2002 International Conference on Personal Data Protection

Slides:



Advertisements
Similar presentations
Chapter 44 Administrative Law Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Advertisements

Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Module 7 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 7 Enforcement.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
BC Freedom of Information and Protection of Privacy Act
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Introduction: The Role of Agencies
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Data Protection: The Law. EU & Irish Legislation Data Protection Directive 95/46/EC Electronic Privacy Directive 2002/58/EC EUROPOL etc Data Protection.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
First steps for a data protection commissioner: Some suggestions from New Zealand Katrine Evans Assistant Commissioner (Legal and Policy) Kuala Lumpur,
CLU3M- Introduction Unit 1.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
The Law A rule of conduct considered to be compulsory and to which is attached some legally recognised punishment or sanction if broken Adapted from Meet.
Copyright dilemma: Access right over databases of raw information? Gemma Minero, Lecturer in Law, Universidad Autónoma de Madrid.
Business Law for the Entrepreneur and Manager
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
ICT Coalition Meeting and Stakeholder Forum November 26/27 Brussels.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
NRCCL (University of Oslo, Faculty of Law) Hyperlinks and search engines(I) Jon Bing Norwegian Research Center for Computers and Law Master Lecture 16.
FHF McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Computer Legislation The need for computer laws Go to Contents.
The Institutionalization of Business Ethics
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
RFID ( Electronic Tags ) Legal problems in Japan Takato Natsui Professor, Meiji University, Japan Practicing Lawyer (Asuka Kyowa Law Firm, Tokyo) Copyright.
Appendix A The Legal and Regulatory Environment. A-2 Business Law Business law refers to the rules and regulations that govern the conduct of business.
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Public Communications Law Lecture 9 Slide 1 Commercial Speech and the First Amendment Commercial speech (advertising products, etc.) does enjoy certain.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Data protection—training materials [Name and details of speaker]
Information Systems (Engineering) in Industry Legal Implications of System Provision Delivered by Dave Thomas, K235 e:
Chapter 4 The Institutionalization of Business Ethics Copyright © Houghton Mifflin Company. All rights reserved. MGT University of Bahrain College.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 7 Employment Law Halsey/McLaughlin, Legal Environment You will be able to answer the following questions after reading this chapter: What is an.
Independent Centre for Privacy Protection Schleswig-Holstein
How FTC Regulation of Native Advertising Impacts PR Practice
PowerPoint slide sketch sheet
Surveillance around the world
Chapter 9: Internet Law, Social Media, and Privacy
The Spanish experience of enforcing privacy norms Two decades of evolution from sticks to carrots Dr. Artemi Rallo Constitucional Law Professor Regulator's.
Fundamentals of business law, 10e
CHAPTER 4 LEGAL AND ETHICAL PRINCIPLES
Data Protection: The Law
Chapter 44 Administrative Law Chapter 44: Administrative Law
INTERCONNECTION GUIDELINES
E&O Risk Management: Meeting the Challenge of Change
APP entities (organisations)
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
IS4550 Security Policies and Implementation
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Public Policy & the Internet
Essentials of the legal environment today, 5e
Theories Behind Freedom of Expression
Essentials of the legal environment today, 5e
CS at Regulatory agencies
Robert Plumb Scheme Liaison Manager 15 January 2015
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
The E-Commerce Act and the Right to Privacy
Session 12 Same Pre-assigned room, groups and Chair & Rapporteurs as in session 6. Time to reconsider report of Session 6 Workshop goals AHTEGs: they have.
Presentation transcript:

2002 International Conference on Personal Data Protection Location Based Service for the commercial purpose and protection of privacy Takato NATSUI Professor at Meiji University, Japan Attorney at Law (Tokyo Bar Association) Copyright © 2002 Takato NATSUI, All rights reserved.

Table of Contents Introduction What is a location based service? Privacy issues relating to the location based service Some analysis of the legal aspects How to resolve these problems Conclusion

What is the location based service? “Location” in the context of WL means locating a wireless device. WLIA Privacy Policy Standard (2001) Location based Service: Location-based services and advertising allow consumers to receive services and advertising based on their geographic location. For example, businesses can provide information about traffic, restaurants, retail stores, travel arrangements, or automatic teller machines based on the consumer’s location at a particular moment in time. Such services can be provided in response to a consumer’s manual input of his or her location information into the handset or by using so-called “auto-location” technology to track the location of the consumer automatically. FTC Workshop Report (2002)

Example NTT Docomo Posiseek R

Privacy issues relating to the location based service Location data of individuals must be considered as a constituent of privacy data, because By data matching of location data with user ID or device ID, the location of a specific person would be specified. The location of a specific person may be regarded as private, except if such data has been opened to the public, it might be not private data. Real time privacy intrusion Inter-accessing by a location based service may cause a real time privacy intrusion Misuse of Collected location data stored in server Misuse of such data would cause serious privacy issues, especially by data matching with other privacy data. And, communication may be intercepted Vulnerability included in such service systems may permit some types of illegal interception of data. Specific location data of specific person may be involved in this communication.

Some analysis of the legal aspects Possible intrusion or misuse of privacy data relating to the location based service should be rejected or prevented. Technical elements Human elements Social elements A sign of intrusion or misuse may be discovered in SPAM emails or other advertisements Additional service providing that the users don’t know of or agree to Unreasonable exchange or data traffics during any interaction on the location based service Some types of intrusion or misuse would be illegal. Civil damage compensation Criminal penalties Administrative sanctions

How to resolve these problems Privacy issues or disputes would be unavoidable in this area. Their resolution Legal method – adequate and effective legislation and its enforcement with reasonable dispute resolution measures Technological method – better technology for privacy protection or removal of unnecessary privacy collection functions Self regulation method – better guidelines or relevant parties agreeing on a common privacy goal on the basis of the international privacy protection standards Education

Conclusion Location data of individuals must be considered as a constituent of privacy data. It is therefore important that the following policies be established. Unnecessary inter-accessing by a location-based service should be prohibited or limited by law. Unnecessary collection of privacy data should be restricted by law. Serious misuse of collected privacy data should be punishable by law. Vulnerabilities inherent in a location-based system should be repaired or removed. Clear and effective guidelines for privacy protection should be developed and operated. A Good education on privacy protection should be given to not only school students but also to IT corporations. Most importantly, we have to try to find and establish a better balance between privacy protection and information technology development.

Reference Wireless Location Technology: The Ultimate Challenge to Privacy By Evan Hendricks (Founding Member, US Privacy Coalition) Before the XXIII International Conference Of Data Protection Commissioners http://www.paris-conference-2001.org/eng/contribution/hendricks_contrib.pdf Public Workshop: The Mobile Wireless Web, Data Services and Beyond: Emerging Technologies and Consumer Issues Federal Trade Commission (February 2002) http://www.ftc.gov/bcp/reports/wirelesssummary.pdf FCC order In the Matter of Request by Cellular Telecommunications and Internet Association to Commence Rulemaking to Establish Fair Location nformation Practices http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-02-208A1.txt CITA: Petition of the Cellular Telecommunications Industry Association for a Rulemaking to Establish Fair Location Information Practices http://www.cdt.org/privacy/issues/location/001122ctia.pdf Comments of the Center for Democracy and Technology By James X. Dempsey, Deirdre Mulligan http://www.cdt.org/privacy/issues/location/010406fcc.shtml

WLIA Privacy Policy Standard http://www.wliaonline.com/indstandard/privacy.html Location-based services vs. your privacy By Joanie Wexler http://www.nwfusion.com/newsletters/wireless/2002/01418495.html Should Mobile Safety Trump Privacy? By Dan McDonough, Jr. http://www.wirelessnewsfactor.com/perl/story/18555.html ExperTeam AG entwickelt "Location Based Service" Navigation nicht nur im Auto Das Telefon-Navigations-Center "TelNav" soll 2003 in Betrieb gehen http://www.experteam.de/startd/presse/Presseinformationen/TelNav.html Wireless Privacy Issues Now Before the FCC By Peter M. Connolly http://www.privacyassociation.org/docs/1-03Connolly.pdf FCC Ruling May Leave Cell Phone Users Exposed By Stephen Chiger http://www.pcworld.com/news/article/0,aid,103304,00.asp