段的类型保持相对稳定,尽管它们现在是在全球范围内部署的,而不是与特定的国家法律和行政传统联系在一起。然而,尽管标签保持不变,但其正当性和正当性的概念基础正在发生变化,因为政策界越来越重视问责制、风险、道德和隐私的社会/政治价值。我们在自我反思中的练习展示了隐私治理中的连续性和变化,并展示了我们今天会如何处理同样的研究项目。作为监管的一个更广泛的案例研究,它也强调了超越技术和仪器标签的重要性。政策工具的变化或稳定并非孤立于影响其意义、目的和效果的更广泛的概念之外。
{"title":"Revisiting 'The Governance of Privacy': Contemporary Policy Instruments in Global Perspective","authors":"Colin J. Bennett, C. Raab","doi":"10.2139/ssrn.2972086","DOIUrl":"https://doi.org/10.2139/ssrn.2972086","url":null,"abstract":"In the early 2000s, we surveyed and analyzed the global repertoire of policy instruments deployed to protect personal data in “The Governance of Privacy: Policy Instruments in Global Perspective.” In this article, we explore how those instruments have changed as a result of 15 years of fundamental transformations in information technologies, and the new digital economy that they have brought in their wake. We review the contemporary range of transnational, regulatory, self-regulatory and technical instruments according to the same framework, and conclude that the types of policy instrument have remained relatively stable, even though they are now deployed on a global scale, rather than in association with particular national legal and administrative traditions. While the labels remain the same, however, the conceptual foundations for their legitimation and justification are shifting as a greater emphasis on accountability, risk, ethics and the social/political value of privacy have gained purchase in the policy community. Our exercise in self-reflection demonstrates both continuity and change within the governance of privacy, and displays how we would have tackled the same research project today. As a broader case study of regulation, it also highlights the importance of going beyond the technical and instrumental labels. The change or stability of policy instruments do not take place in isolation from the wider conceptualizations that shape their meaning, purpose and effect.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115400453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Response to the Public Consultation on ‘Building a European Data Economy’ 对“建立欧洲数据经济”公众谘询的回应
Pub Date : 2017-04-25 DOI: 10.2139/SSRN.2958287
Inge Graef, Martin Husovec
With this submission, we would like to respond, in our personal capacity as researchers, to two issues raised by the European Commission’s public consultation on ‘Building a European Data Economy’, namely: the development of a possible future EU framework for data access (section 1), and the issue of portability in the context of non-personal data (section 2). Regarding both issues, our submission aims to convey two main messages: • A cautious, evidence-based approach should be taken in devising any possible future legislative or non-legislative measures for the European data economy; and • Since a number of legal fields and policy initiatives overlap in this context, there is a strong need to ensure consistency of policies and coherence of law on the European as well as national level.
在这份意见书中,我们希望以研究人员的个人身份,对欧盟委员会关于“建立欧洲数据经济”的公众咨询提出的两个问题作出回应,即:未来欧盟数据访问框架的发展(第1部分),以及非个人数据背景下的可移植性问题(第2部分)。关于这两个问题,我们的意见书旨在传达两个主要信息:•在为欧洲数据经济设计任何可能的未来立法或非立法措施时,应采取谨慎的、以证据为基础的方法;•由于许多法律领域和政策举措在这方面重叠,因此迫切需要确保欧洲和国家一级政策的一致性和法律的连贯性。
{"title":"Response to the Public Consultation on ‘Building a European Data Economy’","authors":"Inge Graef, Martin Husovec","doi":"10.2139/SSRN.2958287","DOIUrl":"https://doi.org/10.2139/SSRN.2958287","url":null,"abstract":"With this submission, we would like to respond, in our personal capacity as researchers, to two issues raised by the European Commission’s public consultation on ‘Building a European Data Economy’, namely: the development of a possible future EU framework for data access (section 1), and the issue of portability in the context of non-personal data (section 2). \u0000Regarding both issues, our submission aims to convey two main messages: \u0000• A cautious, evidence-based approach should be taken in devising any possible future legislative or non-legislative measures for the European data economy; and \u0000• Since a number of legal fields and policy initiatives overlap in this context, there is a strong need to ensure consistency of policies and coherence of law on the European as well as national level.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Information Privacy Law eJournal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1