Information Technology Reference
In-Depth Information
3
Conclusion
The rate of recent growth and development of ICTs results in the breakdown of a
system dominated by a normative approach and normative barriers. This development
has simultaneously discarded the myth of technology neutral law, as it is obvious that
the regulator has always a particular technology in mind as well as a specific cultural
understanding of the world and how technology will work in this world.
Protection of privacy must be achieved through rather than despite technology
[10]. The transposition of legal demands into technical standards is a first condition
for successful privacy protection [9]. However abandoning the law and the protection
to technology is no less dangerous, as experts and market driven forces lack the de-
mocratic legitimization to define and enforce privacy interests and rights. Technology
and law must be the fruit of interaction between regulator, technologists and users.
The future of privacy on electronic communications is destined to be a mix of regula-
tion, specified privacy policies and user empowerment through user-friendly
PETs [1].
References
1. Albert, J.: Privacy on the Internet: Protecting and Empowering Users, EC Conference, Data
Protection Conference on the Implementation of 95/46/EC, Workshop 2: Developments in
the Information Society: Internet and Privacy Enhancing Technologies (2002)
2. Broughon, J., Eft, K.: Security and privacy risks of doing business on the Web,
http://istpub.berkeley.edu:4201/bcc/Summer2000/
3. Data Protection Working Party, Privacy on the Internet - An integrated EU Approach to
online Data Protection (2000)
4. Dinant, J.M.: The arrival of the new Internet network numbering system and its major risks
to data protection, 23rd Int. Conference on Privacy and Personal Data Protection, (2001).
5. Flaherty, D.: Privacy Impact Assessments: an essential tool for data protection, 22nd Inter-
national Conference on Privacy and Personal Data Protection, Venice (2000).
6. Gritzalis, D., Moulinos, K., Kostis, K.: “A Privacy-Enhancing e-business Model Based on
Infomediaries”, Workshop on Mathematical Methods, Models, and Architectures for Com-
puter Networks Security, St. Petersburg, Russia (2001)
7. OECD, Guidelines for the Security of Information Systems and Networks, Paris (2002)
8. Privacy International, Working Paper on Data Retention presented at EU Forum on Cyber-
crime (2001), http://www.privacyinternational.org/issues/cybercrime/eu
9. Reidenberg, J.: Lex Informatica: The Formulation of Information Policy Rules Through
Technology, Texas Law Review, Vol. 86 Nr. 3 (1998)
10. Roßnagel, A., Pfitzmann, A., Garstka, H.: Modernisierung des Datenschutzrechts, Gutach-
ten im Auftrag des Bundesministerium des Innern, Berlin (2001)
11. Schwartz, P.: Privacy and Democracy in Cyberspace, Vanderbilt Law Rev., Vol. 52: 1609
Search WWH ::




Custom Search