• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

Campaigner for Digital Privacy Rights.

Extracts from this document...


Title: Campaigner for Digital Privacy Rights. Department: UK Home Office. 1. Introduction The Home Office is the Government department responsible for internal affairs in England and Wales. The purpose of the Home Office is to work with individuals and communities to build a safe, just and tolerant society enhancing opportunities for all and in which rights and responsibilities go hand in hand, and the protection and security of the public are maintained and enhanced.1 This does not only include issue like immigration and nationality, criminal justice or drugs prevention but also comprises privacy protection issues. Especially, in the last couple of years privacy has become a hot topic among the people who have made it their business to mind your business. Identity theft, government surveillance programs, and the increased efficiency with which marketers can collect and process data have led to widespread concern. These issues have mainly been caused by the massive growth of the Internet and the corresponding development of electronic commerce that enable the world- wide transfer (via the Internet) of private data. As a result of this, many people may be reluctant to use the Internet if they are afraid that the personal information transmitted over it can be used in ways that are unexpected or inappropriate. Hence, the pressure is now on for governments to take action in order to safeguard the legitimate privacy interests of Internet users, and it is no surprise that today legislators, media pundits and special interest groups all wrestle with this issue. However in the past, analysis has shown that the response to this issue has been a source of great contention by various governments. While the US Government has consistently stressed that it will not regulate privacy on the Internet but instead calls upon industry to regulate itself, the European Union and Great Britain, on the other hand, have taken the opposite approach. ...read more.


Proponents of self-regulation claim that there is a clear unity of interest between online businesses and their potential customers. Businesses want to provide a safe and pleasant online experience and consumers want to have one. If businesses neglect their customers, their profits will decline, shareholders will be unhappy, and ultimately the firm will go out of business. Since these incentives exist, the argument that government must step in to aid e-commerce is wrong. Ann Cavoukian, information and privacy commissioner for Ontario, Canada, who has been influential in promoting this viewpoint in Canada and the U.S. says, "If you're in the information business today, you've got to lead with privacy because privacy is good for business". 10 This 'self-regulatory' attitude might sit well with a majority of Americans, but European cultural norms dictate a different interpretation of the facts. If anything, the history of self- regulation is not very compelling. The Direct Marketing Association (DMA) advocates self-regulation, but its own regulatory record is poor indeed. A 1996 study by Professor Joel Reidenberg and Professor Paul Schwartz found that fewer than half of DMA members complied with the association's own modest guidelines. A study conducted by EPIC in 1998 found that only a handful of new DMA members met the DMA's privacy principles, even after the DMA made compliance a condition of membership. 11 Advocates of privacy regulation argue that the profit motive of businesses contradicts privacy interests, and since businesses care more about profits than consumers, self-regulation will never work. Consumers want their rights protected in the online world, just as they are protected in the offline world. Hence, privacy protection should not end where the Internet begins. The 1998 Harris poll on Internet privacy found that just over half of those surveyed "favour government passing laws to regulate how personal information can be collected and used on the Internet." 12 This also explains why in the UK the Home Office is ready to enact legislation that provides individuals with a baseline of privacy protection on the Net by codifying the fair information principles. ...read more.


