Privacy and Protection of Personal Integrity in the Working Place

Size: px
Start display at page:

Download "Privacy and Protection of Personal Integrity in the Working Place"

Transcription

1 Privacy and Surveillance Technology Interdisciplinary Perspectives ZiF Centre for Interdisciplinary Research University of Bielefeld, Germany February 10-11, 2006 Gordana Dodig-Crnkovic Department of Computer Science and Electronics Mälardalen University Sweden Privacy and Protection of Personal Integrity in the Working Place 1

2 CONTENTS INTRODUCTION PRIVACY DEFINITIONS MONITORING AND SURVEILLANCE SURVEILLANCE TOOLS LEGISLATION WHOSE RESPONSIBILITY? THE UNIVERSAL CORE VALUES FOUND ACROSS CULTURES TRUST AND WORKPLACE PRIVACY INVENTING SOCIALLY DANGEROUS TECHNOLOGY ETHICS OF TRUST LEGITIMACY BY DESIGN AND TRUSTWORTHY COMPUTING CONCLUSIONS 2

3 PRIVACY Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948). 3

4 WHAT I LEARNED THUS FAR? Michael: privacy as a social construct Vincent: if humans are not involved, privacy can not be breached Philip: privacy operationalized how to do something Nadia: radical translation? privacy its meaning in post 9/11, balancing or managing priorities Nuala: Identity question at the core of the problem establishing identity Charles Raab: public policy perspective need for more academic research alongside action research privacy as a public good, essential for society at large, not only for an individual 4

5 PRIVACY One of characteristics of private is it is not official. Nevertheless, we expect a certain degree of privacy even in the most official situations. 5

6 INTRODUCTION Disappearance of boundaries between private and professional life: - ubiquitous computing and - ambient intelligence Privacy protection vs. surveillance of employees 6

7 MONITORING AND SURVEILLANCE TOOLS Closed Circuit Television (CCTV) Night vision system Smart cards Telephone taps Computer usage ( monitoring,, Internet monitoring and filtering, instant message monitoring, keystroke logging) Cellular radio/satellite interception Radio Frequency Identification (RFID) Location monitoring... 7

8 COMPUTERS AS TOOLS FOR MONITORING AND SURVEILLANCE Storage Searching, Sorting, Simulation the four basic S s of computing technology makes it unprecedented tools for monitoring and surveillance 8

9 Face Fingerprint / Palm Print Hand and Finger Geometry Handwriting Iris Voice/Speaker Retinal Multimodal 9

10 SPECIFIC METHODS OF WORKER SURVEILLANCE Packet-sniffing software can intercept, analyze, and archive all communications on a network, including employee e-e mail, chat sessions, file sharing, and Internet browsing. Employees who use the workplace network to access personal e accounts not provided by the company are not protected. Their private accounts, as long as they are accessed on workplace network or phone lines, can be monitored. Keystroke loggers can be employed to capture every key pressed on a computer keyboard. These systems will even record information is typed and then deleted. Phone monitoring is pervasive in the American workplace as well. Some companies employ systems automatically monitor call content and breaks between receiving calls. 10

11 SPECIFIC METHODS OF WORKER SURVEILLANCE Video surveillance is also widely deployed. In a number of cases, video surveillance has been used in employee bathrooms, rest areas, and changing areas. Video surveillance, might be acceptable where the camera focuses on publicly-accessible areas. However, installment in areas where employees or customers have a legitimate expectation of privacy, such as inside bathroom stalls, can give the employee a cause of action under tort law. 11

12 SPECIFIC METHODS OF WORKER SURVEILLANCE "Smart" ID cards can track an employee's location while she moves through the workplace. By using location tracking, an employer can even monitor whether employees spend enough time in front of the bathroom sink to wash their hands. New employee ID cards can even determine the direction the worker is facing at any given time. Psychometric or aptitude testing to evaluate potential employees: Such tests purport to assess intelligence, personality traits, religious belief, character, and skills. 12

