{"id":63025,"date":"2014-07-18T09:09:48","date_gmt":"2014-07-18T14:09:48","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=63025"},"modified":"2014-07-18T09:09:48","modified_gmt":"2014-07-18T14:09:48","slug":"privacy-digital-age","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2014\/07\/privacy-digital-age\/","title":{"rendered":"The right to privacy in the digital age"},"content":{"rendered":"

A review of the recently published report from the United Nations High Commissioner for Human Rights on the right to privacy in the digital age<\/em><\/p>\n

\"Cam\u00e9ra<\/p>\n

Two days ago, 16 July, the United Nations (UN) High Commissioner for Human Rights, Ms. Navi Pillay, published a report on a study conducted by her office which \u201crevealed a \u2018disturbing\u2019 lack of transparency about governmental surveillance policies and practices, \u2018including de facto coercion of private sector companies to provide sweeping access to information and data relating to private individuals without the latter\u2019s knowledge or consent\u2019<\/em>\u201d (Source: Office of the High Commissioner for Human Rights (OHCHR)<\/a>). The report titled, The right to privacy in the digital age<\/em>, was requested by the UN General Assembly, following the unanimous approval of the Resolution 68\/187 \u2013 The right to privacy in the digital age<\/a>.<\/em><\/p>\n

Resolution 68\/167<\/h3>\n

Passed in December 2013, Resolution 68\/167 essentially reaffirmed and extended the right to privacy persons have offline, online. Though the General Assembly noted the concern about the need for public\/national security measures, it emphasised that unlawful, arbitrary or mass scale surveillance, or interception of communications, were highly intrusive and violated \u201cthe rights to privacy and to freedom of expression and may contradict the tenets of a democratic society<\/em>\u201d (Source: UN<\/a>).<\/p>\n

In addition to calling for countries to respect and protect the right to privacy both offline and online, the Resolution asked them to:<\/p>\n

\u2026take measures to put an end to violations of those rights and to create the conditions to prevent such violations\u2026<\/em><\/p>\n

\u2026review their procedures, practices and legislation regarding the surveillance of communications, their interception and the collection of personal data, including mass surveillance, interception and collection, with a view to upholding the right to privacy\u2026<\/em><\/p>\n

\u2026establish or maintain existing independent, effective domestic oversight mechanisms capable of ensuring transparency, as appropriate\u2026\u00a0 <\/em>(Source: UN<\/a>).<\/em><\/p><\/blockquote>\n

Select findings from OHCHR\u2019s report<\/h3>\n

The OHCHR\u2019s report is surprisingly current and insightful, and could be considered an authoritative guide for a broad range of issues that have emerged over the past several months with regard to surveillance programmes that countries worldwide have executed. Below is a cross section of topical issues that the OHCHR addressed, and the responding opinions expressed.<\/p>\n

Greater legal controls are needed to oversee digital mass surveillance<\/strong><\/p>\n

The report addresses the alleged mass surveillance activities that have been conducted by some countries. Of particular note have been the reports of activities conducted by the United States National Security Agency (NSA) within the United States (US), in Brazil and even in the Bahamas, in the Caribbean. The OHCHR suggested that greater oversight and controls may be required to ensure persons\u2019 human rights are not violated:<\/p>\n

Revelations about digital mass surveillance have, however, raised questions around the extent to which such measures are consistent with international legal standards and whether stronger surveillance safeguards are needed to protect against violations of human rights. Specifically, surveillance measures must not arbitrarily or unlawfully interfere with an individual\u2019s privacy, family, home or correspondence.\u00a0<\/em> (Source: UN<\/a>)<\/p><\/blockquote>\n

The collection or interception of metadata violates the right to privacy.<\/strong><\/p>\n

Revelations that the NSA was collecting metadata from the calls of US citizens caused a huge uproar last year, as experts were of the view that it still provided enough context for the interceptor to know some of the most intimate details of a person\u2019s life (Source: Electronic Frontier Foundation<\/a>). In the report, the OHCHR affirmed that position:<\/p>\n

