18
Theme C: Protecting Human Theme C: Protecting Human Dignity in the Digital Age Dignity in the Digital Age Roundtable 4: Regional INFOethics Workshop Africa UN Conference Centre, Addis Ababa 14h30 – 16h30, Thursday, 14 14h30 – 16h30, Thursday, 14 th th September, 2000 September, 2000 Dr Bob Day Dr Bob Day Executive Director: ICT, Unisa Executive Director: ICT, Unisa

Theme C: Protecting Human Dignity in the Digital Age

Embed Size (px)

DESCRIPTION

Theme C: Protecting Human Dignity in the Digital Age. Roundtable 4: Regional INFOethics Workshop Africa UN Conference Centre, Addis Ababa 14h30 – 16h30, Thursday, 14 th September, 2000 Dr Bob Day Executive Director: ICT, Unisa. Privacy - 1. - PowerPoint PPT Presentation

Citation preview

Page 1: Theme C: Protecting Human Dignity in the Digital Age

Theme C: Protecting Human Theme C: Protecting Human Dignity in the Digital AgeDignity in the Digital Age

Roundtable 4: Regional INFOethics Workshop Africa

UN Conference Centre, Addis Ababa

14h30 – 16h30, Thursday, 1414h30 – 16h30, Thursday, 14thth September, 2000 September, 2000

Dr Bob DayDr Bob Day

Executive Director: ICT, UnisaExecutive Director: ICT, Unisa

Page 2: Theme C: Protecting Human Dignity in the Digital Age

Privacy - 1Privacy - 1

Constitution(s) should be basis for protection of individuals’ privacy.

‘Right to Privacy’ relatively recent – not one of original 17th century human rights.

Globally, this right is not yet well defined. Some view OECD’s 1981 ‘Guidelines on the Protection

of Privacy..’ as an adequate basis for today’s privacy policies.

Others argue that the world has changed beyond recognition since then – hence the ‘Economist’s’ question in 1999, “are we witnessing the end of privacy?”

Page 3: Theme C: Protecting Human Dignity in the Digital Age

Privacy - 2Privacy - 2

Central issue is to what extent personal information may be used for purposes to which the individual has not consented

Suggested new ‘Privacy Principles’:– The right not to be indexed;– The right to encrypt personal information effectively;– The right to secure human checking of adverse decisions

made on computer profiles;– The right to be alerted to such decisions;– The right of disclosure about the collections to which others

have access and which may affect the projection of the profile of the individual concerned.

Page 4: Theme C: Protecting Human Dignity in the Digital Age

Privacy - 3Privacy - 3

Suggested Data Protection Practices:– Such practices should be entirely visible to the individual;– Any feature which results in the collection of personal data

should be known prior to its operation;– The individual should retain the ability to disable the feature

or application of choice

New technologies eroding privacy rights include:– Video surveillance cameras;– Identity cards;– Intelligent agents;– Genetic databases.

Page 5: Theme C: Protecting Human Dignity in the Digital Age

Privacy and BiometricsPrivacy and Biometrics

Biometrics offer irrefutable evidence of one’s identity, eg voiceprints; body parts such as retina, iris, and hand.

The use of biometric technology by government, law enforcement and business will grow dramatically in the next decade.

The existence of stringent safeguards – legislative, procedural and technical – will be needed to prevent biometrics posing a threat to informational privacy.

By applying encryption to biometrics, systems can enhance privacy by putting its power into the individual’s hands, not government or big business.

Page 6: Theme C: Protecting Human Dignity in the Digital Age

Approaches to Privacy - 1Approaches to Privacy - 1

The EU and USA differ significantly, especially on dispute resolution – who will judge and enforce alleged breaches.

The EU wants binding protections with ‘teeth’, eg:– An independent authority to investigate alleged violations

and impose sanctions;– Power to investigate complaints from EU citizens;– Financial payments must be made to aggrieved.

The USA is much softer, asking only that breaches be punished by removal of a ‘privacy seal’ from company web sites, despite their effectiveness having yet to be proved (possibly in breach of the OECD guidelines).

