- tags
- Privacy Law
Notes
the currently developing legal concept of privacy denies a social and interactive context to information;
NOTER_PAGE: (1 0.6276293348493461 . 0.24882629107981222)
environment has so radically changed with digitisation that many expectations of privacy are redundant;
NOTER_PAGE: (1 0.6623081296191017 . 0.6384976525821596)
legislation and judicial interpretation – when aimed at protecting privacy as, for example, in data protection law – usually misses its mark
NOTER_PAGE: (1 0.6958499147242752 . 0.25508607198748046)
ultimately, ‘Privacy cannot be the dominant value in any society. Man has to live in society, and social concerns have to take precedence’
NOTER_PAGE: (2 0.16827743035815804 . 0.38341158059467917)
a theory of self and society is an essential requirement of any coherent and critical legal understanding of the nature of privacy.
NOTER_PAGE: (2 0.37748720864127344 . 0.23317683881064163)
Often the agency which is seen as the opponent of privacy is the state.
NOTER_PAGE: (2 0.7015349630471859 . 0.1588419405320814)
Privacy concerns interpersonal relationships (sometimes one-to-one, sometimes one-to-many) and how they combine into larger societal relationships.
NOTER_PAGE: (4 0.3325753268902785 . 0.17683881064162754)
Privacy is about the physical/psychological relationship between self and society
NOTER_PAGE: (4 0.3956793632745878 . 0.17762128325508608)
Privacy is about power, authority and role in society.
NOTER_PAGE: (4 0.45650938032973276 . 0.17605633802816903)
2. Privacy v. Goffman's dialectic
NOTER_PAGE: (4 0.6139852188743604 . 0.15492957746478875)
those against whom the claim to privacy is being made.
NOTER_PAGE: (5 0.13587265491756678 . 0.40688575899843504)
European law recognises privacy in a confused manner because a perspective has developed that privacy is ‘a good thing’ rather than we have a clear notion of what it is:
NOTER_PAGE: (5 0.37293916998294485 . 0.2605633802816901)
NOTER_PAGE: (5 0.7060830017055144 . 0.37089201877934275)
NOTER_PAGE: (5 0.7367822626492325 . 0.7206572769953051)
NOTER_PAGE: (6 0.5366685616827743 . 0.18466353677621283)
NOTER_PAGE: (7 0.2603752131893121 . 0.5039123630672927)
NOTER_PAGE: (7 0.5008527572484366 . 0.2856025039123631)
‘balance’ is a problematic concept and one which lawyers frequently tend to use to gloss over difficulties, suggesting that it will be alright in court on the day.
NOTER_PAGE: (8 0.24587546567323043 . 0.18681318681318682)
suggests that what is really need instead is ‘steering’ – ‘some combination of regulation and self-regulation, along with better public education and the avail- ability of privacy-enhancing technologies may succeed in steering towards privacy protection’.
NOTER_PAGE: (8 0.32676955827567855 . 0.4336996336996337)
whether privacy and data protection have actually been well served by the protection system to date.
NOTER_PAGE: (8 0.4216417910447761 . 0.4981658107116655)
3. The importance of the other
NOTER_PAGE: (8 0.46731097214326317 . 0.15023474178403756)
Durkheim was seeking an ordered non-chaotic society and his term indicated such a society: one which the sociologist should remedy wherever found.
NOTER_PAGE: (8 0.5804162724692526 . 0.361328125)
NOTER_PAGE: (8 0.6438032166508988 . 0.4329427083333333)
NOTER_PAGE: (8 0.67360454115421 . 0.3626302083333333)
NOTER_PAGE: (9 0.13859981078524125 . 0.396484375)
NOTER_PAGE: (9 0.293282876064333 . 0.34244791666666663)
be wary of assuming that surveillance necessarily leads to totalitarian systems of control.
NOTER_PAGE: (9 0.34058656575212864 . 0.48046875)
Obviously the limitations of this method are set only by the size of the filing cards, and, theoretically, a gigantic single sheet could show the relations and cross-relationships of the entire population. And this is the utopian goal of the totalitarian secret police.’
NOTER_PAGE: (9 0.5061494796594135 . 0.19270833333333331)
Data Visualization
Most governments wish order through technology – Arendt’s view of totalitarian states is the opposite: that they wish disorder via technology since without disorder their continued existence would be in doubt. This significantly changes how we must discuss their use of technology.
NOTER_PAGE: (9 0.6433301797540208 . 0.6126302083333333)
NOTER_PAGE: (9 0.7379375591296121 . 0.26041666666666663)
to utilise e-Gov effectively, the same processing methodology which is used by Equifax, dunnhumby, etc. has to be adopted.
NOTER_PAGE: (10 0.2620624408703879 . 0.6555989583333333)
NOTER_PAGE: (10 0.4210028382213813 . 0.18815104166666666)
NOTER_PAGE: (10 0.5520340586565752 . 0.34244791666666663)
NOTER_PAGE: (11 0.38741721854304634 . 0.4095052083333333)
4. The rise of privacy protection: perception v. success
NOTER_PAGE: (12 0.19063386944181646 . 0.15885416666666666)
Such perceptions are naı̈ve: it would not be possible to gain credit at all unless there was some means for the seller to check the trustworthiness of the potential purchaser.