\u2026it has been suggested that the interception or collection of data about a communication, as opposed to the content of the communication, does not on its own constitute an interference with privacy. From the perspective of the right to privacy, this distinction is not persuasive. The aggregation of information commonly referred to as \u201cmetadata\u201d may give an insight into an individual\u2019s behaviour, social relationships, private preferences and identity that go beyond even that conveyed by accessing the content of a private communication.\u00a0<\/em> (Source: UN<\/a>)<\/p><\/blockquote>\n

Mass surveillance programmes tend to be arbitrary<\/strong><\/p>\n

The main argument made by countries that conduct mass surveillance activities is that it helps them to ferret out a broad range of threats from then currently unknown sources. The OHCHR addressed this matter directly stressing the need for those activities not to be arbitrary, and to be the appropriately targeted, if they must be implemented:<\/p>\n

Mass or \u201cbulk\u201d surveillance programmes may thus be deemed to be arbitrary, even if they serve a legitimate aim and have been adopted on the basis of an accessible legal regime. In other words, it will not be enough that the measures are targeted to find certain needles in a haystack; the proper measure is the impact of the measures on the haystack, relative to the harm threatened; namely, whether the measure is necessary and proportionate.<\/em>\u00a0 (Source: UN<\/a>)<\/p><\/blockquote>\n

Mandatory data retention, just in case it is needed in the future, is unnecessary and disproportionate<\/strong><\/p>\n

One of the revelations by NSA whistle-blower, Edward Snowden, in June 2013, was that the US Government was storing the data it collected and intercepted indefinitely, in the event it is needed in the future. The OHCHR does not support that approach, particularly when it involved third parties:<\/p>\n

Mandatory third-party data retention \u2013 a recurring feature of surveillance regimes in many States, where Governments require telephone companies and Internet service providers to store metadata about their customers\u2019 communications and location for subsequent law enforcement and intelligence agency access \u2013 appears neither necessary nor proportionate.<\/em>\u00a0 (Source: UN<\/a>)<\/p><\/blockquote>\n

Countries ought not to be relying on secret laws to support their communications surveillance programmes<\/strong><\/p>\n

Finally, in a recent interview with Edward Snowden several weeks ago, he revealed that in the US, there are secret laws and courts \u2013 not those publicly available to all citizens \u2013 that address matters that are considered \u201ctop secret\u201d. The OHCHR expressed the view that a government\u2019s surveillance activities ought to be guided by publicly accessible law:<\/p>\n

Paragraph 2 of article 17 of the International Covenant on Civil and Political Rights explicitly states that everyone has the right to the protection of the law against unlawful or arbitrary interference with their privacy. This implies that any communications surveillance programme must be conducted on the basis of a publicly accessible law, which in turn must comply with the State\u2019s own constitutional regime and international human rights law.22 \u201cAccessibility\u201d requires not only that the law is published, but that it is sufficiently precise to enable the affected person to regulate his or her conduct, with foresight of the consequences that a given action may entail.<\/em> \u00a0 (Source: UN<\/a>)<\/p><\/blockquote>\n

 <\/p>\n

Image credit: Fr\u00e9d\u00e9ric BISSON<\/a> (flickr)<\/em><\/p>\n

________<\/p>\n","protected":false},"excerpt":{"rendered":"

A review of the recently published report from the United Nations High Commissioner for Human Rights on the right to privacy in the digital age Two days ago, 16 July, […]<\/p>\n","protected":false},"author":2,"featured_media":63028,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[7,17,11,18,22],"tags":[38,32,48,43,41],"class_list":["post-63025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-broadband","category-caribbean","category-ict-tech","category-telecoms-2","category-wireless","tag-data-protection","tag-information-society","tag-infrastructure","tag-internet-governance","tag-privacy","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2014\/07\/Cam%C3%A9ra-de-vid%C3%A9o-surveillance-by-Fr%C3%A9d%C3%A9ric-BISSON-flickr.jpg?fit=556%2C425&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-gox","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/63025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=63025"}],"version-history":[{"count":4,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/63025\/revisions"}],"predecessor-version":[{"id":63030,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/63025\/revisions\/63030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/63028"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=63025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=63025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=63025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}