Law enforcement and data privacy: difficulties to accommodate
1
Citation
0
Reference
20
Related Paper
Cite
New technologies permit online businesses to reduce expenses and increase efficiency by, for example, storing information in “the cloud”, engaging in online tracking and targeted advertising, location and tracking technologies, and biometrics. However, the potential for technology to facilitate long term retention of customers’ personal information raises concerns about the competing right of individuals to the privacy of their personal information.Although the European Commission has recently released a proposal for regulation to “provide a data subject with the right to be forgotten and to erasure,” neither the OECD Privacy Guidelines nor the APEC Privacy Framework includes any requirement to delete personal information. While New Zealand includes a “limited retention principle” in the Privacy Act 1993, apart from one limited exception the privacy principles cannot be enforced in court. Taking New Zealand privacy law as an example, this paper examines the issue of retention of customer data, explains why this is a serious problem and argues that although it could be addressed by appropriate amendments to domestic laws, domestic privacy legislation may not be sufficient in an online environment. In the same way as other areas of law, such as the intellectual property regime, have turned to global regulatory standards which reflect the international nature of their subject matter, international privacy regulation should be the next stage for the information privacy regime.
Data retention
Privacy software
Consumer privacy
Cite
Citations (0)
Pace
Privacy software
Public security
Cite
Citations (34)
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
Cite
Citations (0)
The controversial PRISM programme has unveiled a global reality of trans-border law enforcement access to private sector data, triggered by data storage via cloud computing services providers, which offer the storage and maintenance of data in data centres located all over the world. Law enforcement agencies are indeed increasingly targeting foreign cloud computing service providers. This reality poses challenges to both state interests and individual rights: it disturbs the relations between sovereign states and causes legal uncertainty as regards the applicable privacy and data protection standards for law enforcement access to personal data and metadata.
Cite
Citations (0)
This paper introduces key issues to the balance between data collection policies and privacy protection initiatives in an internationally unstructured legal framework. The right to privacy has been addressed and construed differently among jurisdictions, which leads to uncertainties regarding the cross-boarding data collection operations that often occur in the cyberspace. This paper focuses on the jurisprudence of the Brazilian Supreme Court, demonstrating (i) that the traditional approach given to privacy in Brazil is not accurate enough to deal with the new threats which arise in the cyberspace; (ii) that the concept of privacy should be redefined when applied to the cyberspace and; (iii) that differences among national privacy legislations challenge international compliance with regard to the right to privacy.
Privacy software
Cite
Citations (0)
The diffusion of video technology means that law enforcement will increasingly have streaming video feeds from in-car and body-worn cameras that may be monitored to help protect the safety of officers and bystanders. This report examines the potential of such technologies while weighing the challenges they pose, the innovation that they need to be ideally developed and implemented, and the civil liberties protections required by their use.
Civil Liberties
Privacy Rights
Cite
Citations (4)
Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the “privacy enforcement gap”—the disparity between the privacy on the books, and the privacy on the ground.
Privacy Protection
Cite
Citations (5)
Cite
Citations (0)
Laws now in effect in the United States grant certain privacy rights to individual citizens vis-a-vis federal agencies, state government agencies in several states, and certain organizations in the private sector that maintain personal information on them in automated record-keeping systems. Pending are bills to extend privacy protection to the entire private sector. Implementation of privacy protection requirements involves numerous technical considerations that are discussed in this paper. Unless these technical aspects and their limitations are taken into account when the privacy protection requirements are legislated, implementation of the requirements may turn out to be technically infeasible or economically unacceptable and, correspondingly, protection provided may be largely illusory.
Privacy Protection
Cite
Citations (1)
The authors discuss the privacy implications surrounding Intelligent Transportation Systems (ITS) in the United States. As ITS becomes more widely used in collecting and compiling data into the transportation infrastructure via emerging surveillance technologies, the concern is that the data can be either misused or abused. To explore this further, the authors examine various privacy law areas, including: 1) constitutional privacy protection, 2) reasonable privacy expectations, 3) privacy rights, 4) criminal liability and 5) tort law use in privacy violations, Besides discussing the legal implications of ITS technologies, the authors also present a ‘legal toolbox and taxonomy” to aid ITS developers.
Toolbox
Privacy software
Cite
Citations (5)