Page 7: Theme C: Protecting Human Dignity in the Digital Age

Approaches to Privacy - 2Approaches to Privacy - 2

Alternatives from New Zealand and Hong Kong favour a greater role for self-regulatory (or co-regulatory) initiatives, plus individual self –help, plus regulatory and legal action. The model includes:

– Statutory requirements of compliance with data protection principles;

– Development of principles, but flrxible and user-friendly;– Provision for sectoral codes of practice which can vary the

principles, and provide for sectoral complaint handling;– Default complaints and enforcement machinary for sectors without

codes of practice;– Provision of appeals, providing a uniform quality control

mechanism;– Avoidance of any generic registration or licensing requirement

Page 8: Theme C: Protecting Human Dignity in the Digital Age

Approaches to Privacy - 3Approaches to Privacy - 3

Possible ways forward: No universal agreement yet exists on the regulation of

information privacy. African states should collaborate, and act together to

decide on appropriate best practices, models and legislation to handle privacy issues

African states should have shared mechanisms to collectively stay abreast of international privacy developments - benefit from global experience, and customise in Africa’s context.

Page 9: Theme C: Protecting Human Dignity in the Digital Age

Consumer Protection - 1Consumer Protection - 1

E-commerce provides 24 hour shopping, wide choice, and outlets all over the world, BUT rights enjoyed via national consumer protection legislation do not apply.

Consumer rights will require international cooperation on ‘best practices’, and coordinated global oversight, including:– Basic format of an electronic contract;– Effective complaint mechanisms;– Limits of consumer liability;– Safeguards for the privacy of individuals;– Recourse to specific courts;– Cooperation between governments in support of legal

redress.

Page 10: Theme C: Protecting Human Dignity in the Digital Age

Consumer Protection - 2Consumer Protection - 2

In the development context of Africa: Much of the population does not currently

have access to banking facilities – the “unbanked”

ICT provides an excellent solution in the form of ‘electronic money’ and ‘smart cards’

BUT – more emphasis/research will be required in Africa on consumer protection relating to these electronic payment instruments

Page 11: Theme C: Protecting Human Dignity in the Digital Age

Consumer Protection - 3Consumer Protection - 3

How does the developing world identify and respond to misinformation and the withholding of crucial information – from their own governments, and from the multi-nationals?

What can we learn from such cases as:– The tobacco wars– Blue Circle asbestos in the Northern Cape

Who retains credibility?

Page 12: Theme C: Protecting Human Dignity in the Digital Age

Freedom of Speech - 1Freedom of Speech - 1

On a broader scale, for the Knowledge Society to flourish, it is important that society strikes the best balance between encouraging the free flow of information, including freedom of speech, and protecting the rights of those to whom that information may relate

Even in the most liberal societies, bodies within the ‘establishment’ see some information as ‘sensitive’ or potentially threatening to their area of influence (or power)

Historically, the establishment has established ways to control said information, but usually not transparently

Page 13: Theme C: Protecting Human Dignity in the Digital Age

Freedom of Speech - 2Freedom of Speech - 2 What is a ‘maveric’ and do we need them? They usually identify a ‘major problem’, want dramatic

changes, are vociferous, tenacious, and often appear to be ‘misguided’ (but later, sometimes, prove to be right)

The ‘establishment’ prefers incrementalism – building on what they believe, and usually control

At some stage, most societies marginalise, even persecute maverics (conspiracy theory?) – label their views as ‘extreme’ or ‘fundamentalism’

BUT, where does innovation and entrepreneurship most often originate – the developing world in particular needs to find alternative ways to manage maverics, rather than marginalisation..

Page 14: Theme C: Protecting Human Dignity in the Digital Age

Freedom of Speech - 3Freedom of Speech - 3

CENSORED!

Page 15: Theme C: Protecting Human Dignity in the Digital Age

Freedom of Speech - 4Freedom of Speech - 4 Change and transformation are accelerating globally More ‘maverics’ – more pressure on the establishment The web (together with other media) is being used to

reinforce the establishment position The web, however, is the first easily available medium

to provide everyone, including the ‘maverics’ with a global voice (providing alternative to more extreme outlets?)

Isn’t this righting the balance between privacy and freedom of speech?

Isn’t the openess and global availability of the web what makes it so uniquely valuable?

Isn’t this what we should be trying to protect most?

Page 16: Theme C: Protecting Human Dignity in the Digital Age

Theme C: Protecting Human Theme C: Protecting Human Dignity in the Digital AgeDignity in the Digital Age

Thank [email protected]

Page 17: Theme C: Protecting Human Dignity in the Digital Age
Page 18: Theme C: Protecting Human Dignity in the Digital Age