13 SPECIFIC METHODS OF WORKER SURVEILLANCE Telecommuting Employees who labor remotely from the workplace encounter different privacy challenges. For instance, how can the employer monitor the employee's home without impinging upon non-work work-related related activities? What limits are there to prevent surveillance of the employee during off- hours? What about information collected about non-employee family members who may use work equipment? 13

14 LEGISLATION The Universal Declaration of Human Rights Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. UN s s International Covenant on Civil and Political Rights (ICCPR) 14

15 LEGISLATION The Council of Europe's 1981 Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data The Organization for Economic Cooperation and Development's Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data 15

16 LEGISLATION PRIVACY AND HUMAN RIGHTS Report Personal Information must be: obtained fairly and lawfully, used only for the original specified purpose, adequate, relevant and not excessive to purpose, accurate and up to date, and destroyed after its purpose is completed 16

17 FAIR INFORMATION PRACTICES APPLIED BY INTERNATIONAL LABOUR ORGANIZATION Employees should have notice of data collection processes. Data should be collected and used lawfully and fairly. Employers should collect the minimum necessary data required for employment. Data should only be collected from the employee, with informed consent. c Data should only be used for reasons directly relevant to employment, ment, and only for the purposes for which the data were originally collected. ed. Data should be held securely. Workers should have access to data. Data should not be transferred to third parties absent consent or to comply with a legal requirement. Workers cannot give up their privacy rights. Medical data is confidential. Certain data, such as sex life and political and religious beliefs, should not be collected. Certain collection techniques, such as polygraph testing, should be prohibited. 17

18 WORKPLACE PRIVACY ISSUES Fair information practices in relation to employee personal data,, especially in relation to: application of OECD Guidelines-conformant principles and processes; care with sensitive data, such as medical information; balanced procedures in relation to evaluative materials; Surveillance of activities using employer-provided provided facilities: at the level of keystroke-rate; rate; at the level of application usage; traffic analysis (e.g. telephone-numbers numbers called and called from, correspondents, web-sites visited) content analysis (e.g. messages and telephone converstions,, content of web-pages visited); Fair dealings by employers (trustworthiness).. A fundamental concern has been that the behaviour of some employers is inconsistent with their policy statements, e.g. some state that they do not monitor, when in fact they do; 18

19 WORKPLACE PRIVACY ISSUES Intrusions into privacy of the person,, such as: substance-abuse abuse testing; polygraph ('lie-detector') testing;... Intrusions into privacy of personal behaviour, such as: audio surveillance; telephone-number number monitoring; telephone conversation monitoring; video surveillance;... 19

20 WHOSE RESPONSIBILITY? AGENCY AND SURROGATE AGENCY The layers of trust, Kainulainen (2001): Individual - machine Individual - individual Individual - (machine) - individual Individual - identifiable small groups (social aspect) Individual - groups/organizations (authority, higher levels of hierarchy and abstraction) Group group Johnson and Powers (2004) study the problem of the responsibility of (autonomous) agents which are used as role or "surrogate" mediators 20

21 WHY VALUE PRIVACY? PRIVACY AND DEMOCRACY In intruding on privacy, which is closely related to freedom and autonomy, surveillance can be considered to have, ultimately, a negative effect on democracy. 21

22 THE UNIVERSAL CORE VALUES FOUND ACROSS CULTURES Caring for children; Trust; Prohibitions against murder. having the following effects: Assuring the continuity of population in terms of number of individuals and ways of behavior; Respecting the commonly accepted set of rules, which provides predictability and stable relationships; Preventing the extinction of the population. (Lawrence M. Hinman,, University San Diego) 22

23 TRUSTWORTHINESS AND WORKPLACE PRIVACY Parallels between Computer Ethics and Medical Ethics: Francis (1993) in the section Ethics of Trust vs. Ethics of Rights discusses autonomy, informed consent and the rights of patients. Basically, the relation between a specialist and a lay- person is of power and subjection and must be grounded on mutual trust. 23

24 THE DESIGN OF COMPUTER SYSTEMS Historically an unconditional trust on the part of the general public in the inherent goodness of technology has been shown to be unwarranted. 24

25 THE DESIGN OF COMPUTER SYSTEMS The design of computer systems has not historically been organized in a democratic way. Designers and users have had little interaction, and users have had little control over the resulting systems, except perhaps through the indirect routes available to them through resistance in the workplace and the refusal to purchase relatively unusable systems for their own use. 25

