0% found this document useful (0 votes)
1 views45 pages

PGDIM-Data Protection and Privacy

The document discusses the regulation and control of personal information, emphasizing the impact of computerization on data storage and privacy concerns. It highlights the relationship between data protection and privacy, noting the challenges posed by the Internet and the need for effective regulatory strategies. Additionally, it outlines principles for data handling, including collection limitation, data quality, use limitation, security safeguards, and individual participation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views45 pages

PGDIM-Data Protection and Privacy

The document discusses the regulation and control of personal information, emphasizing the impact of computerization on data storage and privacy concerns. It highlights the relationship between data protection and privacy, noting the challenges posed by the Internet and the need for effective regulatory strategies. Additionally, it outlines principles for data handling, including collection limitation, data quality, use limitation, security safeguards, and individual participation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 45

Regulation and control of personal

information

Data Protection, defamation and related


issues
Introduction

•At the end of the twentieth centaury there


can be very few people who remain
unaware of the dramatic impact which
increasing computerization has had on the
storage, processing, retention and release
of information and data.

•Computerization has revolutionized the


handling and processing of information to
such an extent that the data itself has now
become a commodity which possesses
commercial value and can be traded on the
market in the same way as any other
commodity.
•The value to businesses is also enhanced
by the fact that data can be transferred
around the globe with great ease.

•Personal data has been collected and held


for a multitude of purpose throughout
history with the consequent possibility of
inappropriate or unauthorized use or
disclosure.

•To quote Earl Ferrers, “(T)he collection of


personal data is as old as society itself.
•It may not be the oldest profession but it
is one of the oldest habits.

•A number of strands of concern emerge –


the potential for abuse of organizational
records, the incidental and often unwitting
transfer of personal data.

•It is the issues raised by these factors


which will form the subject matter of this
chapter.
Data protection and privacy

•The discussion thus far has tacitly


assumed that the reader is aware of what
is meant by data protection and its
relationship and interrelationship with the
concept of privacy – a term even more
elusive of definition.

•Since the first formulation of best practice


at the beginning of the 1980s, many of the
existing guideline seem to either assume a
connection or appear to use the terms
interchangeable.
•Thus the Council of Europe Convention …
whose declared object is to “strengthen
data protection” then sets out in the article
1 that the purpose of the Convention is to
“secure (the) right to privacy with regard to
automatic processing of data”.

•Such an apparently close relationship


between data protection and privacy
seems to have created a stumbling block in
the legislative consciousness of the UK
because of the lack of legal protection for
privacy per se in this jurisdiction
•Although one of the antecedents of the
data protection legislation in the UK , the
Report of the Younger Committee on
Privacy, conceded that increasing
computerization could threaten privacy,
the subsequent report of the Lindop
Committee on Data Protection attempted
to distinguish the two whilst at the same
time agreeing that data protection could
perhaps be equated with “information
privacy”.
•Recent decision of the Data Protection
Tribunal it was said that “(A)n underlying
purpose of the data protection principles is
to protect privacy with respect to the
processing of personal data – a verbatim
quote from article 1 of the Data Protection
Directive.

•Further , both holders of the post of Data


Protection Registrar to data have viewed
their role as primarily one of the protecting
individuals rights.
•In 1994, the first Data Protection
Registrar, Eric Howe, said in his final
report: “…data protection legislation is
about the protection of individuals rather
than the regulation of industry.

•It is civil rights legislation rather than


technical business legislation, a declaration
which might have seemed almost heretical
in 1984.
•The matter might have been finally
resolved with the implementation in the UK
of the EC Directive on Data protection but,
notwithstanding the tenor of article 1 of the
data directive, the Data Protection Act
1998 never actually makes mention of the
word “privacy” and it is clear from a
number of debates in Parliament during the
passage of the legislation that the
connection between data protection and
privacy is not accepted by all sides of the
debates.
The impact of the Internet

•The original challenge of data protection


law was to provide a suitable mechanism
for dealing with the perceived threat to
individual privacy of large centralized data
banks and with abuse of information
management made possible by techniques
such as data matching.

•It has been suggested that “(T)he


development of global information network
has changed and intensified the character
of the privacy protection problem”.
•The question which is inevitably being
asked is whether the original formulation of
data protection law is capable of
controlling the amorphous decentralized
activities which occur through the medium
of the Internet and World Wide Web .