8. Endnotes 1. Home Office UK website; Online at: http://www.homeoffice.gov.uk/ 2. BBC World Service/ Human Rights, Right to privacy in home, family and correspondence; Online at: http://www.bbc.co.uk/worldservice/peopl...es/ihavearightto/four_b/d_right_1.shtml 3. Warren, S. & Brandeis, L.D. The Right to Privacy, Originally published in 4 Harvard Law Review 193 (1890); Online at: http://www.louisville.edu/library/law/brandeis/privacy.html 4. Information and Privacy Commissioner/Ontario, Privacy and Digital Rights Management (DRM): An Oxymoron?, October 2002; Online at: http://www.ipc.on.ca/english/pubpres/papers/drm.htm#intro 5. Dyson, E. Privacy Protection: Time to Think and Act Locally and Globally; Online at: http://www.firstmonday.dk/issues/issue3_6/dyson/ 6. Arrison, S. Consumer Privacy A Free Choice Approach; Online at: www.pacificresearch.org/pub/sab/techno/privacy 7. Some examples include Dr.Koop.com, Boo.com, and Toysmart 8. Federal Trade Commission, Privacy Online: A Report to Congress, June 1998; Online at: http://www.maricopacountyattorney.org/SpecPros/children.asp#N_2_ 9. Liberto, S.M. Government Regulation of Web Privacy: Congress takes a first Step, From the November 1998 issue of WWWiz Magazine; 10. Lester, T. The Reinvention of Privacy, Atlantic Monthly, March 2001; Volume 287, No. 3; pp. 27-39. Online at: www.theatlantic.com/issues/2001/03/lester-p1.htm. 11. For Privacy, New Laws By Marc Rotenberg - Issue Date: Dec 04 1998 12. Givens, B. Privacy Expectations in a High Tech World, Santa Clara University, Symposium on Internet Privacy - Computer and High Technology Law Journal; February 11-12, 2000; Online at: http://www.privacyrights.org/ar/expect.htm 13. Information and Privacy Commissioner/Ontario, Privacy and Digital Rights Management (DRM): An Oxymoron?, October 2002; Online at: http://www.ipc.on.ca/english/pubpres/papers/drm.htm#intro 14. Online at: http://europa.eu.int/comm/internal_market/en/dataprot/law/dir1995-46_part1_en.pdf 15. The Data Protection Act. A Guide To The Data Protection Act, Online at: http://www.legislation.org.uk/index.htm 16. Davies, S. New Techniques and Technologies of Surveillance in the Workplace, Computer Security Research Centre - The London School of Economics; Online at: http://www.msf-itpa.org.uk/juneconf3.shtml 17. RAND Conference Asks: How Do Emerging Technologies Impact Privacy and Privacy Policy?; Online at: http://www.rand.org/natsec_area/products/privconf.html 18. For more on what encryption is see: www.pgpi.org/doc/pgpintro/#p3 19. Chaum, D. Blind Signatures for Untraceable Payments, CRYPTO 82, Plenum, pp. 199-203. 20. Meller, P. European Union Set to Vote on Data Law, New York Times ,13 Nov 2001; Online at: http://www.nytimes.com/2001/11/13/technology/13NET.html 21. See A Little Privacy, Please, BUS. WK., March 16, 1998, at 98 [hereinafter BUSINESS WEAK Poll] 9. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Impact of Internet on Plagiarism. This paper aims to explore the reasons behind ...

    guidelines on giving credit to the original source and students should familiarize themselves with the ones accepted by their own institutes (Kirszner & Mandell, 2004). It is a good idea to ask for help whenever there is any confusion about citing.

  2. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    countries in order to begin using the program, as authorization is needed. The program is designed to be shared within social affinities, thus limiting the ability for the program to reach as many people as possible.11 The host also has the ability to monitor what the user does, causing possible trust issues.

  1. Cinema Evolved

    for Tony Camonte the Tommy gun transformed his character into an innocent, child-like figure trigger happy and immune from moral judgment. "I'm gonna spit," says Tony. In a primitive way, he grabs the gun into his arms and empties a steady round of spitting bullets into the wall.

  2. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    This digital network has in effect created a competition among different groups in exploiting emerging technological advancements for their own benefits. For example new ICTS in this field have unwrapped new pitfalls for both cyber criminals and law enforcers in attempting to upend online illegal activities (Nuth, 2008).

  1. What in your view, are the main problems involved in attempting to produce policies ...

    Further industry initiatives have also been developed to promote access and participation by the disabled. The ubiquity of the new media has prompted the teaching of media, information and technological literacy alongside traditional literacy at all levels of the education system as ??the presumed communications revolution of our own time:

  2. The Tragedy of the Commons - Examining the Free Internet

    After all it doesn?t look like a new economic model as much as a well-known stunt. As Garrett Hardin so elegantly puts it ?Whenever a reform measure is proposed it is often defeated when its opponents triumphantly discover a flaw in it.?[2] The notion of free is a tragedy of the commons in newer times.

  1. Tate Modern Case Study. The purpose of this research is to analyze the ...

    There is a significant body of literature on the evaluation of Museum Web sites as a whole, exploring both quantitative and qualitative approaches. For example, Peacock (2002) developed a framework of assessing whether a Web site meets user needs, based on log-based metrics.

  2. COICA. The Role of the US Government and Online Piracy

    With the repeal of these beneficial tax cuts, the financial weight of illegal pirating feels heavier than it ever has. For this reason the MPAA dedicated the latter half of 2010 to pushing S. 3804, the Combating Online Infringement and Counterfeits Act (COICA), through congress.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work