- Privacy and fundamental human rights- Some example of the sources of laws (EU Chartered Fundamental Rights, UN The Universal Declaration of Human Rights) where privacy laws
came about- Privacy in real life- Privacy in cyberspace (the Internet,...)
1. INTRODUCTION
2. PRIVACY AND DATA PROTECTION INTERNATIONAL INSTRUMENTS
3. PRIVACY AND DATA PROTECTION IN ASIA: A COMPARATIVE OVERVIEW
4. SOME RECENT DEVELOPMENTSThe Right to be forgottenTrans-Pacific Partnership Agreement (TPPA) and Privacy and Data Protection IssuesData Retention
From Safe Harbour to Privacy ShieldDevelopments in Asia
Class Description 3 (by Susan Landau)
Privacy risks and Protections in an Internet context
Abstract: Why do we have privacy? How did the legal and policy
protections arise? How do they play out internationally? And how are
they applied? This tutorial will survey the history of Internet
privacy issues looking at the issues from an international context and
ending with a brief discussion of the challenges of Big Data and
privacy.
protections arise? How do they play out internationally? And how are
they applied? This tutorial will survey the history of Internet
privacy issues looking at the issues from an international context and
ending with a brief discussion of the challenges of Big Data and
privacy.
Class Description 4 (KS Park; 2017.6.30)
Privacy on the Internet has become controversial due to the unique feature of the Internet, where online information about people travel further and faster and remain publicly available longer against their will, maximizing the possible harm on their privacy interest. But any call for restricting information exchanges for reason of privacy should be moderated for reason of equality and democracy that the Internet has promoted. Before the Internet has arrived, privacy has been defined along the lines of “reasonable expectation of privacy” whereby one loses privacy right and is therefore deemed to have permitted warrantless search by law enforcement on his things, persons, and places if he or she leaves them in “plain view” of others. Europe has taken an equally draconian but opposite approach on what to do with the information disclosed to some third parties. Under that approach, all data about identifiable persons are by default to be controlled by those persons (“data subjects”) unless the balancing of interests requires otherwise. Whether we should take the American “once-public-for-all-purposes-public” approach or the European “all-data-about-me-are-mine” approach is a riddle. The arrival of the Internet has only intensified it with its vertiginous increase in the amount of information exchange among private persons and in the diversity of the manners in which the exchange takes place. Topics covered are:
- reasonable expectation of privacy
- "third party" doctrine
- probable cause and other surveillance governance
- data protection law
- GDPR
- Right to be forgotten
Class Description 5 (Chinmayi Arun)
This session will discuss some theory about the history and different articulations of the right to privacy.
It will then discuss the ways in which the architecture of the internet can protect and threaten this right.
After this questions of jurisdictional variation in privacy law will be discussed, touching significant
contemporary issues like the Privacy Shield, law enforcement and encryption, and data localisation.
The class will also discuss big data in the context of privacy.
Class Description 6 (Woodrow Hartzog; Table of Contents of His Book on Privacy)
Introduction: Designing Our Privacy Away
I. The Case for Taking Design Seriously in Privacy Law
1. Why Design Is Everything
2. Privacy Law’s Design Gap
II. A Design Agenda for Privacy Law
3. Privacy Values in Design
4. Setting Boundaries for Design
5. A Tool Kit for Privacy Design
III. Applying Privacy’s Blueprint
6. Social Media
7. Hide and Seek Technologies
8. The Internet of Things
Conclusion
Video: 2016 KAIST by Susan Landau
Lecture Pool:
Additional Candidate lecturers: Susan Landau, Chinmayi Arun, Chester Soong, Abu Bakar Bin Munir, KS Park, Woodrow Hartzog
References
APC, Rights to privacy, Internet rights are human rights, 2015. [ppt]
APEC, APEC Privacy Framework, 2015
CoE, CoE convention for protection of individuals, 1981.
A. Cooper, et atl., Privacy considerations for Internet Protocols, IRTF RFC 6973, 2013.
ePrivacy Regulation,(ePR), EC.
Facebook, Facebook opens privacy centers, 2018.1
Facebook, A Privacy-Focused Vision for Social Networking, 2019.3.
Jim Foster, APIDE – The Asia Pacific Institute for the Digital Economy, 2016.
Harvard Law Review, Privacy - If these walls could talk........, 2017.5.
Harvard Law Review, Privacy - If these walls could talk........, 2017.5.
Woodrow Hartzog, Privacy's blueprint: battle to control the design of new technologies, 2018.
ISOC, Legal Aspects, in Shaping the Internet - History and Future, 2015.
IGF, Future of Privacy, Vilnius, 2010.
IGF, Privacy in Asia, Bali, 2013.
International Association of Privacy Professionals.
Jovan Kurbalija, Introduction to Internet Governance, Diplo Foundation, 2014.
Susan Landau, Privacy risks and Protections in an Internet context, KAIST, 2016. [ppt]
A.B. Munir, et al., Personal data protection in Malaysia, 2010.
A.B. Munir, et al., Personal data protection in Malaysia, 2010.
A.B. Munir, et al., Data protection laws in Asia, 2015.
A.B. Munir, Privacy in Asia: The Changing Regulatory Landscape, HIIG, Berlin, Germany, 2015.9.7.
A.B. Munir, Japan's New Framework and Privacy in Asia, Multi-Stakeholder Forum on Privacy, Japan, 2016.3.10.
A.B. Munir, Biography, 2016.
NITRD, National Privacy Research Strategy, 2016.7.1
Carly Nyst, The Right to Privacy, APC, 2015.
OECD, Evolving privacy landscape: 30 yeaers after the OECD privacy guidelines, 2010.
NITRD, National Privacy Research Strategy, 2016.7.1
Carly Nyst, The Right to Privacy, APC, 2015.
OECD, Evolving privacy landscape: 30 yeaers after the OECD privacy guidelines, 2010.
KS Park, Privacy, Data,....., 2015.
Reuter, Facebook loses a privacy case in Belgium, 2018.2.
Safe Harbour Agreement.
Bruce Schneier, On Internet privacy, be very afraid, (interview with Harvard Gazetta), 2017.08
Time Sleath, Demystifying the language of privacy, Ad Age, 2016.12.22.
Time Sleath, Demystifying the language of privacy, Ad Age, 2016.12.22.
White House, National Private Research Strategy, 2016.
White House, Big data and privacy, 2014.
White House, Big data and privacy, 2014.