•In contrast to the situation for which data


protection law was developed, this medium
has no identifiable “data controller” in
whom responsibility for safeguarding
privacy can be invested.
•Of particular concern is the traceability of
operations performed via on-line services
together with a lack of general principles
relating to the dissemination of information
and protection of personal privacy.

•One central feature of the development of


global networks such as the Internet is that
a number of common features such as the
ability to leave “navigation trails”, the
existence of privileged websites, the use of
“cookies” to capture and retain information
about users and so on may effectively
replicate other data matching processes.
•A further issue, as in many other branches
of information technology law, is that of
jurisdiction.

•Here the issue is one of correlation of


personal data between organizations within
the same jurisdiction, this may be dealt
with appropriately by existing data
protection legislation.

•The fact that data protection legislation


usually contains provisions prohibiting
trans-border data flow under certain
conditions may also be useful in situation
Factors influencing the regulation of
data processing

•From the European or UK perspective, it is


easy not to question the use of
conventional legal devices to regulate this
area.

•Legislation imposing sanctions backed up


by action in courts and tribunals has, for a
number of reasons, been the method
chosen or imposed on these jurisdictions.
•Formidable problems of policy and
implementation are presented by the
attempt to regulate systems and practices
that are technologically advanced, widely
dispersed, rapidly changing and employed
by powerful economic and government
interests.

•Taking such factors into account, which


regulatory strategy will be the most
effective – the “top-down” approach of
legislative intervention or the “bottom-up”
approach of sectoral self-regulation? The
use of such terminology implies conflicting
philosophies, but it would , in fact, be
misleading to imagine that these
Younger principles

1. Information should be regarded as held for


a specific purpose and should not be used
without appropriate authorization for other
purposes.

2. Access to information should be confined


to those authorized to have it for the
purpose for which it was supplied.

3. The amount of information collected and


held should be the minimum necessary for
4. In computerized systems handling
information for statistical purposes,
adequate provision should be made in
their design and programs for
separating identities from the rest of
the data.

5. There should be arrangements whereby


the subject could be told about the
information held concerning him.

6. The level of security to be achieved by


a system should be specified in
advance by the user and should include
precautions against deliberate abuse or
7. A monitoring system should be
provided to facilitate the detection of
any violation of the security system

8. In the design of information systems,


period should be specified beyond
which the information should not be
retained.

9. Data held should be accurate. There


should be machinery for the correction
of inaccuracy and the updating of
information.

10. Care should be taken in coding value


Name of Principles Requirement of Principles

Collection Limitation There should be limits to the collection


Principles of personnel data should be obtained
by lawful and fair means and, where
appropriate, with the knowledge or
consent of the data subject.

Data Quality principles Personal data should be relevant to the


purposes for which they are to be used, an, t
the extent necessary for those purposes,
should be accurate, complete and kept up-to
date

Use Limitation Principle Personal data should not be


disclosed, made available or otherwise used
for purposes other
than those specified in accordance with the
purpose Specification Principle except: (a)
with
the consent of the data subject: or (b) by the
authority of law
Name of Principles Requirement of Principles

Security Safeguards Personal data should be protected by


Principles reasonable security safeguards against
such risk as loss or unauthorized
access, destruction, use,
modification or disclose of data

Openness Principles There should be general policy opennes


about developments, practices and
policies
with respect top personal data. Means
should
be readily available of establishing the
existence and nature of personal data.
and the main purpose of their use, as
well
as the identify and usual residence of th
data usual residence of the data
Name of Principles Requirement of Principles

Individual Participation An individual should have the


right:
Principle (a) to obtain from a data controller, or
otherwise, confirmation of
whether or not
the data controller has data relating to
him; (b) to have communicated to hi,
data
relating top him: within a reasonable
time;
at a charge, if any, that is not excessive
in a reasonable time; at a charge, if
manner;
and in a form that is readily intelligible
to him; (c) to be given if a request made
under subparagraphs (a) and (b) is
denied,
and (d) to challenge data relating to him
Name of Principles Requirement of Principles

Accountability Principle data controller should be


accountable
for complying with measures which give
effect to the principles stated bove

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy