21.07.2013 Views

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

Civil Liberties and Security in Cyberspace - Hoover Institution

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Hoover</strong> Press : Cyber DP5 HPCYBE0500 06-11-:1 11:53:04 rev1 page 189<br />

<strong>Civil</strong> <strong>Liberties</strong> <strong>and</strong> <strong>Security</strong> <strong>in</strong> <strong>Cyberspace</strong><br />

189<br />

privacy is not explicitly guaranteed by the constitution—the United<br />

States, Irel<strong>and</strong>, <strong>and</strong> India, for example—this right has been established<br />

through other legal provisions or judicial rul<strong>in</strong>gs. 10<br />

The advent of <strong>in</strong>formation technology provided a new context <strong>in</strong><br />

which to consider privacy <strong>and</strong> a new legal impetus for the protection<br />

of personal data. The first modern legislation on collect<strong>in</strong>g <strong>and</strong> h<strong>and</strong>l<strong>in</strong>g<br />

personal data emerged <strong>in</strong> the early 1970s <strong>in</strong> Sweden (1973) <strong>and</strong><br />

the United States (1974). 11 The Organization for Economic Cooperation<br />

<strong>and</strong> Development (OECD) was the first <strong>in</strong>ternational organization<br />

to issue a policy, “Guidel<strong>in</strong>es on the Protection of Privacy <strong>and</strong><br />

Transborder Flows of Personal Data,” adopted <strong>in</strong> 1980 (see Figure 1).<br />

The OECD’s policy applies to personal data, whether <strong>in</strong> the public or<br />

private sectors, that pose a danger to privacy <strong>and</strong> <strong>in</strong>dividual liberties<br />

because of their nature or the manner <strong>in</strong> which they are processed <strong>and</strong><br />

used. 12<br />

Development of <strong>in</strong>ternational st<strong>and</strong>ards cont<strong>in</strong>ued <strong>in</strong> the 1980s<br />

<strong>and</strong> 1990s. The Council of Europe (COE) adopted a “Convention for<br />

the Protection of Individuals with regard to the Automatic Process<strong>in</strong>g<br />

of Personal Data” (1981) <strong>and</strong> “Guidel<strong>in</strong>es on the Use of Computerized<br />

10. The 1995 U.S. Department of State review on human rights practices reported<br />

that 110 countries guaranteed the right to privacy <strong>in</strong> their constitutions. See David<br />

Banisar, “U.S. State Department Reports Worldwide Privacy Abuses,” excerpts from<br />

“U.S. Department of State Country Reports on Human Rights Practices for 1995,”<br />

Privacy International, available at www.privacy.org/pi/reports/1995_hranalysis.<br />

html. The 1999 survey by the Electronic Privacy Information Center (EPIC) (“Privacy<br />

<strong>and</strong> Human Rights: An International Survey of Privacy Laws <strong>and</strong> Developments”)<br />

updated this count to nearly every country <strong>and</strong> reported that at least 55 countries do<br />

not have constitutional provisions on privacy but establish protections through other<br />

legal means. For a discussion of privacy law <strong>in</strong> the U.S., see Robert Gellman, “Does<br />

Privacy Law Work?” <strong>in</strong> Philip E. Agre <strong>and</strong> Marc Rotenberg, eds., Technology <strong>and</strong><br />

Privacy: The New L<strong>and</strong>scape (Cambridge, Mass.: MIT Press, 1998), pp. 193–218.<br />

11. Ulrich Sieber, “Legal Aspects of Computer-Related Crime <strong>in</strong> the Information<br />

Society—COMCRIME-Study—prepared for the European Commission,” Version<br />

1.0 (January 1, 1998), Section I.B.2.a, “Protection of Privacy,” pp. 62–64.<br />

12. “Implement<strong>in</strong>g the OECD Privacy Guidel<strong>in</strong>es <strong>in</strong> the Electronic Environment:<br />

Focus on the Internet,” Group of Experts on Information <strong>Security</strong> <strong>and</strong> Privacy, OECD,<br />

DSTI/ICCP/REG(97)6/FINAL, pp. 6–10.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!