Human rights in the balance

Slides:



Advertisements
Similar presentations
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Advertisements

Legal Aspect of IPv6 and of the IPv4 to IPv6 transition Ashok.B.RADHAKISSOON Legal Adviser/Policy&Regulatory Affairs Liaison.
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
Implementation of International Covenants International Covenant on Civil and Political Rights (ICCPR) International Covenant on Economic, Social and Cultural.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
CALEA: The Communications Assistance for Law Enforcement Act Doug Carlson, Executive Director, Communications and Computing Services, NYU Mark Luker, Vice.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Module 7 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 3 Compliance Promotion & Monitoring.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
The EIFFEL Initiative A Proposal for Preparing a Stage for Future Internet Debate Dirk Trossen BT Research ETSI June 2007.
Conferencing Status in 3GPP SA3-LI August Jean Trakinat Selvam Rengasami TrideaWorks Consultants to CALEA Implementation Unit Technical Program.
The First Amendment: Freedom of Religion “Congress shall make no law respecting the establishment of religion, or prohibiting the free exercise thereof…”
Tussle in Cyberspace: Defining Tomorrow’s Internet Presented by: Khoa To.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
CALEA: The Big Picture for Higher Education ICPL June 28, 2006 Steve Worona EDUCAUSE
Can human rights ever be limited? Input C ARASA HIV/AIDS and human rights training manual.
1.01 Scarcity and Economic Systems (Chapter 2) Resources Economic Systems.
What is a Constitution?. How would you define… In general, a constitution is a document that organizes a government. Think of a constitution as a rule.
Working effectively as a team.
Developing as an Ethical Reasoner
Why is this Amendment So Controversial?
AFRICA FREEDOM OF EXPRESSION EXCHANGE (AFEX) Workshop
Lesson 4: The U.S. Constitution
Working with Scholarly Articles
Stories of Human Rights
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Lesson 28: How Does the First Amendment Affect the Establishment and Free Exercise of Religion?
Rights and Genomic Medicine: Risks to Individuals
Data Protection: EU & International
Appraisal Management The Human Side.
Supply and demand: improving the open ag funding data landscape
Paths to our Digital Future
John Stuart Mill.
Where is the harm? Calculating the damages afforded in privacy cases by the European Court of Human Rights Bart van der Sloot May 14th 2017, Haifa, Israel.
Intercepting Communications
Data Protection & Human Rights
The Future of Big Data, Equality and Privacy
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
Progress of LTE V2X in CCSA
U.S HISTORY Ms. Ramirez Foundations of American Political and Social Thought The Enlightenment.
West Sussex SEND Pathways to Adulthood Strategy The story so far.
Global Standards Collaboration (GSC) 14 Security and Lawful Intercept
Unit 1: Foundations of Government
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
AIS Conference June 2018 Paul Ferris CEO
Main topic of the mobility: The right to Freedom of Expression
Sameer Sharma, ITU 7 August, 2018 Dhaka, Bangladesh.
Bell ringer #2 The U.S. Government recognizes holidays based in the Christian faith (Christmas, Easter, etc.) in your opinion, does this endorse (establish)
Cybercrime and Data Protection
Introduction to Disability and IT: Policy Development
Bell ringer #2 The U.S. Government recognizes holidays based in the Christian faith (Christmas, Easter, etc.) in your opinion, does this endorse (establish)
HIT Legal Issues: Legal Structure and Tax Status
GSC-13 Security and Lawful Interception TIA
Statistical Information Technology
I (do not) consent to behavioural advertising
Public Privacy: juridical & ethical perspective
What is a Constitution?.
You just played….
Supported by:.
What is a Constitution?.
Supported by:.
Pent-Up Regulatory Change (U.S.)
APNIC’s Engagement on Security
Richard Hill Partner, Hill & Associates
The Enlightenment Late 1600’s-1700’s.
What is a Constitution?.
Presentation transcript:

Human rights in the balance David Clark MIT

Why am I here? I wrote a paper that talked about “tussle”—the contention among actors with differing interests to shape the Internet to their preferences. Tussle in Cyberspace: Defining Tomorrow’s Internet IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 3, JUNE 2005

Managing tussle Architecture and standards can shape tussle but cannot prevent it. We wrote: Design for tussle — for variation in outcome — so that the outcome can be different in different places, and the tussle takes place within the design, not by distorting or violating it. Do not design so as to dictate the outcome. Rigid de- signs will be broken; designs that permit variation will flex under pressure and survive

Informally You are designing the playing field, not the outcome of the game. You can tilt the playing field. Our work is NOT value-neutral. I strongly believe in the viewpoints of the “values in design” movement.

Human rights Making the problem harder: rights are not absolute. UDHR Article 29: In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.

Managing tussle Where does the process of tussle play out? In the courts and legislature. In the larger social context of the use of technology. By the choices about how capital is deployed. By the use of features of the technology. Designers of technology have a choice: To be in the conversation or not. Design the playing field or let the game be played somewhere else.

CALEA An example from the past… IETF was invited to develop standards for lawful intercept, in the context of the U.S. Communications Assistance for Law Enforcement Act. The IETF, after deliberation, declined. See RFC 2804, from 2000 (See also RFC 1984) The “RAVEN” process

CALEA 107(a)(2) A telecommunications carrier shall be found to be in compliance with the assistance capability requirements under section 103, and a manufacturer of telecommunications transmission or switching equipment or a provider of telecommunications support services shall be found to be in compliance with section 106, if the carrier, manufacturer, or support service provider is in compliance with publicly available technical requirements or standards adopted by an industry association or standard-setting organization, or by the Commission under subsection (b), to meet the requirements of section 103.

3GPP (SA 3 WG) [T]he WG will determine the security and privacy requirements for 3GPP systems…. The WG will ensure the availability of any cryptographic algorithms which need to be part of the specifications. The WG will accommodate, as far as is practicable, any regional regulatory variations in security objectives and priorities for 3GPP partners. The WG will further accommodate, as far as is practicable, regional regulatory requirements that are related to the processing of personal data and privacy. The subworking group SA WG3-LI will detail the requirements for lawful interception in 3GPP systems, and produce all specifications needed to meet those requirements.

Human rights in the balance I strongly support the use of human rights as a foundational value in considering design implications. The harder challenge: Do we design for a preferred outcome and then let the tussle happen in ways over which we perhaps have little input? Do we incorporate into our design a tolerance for a range of outcomes, some of which we (as individuals or collectively) might not prefer. Are we clever enough to tilt the playing field?