26 THE DESIGN OF COMPUTER SYSTEMS Yet over the last ten or twenty years, a growing movement, originating in Scandinavia but now increasingly influential in other industrialized countries, is attempting to reform the design of computer systems in a more democratic direction (Bjerknes( Bjerknes, Ehn, and Kyng 1987, Schuler and Namioka 1993). Agre (1994) 26

27 THE DESIGN OF COMPUTER SYSTEMS Technology can go a long way toward protecting the privacy of individuals, but we also need a legal framework to ensure technology isn't outlawed (Bernstein: /.) We can't protect privacy through case law, and self-regulation hasn't worked. Deborah Pierce 27

28 INVENTING SOCIALLY DANGEROUS TECHNOLOGY 1. Build it as safe as you can, and build into it all the safeguards to personal values you can imagine. 2. Tell the world at large you are doing something dangerous. Weiser,,

29 CODES OF ETHICS (Primarily Targeting Designers) ACM (Association for Computing Machinery) BSC (British Computer Society) IEEE (Institute( of Electrical and Electronics Engineers) DataForum CF (Civilingenjörsf rsförbundet) rbundet) 29

30 A PRIVACY CULTURE Whether or not privacy is protected by law or contract, fostering a workplace culture where privacy is valued and respected contributes to healthy human relations, and makes good business sense. 30

31 LEGITIMACY BY DESIGN AND TRUSTWORTHY COMPUTING The first phase of the intentional design for democracy is the explication of the embedded moral significance of ICT while the next is the development of the corresponding technology (Yu( and Cysneiros,, 2002). The existing analyses of the state of the art of privacy issues worldwide (fifty countries in ) bear witness to how much work remains to be done. 31

32 LAYERS OF TRUSTWORTHINESS Trust in the intent of designers Trust in the quality of workmanship Trust in the users 32

33 ETHICS OF TRUST Trust is like the glue holds society together -- without it, we crumble into tiny isolated pieces collide randomly with one another. In a world without trust, individuals cannot depend on one another; as a result, individuals can only be out for themselves. Hinman (2002) 33

34 CONCLUSIONS TRUSTWORTHINESS must be established in the use of ICT, where both users and the technology will be trustworthy. This in the first place presupposes the INFORMED CONSENT of all the parties involved. This trust must be established GLOBALLY because the data contained in networked computers virtually knows no boundaries. 34

35 References Gordana Dodig-Crnkovic Privacy and Protection of Personal Integrity in the Working Place Privacy and Surveillance Technology Interdisciplinary Perspectives - Workshop at ZiF Centre for Interdisciplinary Research, University of Bielefeld, Germany, February 10-11, 2006 Gordana Dodig-Crnkovic, Virginia Horniak Good to Have Someone Watching Us from a Distance? Privacy vs. Security at the Workplace; Ethics of New Information Technology, Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry, CEPE 2005 July 17-19, 19, 2005, University of Twente, Enschede, The Netherlands ; Brey P,Grodzinsky F and Introna L. Eds. 35

36 The Ethics of Workplace Privacy Sven Ove Hansson og Elin Palm Peter Lang Bruxelles s. Bogomtale fra forlaget. In recent years, new and more intrusive surveillance technology has found its way into workplaces. New medical tests provide detailed information about workers' biology that was previously unthinkable. An increasing number of employees work under camera surveillance. At the same time, computers allow for a detailed monitoring of our interactions with machines, and all this information can be electronically stored in an easily accessible format. What is happening in our workplaces? Has the trend towards more humane workplaces been broken? From an ethical point of view, which types and degrees of surveillance are acceptable, and which are not? From a policy point of view, what methods can be used to regulate the use u of surveillance technology in workplaces? These are some of the questions that have driven the research reported in this book. Written by an interdisciplinary group of researchers in Computer Ethics, Medical Ethics and Moral Philosophy, this book provides a broad overview that covers both empirical and normative aspects of workplace privacy. 36

