Program‎ > ‎

5.2 Privacy

Class Description 1 (by Chester Soong)

 - Privacy and fundamental human rights
 - Some example of the sources of laws (EU Chartered Fundamental Rights, UN The Universal Declaration of Human Rights) where privacy laws
   came about
 - Privacy in real life
 - Privacy in cyberspace (the Internet,...)

Class Description 2 (by Abu Bakar Bin Munir - Course on Privacy and Data Protection Module)
    The Right to be forgotten
            Trans-Pacific Partnership Agreement (TPPA) and Privacy and Data Protection Issues
Data Retention
   From Safe Harbour to Privacy Shield
   Developments in Asia

Class Description 3 (by Susan Landau)

    Privacy risks and Protections in an Internet context
        Abstract: Why do we have privacy? How did the legal and policy
        protections arise?  How do they play out internationally? And how are
        they applied?  This tutorial will survey the history of Internet
        privacy issues looking at the issues from an international context and
        ending with a brief discussion of the challenges of Big Data and

Class Description 4 (KS Park; 2017.6.30)

Privacy on the Internet has become controversial due to the unique feature of the Internet, where online information about people travel further and faster and remain publicly available longer against their will, maximizing the possible harm on their privacy interest.  But any call for restricting information exchanges for reason of privacy should be moderated for reason of equality and democracy that the Internet has promoted.  Before the Internet has arrived, privacy has been defined along the lines of “reasonable expectation of privacy” whereby one loses privacy right and is therefore deemed to have permitted warrantless search by law enforcement on his things, persons, and places if he or she leaves them in “plain view” of others.  Europe has taken an equally draconian but opposite approach on what to do with the information disclosed to some third parties.  Under that approach, all data about identifiable persons are by default to be controlled by those persons (“data subjects”) unless the balancing of interests requires otherwise.  Whether we should take the American “once-public-for-all-purposes-public” approach or the European “all-data-about-me-are-mine” approach is a riddle.  The arrival of the Internet has only intensified it with its vertiginous increase in the amount of information exchange among private persons and in the diversity of the manners in which the exchange takes place.  Topics covered are:

- reasonable expectation of privacy
- "third party" doctrine
- probable cause and other surveillance governance 
- data protection law
- Right to be forgotten

Class Description 5 (Chinmayi Arun)

This session will discuss some theory about the history and different articulations of the right to privacy. 
It will then discuss the ways in which the architecture of the internet can protect and threaten this right.
After this questions of jurisdictional variation in privacy law will be discussed, touching significant 
contemporary issues like the Privacy Shield, law enforcement and encryption, and data localisation. 
The class will also discuss big data in the context of privacy. 

Class Description 6 (Woodrow Hartzog; Table of Contents of His Book on Privacy)

    Introduction: Designing Our Privacy Away

    I. The Case for Taking Design Seriously in Privacy Law

    1. Why Design Is Everything

    2. Privacy Law’s Design Gap

    II. A Design Agenda for Privacy Law

    3. Privacy Values in Design

    4. Setting Boundaries for Design

    5. A Tool Kit for Privacy Design

    III. Applying Privacy’s Blueprint

    6. Social Media

    7. Hide and Seek Technologies

    8. The Internet of Things


Video:  2016 KAIST by Susan Landau

Lecture Pool:  
Additional Candidate lecturers: Susan Landau, Chinmayi Arun, Chester Soong, Abu Bakar Bin Munir, KS Park, Woodrow Hartzog

  APC, Rights to privacy, Internet rights are human rights, 2015. [ppt]
  APEC, APEC Privacy Framework, 2015
  CoE, CoE convention for protection of individuals, 1981.
  A. Cooper, et atl., Privacy considerations for Internet Protocols, IRTF RFC 6973, 2013.
  ePrivacy Regulation,(ePR), EC. 
  Facebook, Facebook opens privacy centers, 2018.1
  ISOC, Legal Aspects, in Shaping the Internet - History and Future, 2015.
  IGF, Future of Privacy, Vilnius, 2010.
  IGF, Privacy in Asia, Bali, 2013.
  International Association of Privacy Professionals.
  Jovan Kurbalija, Introduction to Internet Governance, Diplo Foundation, 2014.
  Susan Landau, Privacy risks and Protections in an Internet context, KAIST, 2016. [ppt]
  A.B. Munir, et al., Personal data protection in Malaysia, 2010.
  A.B. Munir, et al., Data protection laws in Asia, 2015.
  A.B. Munir, Privacy in Asia: The Changing Regulatory Landscape, HIIG, Berlin, Germany, 2015.9.7.
  A.B. Munir, Japan's New Framework and Privacy in Asia, Multi-Stakeholder Forum on Privacy, Japan, 2016.3.10.
  KS Park, Privacy, Data,....., 2015.
  Safe Harbour Agreement.
  Bruce Schneier, On Internet privacy, be very afraid, (interview with Harvard Gazetta), 2017.08
  Time Sleath, Demystifying the language of privacy, Ad Age, 2016.12.22.
  White House, National Private Research Strategy, 2016.
  White House, Big data and privacy, 2014.