11
Technology Invasion: Violation of Right to Privacy

Violation of Right to Privacy 24.03.2015

Embed Size (px)

Citation preview

Page 1: Violation of Right to Privacy 24.03.2015

Technology Invasion: Violation of Right to Privacy

Page 2: Violation of Right to Privacy 24.03.2015

Three Generations of Human Rights

Page 3: Violation of Right to Privacy 24.03.2015

What is privacy

Article No. 12 of Universal Human RightsDeclaration

No one shall be subjected to arbitrary interference withhis privacy, family, home or correspondence, nor toattacks upon his honor and reputation. Everyone hasthe right to the protection of the law against suchinterference or attacks.

Page 4: Violation of Right to Privacy 24.03.2015

Privacy is different from secrecyand security

Page 5: Violation of Right to Privacy 24.03.2015

Potential technological threats toour privacy

• In the name ofSecurity

• Artificial Intelligence-Data mining, patternassessment, speechrecognition, imageanalysis, robotics,social machines etc.

Page 6: Violation of Right to Privacy 24.03.2015

Potential technological threats toour privacy

• Surveillance –Internet, Places(Digital spying)and people-(RFID) & Mobile(GPS)

Page 7: Violation of Right to Privacy 24.03.2015

Potential technological threats toour privacy

Social net working-

• Identity theft

• Sexual predators

• Stalking

• Unintentional fame

• Employee tracking

• Employment fraud

• Online victimization

Page 8: Violation of Right to Privacy 24.03.2015

Potential technological threats toour privacy

Biometrics-

• Body scanning

• Facial recognition

• Fingerprints scanning

• Iris/retina scanning

• DNA profiling

• Brain scanning

• Polygraph

• Metal detectors

Page 9: Violation of Right to Privacy 24.03.2015

Possible ways out

• Privacy impactassessment for securitymeasure

• More refined technology

• Maintaining data integrity

• Avoid unnecessarysurveillance

• People and agencies beethical in data business

Page 10: Violation of Right to Privacy 24.03.2015

Conclusion

Technology could be usedas both protecting anddestroying the Right toprivacy as well as otherhuman rights.

We need fourthgeneration human rights

Page 11: Violation of Right to Privacy 24.03.2015

Grover Vijay K

D A V College of Education

Abohar

[email protected]