CDT Annual Dinner. Center for Democracy and Technology, Washington. 10 March 2015

CDT Annual Dinner. Center for Democracy and Technology, Washington. 10 March 2015 CDT Annual Dinner Center for Democracy and Technology, Washington 10 March 2015 It s a great honour to be with you all for the CDT Annual Dinner, or as it is affectionately known, the Tech Prom. I m afraid

More information

European Charter for Access to Research Infrastructures - DRAFT

European Charter for Access to Research Infrastructures - DRAFT 13 May 2014 European Charter for Access to Research Infrastructures PREAMBLE - DRAFT Research Infrastructures are at the heart of the knowledge triangle of research, education and innovation and therefore

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Privacy and Security in Europe Technology development and increasing pressure on the private sphere Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development

More information

Castan Centre for Human Rights Law Faculty of Law, Monash University. Submission to Senate Standing Committee on Economics

Castan Centre for Human Rights Law Faculty of Law, Monash University. Submission to Senate Standing Committee on Economics Castan Centre for Human Rights Law Faculty of Law, Monash University Submission to Senate Standing Committee on Economics Inquiry into the Census 2016 Melissa Castan and Caroline Henckels Monash University

More information

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?

More information

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence

The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert

More information

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...

More information

Professional Ethics in Software Engineering Curricula

Professional Ethics in Software Engineering Curricula Cross-disciplinarity in Engineering Education 3rd CeTUSS Workshop CEMUS and IEEE Nordic Education Society Chapter Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC

More information

ISO/TR TECHNICAL REPORT. Intelligent transport systems System architecture Privacy aspects in ITS standards and systems

ISO/TR TECHNICAL REPORT. Intelligent transport systems System architecture Privacy aspects in ITS standards and systems TECHNICAL REPORT ISO/TR 12859 First edition 2009-06-01 Intelligent transport systems System architecture Privacy aspects in ITS standards and systems Systèmes intelligents de transport Architecture de

More information

CILIP Privacy Briefing 2017

CILIP Privacy Briefing 2017 CILIP Privacy Briefing 2017 Tuesday 28 November 2017 #CILIPPrivacy17 Privacy, surveillance and the information profession: challenges, qualifications, and dilemmas? David McMenemy, Lecturer and Course

More information

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017 Biometric Data, Deidentification and the GDPR E. Kindt Cost1206 Training school 2017 Overview Introduction 1. Definition of biometric data 2. Biometric data as a new category of sensitive data 3. De-identification

More information

EU Research Integrity Initiative

EU Research Integrity Initiative EU Research Integrity Initiative PROMOTING RESEARCH INTEGRITY IS A WIN-WIN POLICY Adherence to the highest level of integrity is in the interest of all the key actors of the research and innovation system:

More information

Wireless Environments & Privacy

Wireless Environments & Privacy Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist

More information

Privacy Policy SOP-031

Privacy Policy SOP-031 SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF

More information

Interoperable systems that are trusted and secure

Interoperable systems that are trusted and secure Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,

More information

Ethics Guideline for the Intelligent Information Society

Ethics Guideline for the Intelligent Information Society Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines

More information

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

NCRIS Capability 5.7: Population Health and Clinical Data Linkage

NCRIS Capability 5.7: Population Health and Clinical Data Linkage NCRIS Capability 5.7: Population Health and Clinical Data Linkage National Collaborative Research Infrastructure Strategy Issues Paper July 2007 Issues Paper Version 1: Population Health and Clinical Data

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best

More information

What does the revision of the OECD Privacy Guidelines mean for businesses?

