Law, IT and personal data protection - legislative framework lags behind the IT development Nataša Pirc Musar Information Commissioner, Republic of Slovenia.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

IT: Communication and Impacts
A NEW LOOK AT FACEBOOK!. What you can do with facebook: What you can do with facebook: o o You can see where old friends have gone o o Students can make.
Data privacy law in Asia-pacific -introduction to the privacy law in China (mainland China and Hong Kong) Yue Liu
San Mateo County, CA  FAST FACTS:  Founded: 1856  Size: 455 sq miles  Coastline: 57 miles  Population: 718,451  Cities: 20  County Employees: more.
Wiredsafety.org  The world’s largest online safety and help group, including: –WiredPatrol.org –WiredKids.org –Cyberlawenforcement.org  Provides education,
Data Protection webinar: Data Protection & Volunteers 19 th June 2014 Welcome. We’re just making the last few preparations for the webinar to start at.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Public Awareness and Data Protection Nataša Pirc Musar, Information commissioner, Republic of Slovenia Brussels, 20th of May, 2009.
Republic of Moldova: general presentation Geographical position: South-Eastern Europe Territory: 33,8 thousand км 2 (situated between the Danube, Prut.
MONGOLIA Technical Expert Workshop on Mutual Legal Assistance (MLA) and Law Enforcement Cooperation Bangkok, Thailand 30 May – 1 June 2011.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
Job Search 101 Free Geek Instructor: Wayne Flower.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Security and Privacy Strategic Global Partners, LLC.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Miriam’s Vision: A Response to the 2005 London Bombings Citizenship Different Needs, Common Ground Human Rights & Surveillance.
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
Access to Public Information in Slovenia Nataša Pirc Musar, LL.B. Commissioner for Access to Public Information The Hague – 24 th -25 th November, 2004.
E – FILING EXPERIENCE IN SLOVENIA AND SERBIA Ivan Simič.
Modeled after United States Constitution Creates three branches of government Based on seven principles Included a Bill of Rights (list of freedoms)
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Zaštita ličnih podataka Iskustva iz Republike Slovenije Podgorica, Nataša Pirc Musar Information Commissioner.
Special considerations and procedures in transnational cases of children exposed to exploitation, trafficking, and children at risk MINISTRY OF WELFARE.
THE REPUBLIC OF SLOVENIA MINISTRY OF HIGHER EDUCATION, SCIENCE AND TECHNOLOGY e: Kotnikova 38, 1000 Ljubljana p:
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Easy Read Summary Mental Capacity Act Mental Capacity Act A Summary The Mental Capacity Act 2005 will help people to make their own decisions.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
Monitoring and Supervision. June 15, Rotterdam 1 MONITORING ELECTRONIC COMMUNICATIONS: PRIVACY ISSUES Prof. Rimantas Petrauskas, Assoc.
Digital Citizen Project By: Frances Murphey Technology and Education.
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Implementation of the Personal Data Protection law of Georgia Giorgi Giorganashvili Head of IT department of the Office of the personal data protection.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Online Services Online services are services that help you via the internet.
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Group 3 Against the Proposed Amendments to Fed.R.Civ.Proc., Fed.R.Crim.Proc. & Fed.R.Evid.
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
Warm-Up Why do you think it is important to be a responsible citizen to your country, community, & school??? Why do you think it is important to be a responsible.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Perspectives on Privacy in the Internet Age Billy Hawkes Data Protection Commissioner Institute of International and European Affairs Dublin, 30 May 2008.
Your kids online – challenges and solutions. Fact or fiction? 1. How many hours a week do children aged between spend online on average? a)18 hours.
Nataša Pirc Musar Information Commissioner, Republic of Slovenia Madrid, 28th of October 2008.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Freedom of information – raising public and institutional awareness TAIEX workshop, Skopje Kristina Kotnik Sumah Deputy of the Information Commissioner.
Prof. Dr. Lorena Bachmaier, Universidad Complutense Madrid, Spain Section III- Criminal Procedure Information Society and Penal Law Lorena Bachmaier Doha,
Social Media Privacy By: Jordan Mallore. What is Social Media?  Electronic communication in which users use online websites to communicate, spread ideas,
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
MY DIGITAL FOOTPRINTS Hailey Smith. WHAT IS A DIGITAL FOOTPRINT A digital footprint is what you leave behind on the internet. When you post something.
Do The Police Require A Reason To Pull Me Over In Cincinnati?
Internet Safety By: Zack Ward.
Protecting Your Privacy Online
Nina Barakzai November 2017
Confidentiality October 14, 2005.
The Global Privacy Enforcement Network Why does it matter? The Global Privacy Enforcement Network was established in 2008 The Network.
Intellectual Property Lawyers
Directive (EU) 2016/680 gap analysis results
Employee Privacy and Privacy of Employee Information
Good Spirit School Division
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Law, IT and personal data protection - legislative framework lags behind the IT development Nataša Pirc Musar Information Commissioner, Republic of Slovenia Hong Kong, 4th of January, 2010

Modern Digital Technologies Legislative Framework (always lags ages behind the IT) Law of the Net (Global Agreement) “We might not be able to stop you from doing bad things, but if we catch you, there will be consequences” If we…, regarding data protection, strong inspection tools are needed A lot of media support, quality prevention, awareness campaigns

Proportionality Principle Data prevention v. data retention everybody is a potentional criminal Going back to internet… German Constitutional Court has set strict limits to the law enforcement authorities (especially to the secret services) with regard to secret supervision of the computers. They are only allowed to supervise the computers in possession of individuals with special programmes (types of Trojan horses) in extreme cases when concrete threat to life or state exists. Collection of data in advance ‘to have in stock’ and from randomly chosen individuals should thus not happen.

Privacy on the Internet?! Contradiction per se Legal office in USA – checked 5000 divorce files Facebook was a reason for a divorce in 989 cases!!! Quotes from a wall of a Facebook profile were used to prove infidelity Not to talk about Google/Dashboard

“If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place!“ Eric Schmidt, Google CEO

Electronic Road Toll System Is there any personal data: Position Journey time

Electronic Road Toll System On-board Unit: 1.determining the position of the vehicle, 2.determining the segment of the road and the corresponding tariff, 3.calculating the sum spent for that segment, 4.sum total. The control center does not have the position of the car

Employer v. Employee How to strike the right balance? Internet E mail Telephones GPS RFID CCTV Microsoft Software (heart beat)

Telephone Traffic Data Facts: 1.Diplomatic mail was secretly given to the media 2.Ministry wants to catch a bad guy 3.Let’s check all the telephone calls - data base with calls (in house telephone system) - No need to contact the operator 4.Who out of 700 employees was calling the media

Science fiction?

Easily accesible biometrics – face recognition for up to 500 people = 318,29 € Slovenian biometric regime

Do we wish the old times to come back? Mission impossible

“I have nothing to hide” argument "Our lives begin to end the day we become silent about things that matter." Martin Luther King Jr.

Thank you for your attention