NOTER_PAGE: (13 0.3273415326395459 . 0.28580729166666663)
NOTER_PAGE: (15 0.5004730368968779 . 0.4700520833333333)
5. The House of Lords approaches privacy
NOTER_PAGE: (16 0.4219489120151372 . 0.15885416666666666)
(a) Privacy and breach of confidence
NOTER_PAGE: (17 0.30558183538315986 . 0.16276041666666666)
breach of confidence has been taken from the commercial field and applied to underscore chosen moralities,
NOTER_PAGE: (17 0.3415326395458846 . 0.203125)
(i) Diffused presentational control
NOTER_PAGE: (18 0.1348155156102176 . 0.154296875)
NOTER_PAGE: (18 0.18495742667928097 . 0.23697916666666666)
(ii) The ‘Gleeson test’
NOTER_PAGE: (18 0.32213812677388837 . 0.16015625)
(iii) Knowing what is ‘public’
NOTER_PAGE: (18 0.5567644276253548 . 0.15690104166666666)
NOTER_PAGE: (19 0.195837275307474 . 0.64453125)
(iv) Segmentation of personality
NOTER_PAGE: (19 0.32639545884578997 . 0.16796875)
(v) Less insight, more protection
NOTER_PAGE: (19 0.5600756859035004 . 0.16015625)
The emphasis upon individual perception through expectation results in unexpected conclusions.
NOTER_PAGE: (19 0.5813623462630085 . 0.16731770833333331)
This gives more protection to the naı̈ve (and perhaps the drunk) than it gives to those with reasonable common sense.
NOTER_PAGE: (19 0.6584673604541155 . 0.31510416666666663)
greater possibility of protection to those who prefer not to understand that technology.
NOTER_PAGE: (19 0.7384105960264901 . 0.5709635416666666)
(vi) Photographs
NOTER_PAGE: (20 0.13292336802270577 . 0.15494791666666666)
(b) The moral aspects of the judgment
NOTER_PAGE: (20 0.33964049195837276 . 0.14778645833333331)
replacing relatively complex legal principles with simplistic moral principles.
NOTER_PAGE: (20 0.40491958372753073 . 0.16015625)
should make us consider whether we want to either encourage safer roads or support privacy for drunk drivers.
NOTER_PAGE: (21 0.16887417218543047 . 0.4765625)
The privacy/anonymity model offers only a partial solution to this problem,92 since it is based on an atomised self, separated from society and only able to fully enter society when the cure is effected.
NOTER_PAGE: (21 0.6972563859981078 . 0.310546875)
‘Anonymity is bad. Everybody should be as known with their addiction as they are with their diabetes,’
NOTER_PAGE: (22 0.1357615894039735 . 0.33203125)
We should also remember that very, very few people are ever touched by large scale press intrusion.
NOTER_PAGE: (23 0.6263008514664143 . 0.2669270833333333)
6. The data protection landscape
NOTER_PAGE: (24 0.445600756859035 . 0.15625)
NOTER_PAGE: (24 0.6702932828760644 . 0.15169270833333331)
the fact that an individual has injured her foot and is on half-time on medical grounds constitutes personal data concerning health within the meaning of Article 8(1) of Directive 95/46’.
NOTER_PAGE: (24 0.7298959318826869 . 0.734375)
NOTER_PAGE: (25 0.1693472090823084 . 0.267578125)
(b) Favouring capital
NOTER_PAGE: (25 0.3358561967833491 . 0.15364583333333331)
(c) Replacing employment litigation?
NOTER_PAGE: (25 0.7199621570482497 . 0.16666666666666666)
There appears to have been no complaint from data subjects whose data was being ‘abused’ or whose ‘privacy was being invaded’ and indeed it may be that due to their personal relationship that they felt that they were also in a commercial relationship with Mr Soltysik and welcomed being approached with offers by his new company: the data subjects may well have received better and cheaper service from this company, so prosecution was not necessarily in the interests of customers.113 Instead, what appears to be happening here is that the complainant was the previous employer,
NOTER_PAGE: (26 0.33774834437086093 . 0.15625)
(d) Hiding debtors?
NOTER_PAGE: (26 0.5444654683065279 . 0.15755208333333331)
(e) Whats wrong with fiduciary relationships?
NOTER_PAGE: (27 0.4205298013245033 . 0.162109375)
(f) Chilling communications?
NOTER_PAGE: (27 0.793282876064333 . 0.16796875)
NOTER_PAGE: (28 0.2786187322611164 . 0.33203125)
7. On balance?
NOTER_PAGE: (28 0.33301797540208133 . 0.150390625)
8. Conclusion: the value of a socio-legal privacy theory
NOTER_PAGE: (28 0.5458845789971618 . 0.16080729166666666)
too often the UK courts have paid more attention to the needs of the hypersensitive than to any theoretical issues:
NOTER_PAGE: (29 0.1986754966887417 . 0.5143229166666666)
The sensitivity of ‘some’ seeming to provide all the theory required to overcome any practical or social benefit which may have arisen from the collection of anonymised prescription data.
NOTER_PAGE: (29 0.3079470198675497 . 0.16666666666666666)