What does the revision of the OECD Privacy Guidelines mean for businesses? m lex A B E X T R A What does the revision of the OECD Privacy Guidelines mean for businesses? The Organization for Economic Cooperation and Development ( OECD ) has long recognized the importance of privacy

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Security culture and information technology, SECURIT. Jonas Hallberg

Security culture and information technology, SECURIT. Jonas Hallberg Security culture and information technology, SECURIT Jonas Hallberg www.foi.se/securit Information security Information security includes social as well as technical aspects Information security culture

More information

About the Office of the Australian Information Commissioner

About the Office of the Australian Information Commissioner Australian Government Office of the Australian Information Commissioner www.oaic.gov.au GPO Box 5218 Sydney NSW 2001 P +61 2 9284 9800 F +61 2 9284 9666 E enquiries@oaic.gov.au Enquiries 1300 363 992 TTY

More information

The 45 Adopted Recommendations under the WIPO Development Agenda

The 45 Adopted Recommendations under the WIPO Development Agenda The 45 Adopted Recommendations under the WIPO Development Agenda * Recommendations with an asterisk were identified by the 2007 General Assembly for immediate implementation Cluster A: Technical Assistance

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business. Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1 Ethics, Technology, Sustainability and Social Issues in Business Name Institutional Affiliation ETHICS, TECHNOLOGY, SUSTAINABILITY AND

More information

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Lecture 7 Ethics, Privacy, and Politics in the Age of Data Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc

More information

WIPO Development Agenda

WIPO Development Agenda WIPO Development Agenda 2 The WIPO Development Agenda aims to ensure that development considerations form an integral part of WIPO s work. As such, it is a cross-cutting issue which touches upon all sectors

More information

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION 28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 2 ND & 3 RD NOVEMBER 2006 LONDON, UNITED KINGDOM CLOSING COMMUNIQUÉ The 28 th International Conference of Data Protection and

More information

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES Michael Friedewald, Fraunhofer ISI istockphoto.com/marco Volpi Panel on Privacy: Appraising challenges to technologies and ethics @ CPDP 2012 Brussels, 25

More information

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017 The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing

More information

Heaven and hell: visions for pervasive adaptation

Heaven and hell: visions for pervasive adaptation University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2011 Heaven and hell: visions for pervasive adaptation Ben Paechter Edinburgh

More information

Artificial intelligence & autonomous decisions. From judgelike Robot to soldier Robot

Artificial intelligence & autonomous decisions. From judgelike Robot to soldier Robot Artificial intelligence & autonomous decisions From judgelike Robot to soldier Robot Danièle Bourcier Director of research CNRS Paris 2 University CC-ND-NC Issues Up to now, it has been assumed that machines

More information

Computer Challenges to emerge from e-science

Computer Challenges to emerge from e-science Computer Challenges to emerge from e-science Malcolm Atkinson (NeSC), Jon Crowcroft (Cambridge), Carole Goble (Manchester), John Gurd (Manchester), Tom Rodden (Nottingham),Nigel Shadbolt (Southampton),

More information

Ethical Framework for Elderly Care-Robots. Prof. Tom Sorell

Ethical Framework for Elderly Care-Robots. Prof. Tom Sorell Ethical Framework for Elderly Care-Robots Prof. Tom Sorell ACCOMPANY- Acceptable robotic COMPanions for AgeiNg Years ACCOMPANY Website http://accompanyproject.eu/ Context Quickly growing and longer surviving

More information

Fraunhofer ISI Seite 1

Fraunhofer ISI Seite 1 Seite 1 A"NEW"WAY"OF"LOOKING"AT"PRIVACY" Michael"Friedewald,"Fraunhofer"ISI" istockphoto.com/marco Volpi Why"privacy"is" important" "at"least"in"western" countries! Philosophically,! Part of human dignity

More information

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific

More information

Foreword The Internet of Things Threats and Opportunities of Improved Visibility

Foreword The Internet of Things Threats and Opportunities of Improved Visibility Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks

More information

Photography and Videos at School Policy

Photography and Videos at School Policy Photography and Videos at School Policy Last updated: 25 May 2018 Contents: Statement of intent 1. Legal framework 2. Definitions 3. Roles and responsibilities 4. Parental consent 5. General procedures

More information

Stakeholders Acting Together On the ethical impact assessment of Research and Innovation

Stakeholders Acting Together On the ethical impact assessment of Research and Innovation Stakeholders Acting Together On the ethical impact assessment of Research and Innovation WWW.SATORIPROJECT.EU Stakeholders Acting Together On the ethical impact assessment of Research and Innovation The

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending

More information

Vision. The Hague Declaration on Knowledge Discovery in the Digital Age

Vision. The Hague Declaration on Knowledge Discovery in the Digital Age The Hague Declaration on Knowledge Discovery in the Digital Age Vision New technologies are revolutionising the way humans can learn about the world and about themselves. These technologies are not only

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

COMMUNICATION SCIENCE MASTER S PROGRAMME

COMMUNICATION SCIENCE MASTER S PROGRAMME COMMUNICATION SCIENCE MASTER S PROGRAMME OUR WORLD YOUR POTENTIAL OUR PROGRAMME PROGRAM FOR TODAY 1. 2. 3. 4. 5. THIS IS YOU THIS IS THIS IS OUR COMMUNICATION PROGRAMME SCIENCE THIS IS OUR WORLD CAREER

More information

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02 STATUS : December 1, 2015 DES C R I P T I O N Type : Internal Document Date : 01/12/2015 Revision : 02 CODE OF CONDUCT. Page 2/7 MESSAGE FROM THE CHAIRMAN AND THE CEO Dear all, The world is continually

More information

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics Position Paper: Ethical, Legal and Socio-economic Issues in Robotics eurobotics topics group on ethical, legal and socioeconomic issues (ELS) http://www.pt-ai.org/tg-els/ 23.03.2017 (vs. 1: 20.03.17) Version

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

The BGF-G7 Summit Report The AIWS 7-Layer Model to Build Next Generation Democracy

The BGF-G7 Summit Report The AIWS 7-Layer Model to Build Next Generation Democracy The AIWS 7-Layer Model to Build Next Generation Democracy 6/2018 The Boston Global Forum - G7 Summit 2018 Report Michael Dukakis Nazli Choucri Allan Cytryn Alex Jones Tuan Anh Nguyen Thomas Patterson Derek

More information

Metrology in the Digital Transformation

Metrology in the Digital Transformation Metrology in the Digital Transformation This project proposal is about to establish a European metrology data infrastructure, a European Metrology Cloud to support the processes of conformity assessment

More information

Privacy Policy Framework

Privacy Policy Framework Privacy Policy Framework Privacy is fundamental to the University. It plays an important role in upholding human dignity and in sustaining a strong and vibrant society. Respecting privacy is an essential

More information

Science, Values and Trust Building Public Support for Today s Aquaculture

Science, Values and Trust Building Public Support for Today s Aquaculture Science, Values and Trust Building Public Support for Today s Aquaculture Charlie Arnot Charlie.Arnot@Foodintegrity.org www.foodintegrity.org Charlie_Arnot Earning and Maintaining the Social License (Sapp/CMA)

More information

End-to-End Privacy Accountability

End-to-End Privacy Accountability End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT)

COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT) SHS/COMEST-10EXT/18/3 Paris, 16 July 2018 Original: English COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT) Within the framework of its work programme for 2018-2019, COMEST

More information

Draft proposed by the Secretariat

Draft proposed by the Secretariat UNESCO comprehensive study on Internet-related issues: draft concept paper proposed by the Secretariat for consultations Abstract: This draft paper, proposed by UNESCO s Secretariat, outlines the concept

More information

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.

This policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation. Privacy Notice August 2018 Introduction The General Data Protection Regulation (GDPR) is European wide data protection legislation that requires organisations working with individuals based in the European

More information

Information Societies: Towards a More Useful Concept

Information Societies: Towards a More Useful Concept IV.3 Information Societies: Towards a More Useful Concept Knud Erik Skouby Information Society Plans Almost every industrialised and industrialising state has, since the mid-1990s produced one or several

More information

Scenario Planning edition 2

Scenario Planning edition 2 1 Scenario Planning Managing for the Future 2 nd edition first published in 2006 Gill Ringland Electronic version (c) Gill Ringland: gill.ringland@samiconsulting.co.uk.: this has kept to the original text

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles

More information

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO 17-007 SUBJECT: TITLE: Administration SOP Revision-04-05-07 Social Media 04-05-08 Digital Imagery Implementation Office of the Chief PURPOSE:

More information

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015)

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) PURPOSE To provide library customers and staff with a statement of philosophy and the key objectives respecting

More information

Human Centered Production in Cyber- Physical Production Systems. Case study Croatia

Human Centered Production in Cyber- Physical Production Systems. Case study Croatia Human Centered Production in Cyber- Physical Production Systems Case study Croatia Prof. Ivica Veža Faculty of Electrical Engineering, Mechnical Engineering and Naval Architecture FESB, University of Split,

More information

Protection of Privacy Policy

Protection of Privacy Policy Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,

More information

Mellor Community Primary School Policy for Photographs and Photography

Mellor Community Primary School Policy for Photographs and Photography Mellor Community Primary School Policy for Photographs and Photography Introduction Photography in schools is subject to the Data Protection Act 1998 regarding the rights of individuals to have information

More information

The Social Impact of Pervasive Technologies

The Social Impact of Pervasive Technologies The Social Impact of Pervasive Technologies Anne Clarke European Management Services, Leeds, UK clarkeam@compuserve.com Abstract Large scale deployment of communications technologies has produced major

More information

Internet, Human Rights and privacy

Internet, Human Rights and privacy PhotoPhoto: SerenityRosePhoto: SerenityRose. CC BY- NC 2.0. Internet, Human Rights and privacy Jeanette Hofmann WZB/HIIG (Berlin) IV Fórum da Internet no Brasil/Pré IGF Brasileiro São Paulo, 25th April

More information

Legal Aspects of Identity Management and Trust Services

Legal Aspects of Identity Management and Trust Services Legal Aspects of Identity Management and Trust Services Anna Joubin-Bret Secretary What is Identity Management (IdM)? Fundamental issue for the use of electronic means Answers the basic questions: Who

More information

Artificial Intelligence (AI) and Patents in the European Union

Artificial Intelligence (AI) and Patents in the European Union Prüfer & Partner Patent Attorneys Artificial Intelligence (AI) and Patents in the European Union EU-Japan Center, Tokyo, September 28, 2017 Dr. Christian Einsel European Patent Attorney, Patentanwalt Prüfer

More information

The new deal of data in the data-driven person centric-care

The new deal of data in the data-driven person centric-care The new deal of data in the data-driven person centric-care Maritta Perälä-Heape, Professor of practice, University of Oulu, Faculty of Medicine, Center for health and technology, Oulu, Finland OuluHealth

More information

Re: Review of Market and Social Research Privacy Code

Re: Review of Market and Social Research Privacy Code http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 31 August 2012 Dr Terry Beed Chair Independent Code Review Panel AMSRO Dear Terry Re: Review of Market and

More information

Lumeng Jia. Northeastern University

Lumeng Jia. Northeastern University Philosophy Study, August 2017, Vol. 7, No. 8, 430-436 doi: 10.17265/2159-5313/2017.08.005 D DAVID PUBLISHING Techno-ethics Embedment: A New Trend in Technology Assessment Lumeng Jia Northeastern University

More information

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan

More information

International initiatives in data sharing: OECD, CODATA and GICSI. Yukiko Fukasaku Innovmond Padova 21 September 2007

International initiatives in data sharing: OECD, CODATA and GICSI. Yukiko Fukasaku Innovmond Padova 21 September 2007 International initiatives in data sharing: OECD, CODATA and GICSI Yukiko Fukasaku Innovmond Padova 21 September 2007 OECD Recommendation with Principles and Guidelines on Access to Research Data from Public

More information

Towards Trusted AI Impact on Language Technologies

Towards Trusted AI Impact on Language Technologies Towards Trusted AI Impact on Language Technologies Nozha Boujemaa Director at DATAIA Institute Research Director at Inria Member of The BoD of BDVA nozha.boujemaa@inria.fr November 2018-1 Data & Algorithms

More information

Striving for Excellence. Ark Oval Primary Academy

Striving for Excellence. Ark Oval Primary Academy Striving for Excellence Ark Oval Primary Academy DIGITAL STILLS AND VIDEO IMAGES POLICY 2015 0 Policy for Photographs and Photography Introduction Photography in schools is subject to the Data Protection

More information

2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break

2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break POWER CONFERENCE ETHICS SESSION Amy Kalb, DSW FORMAT OF SESSION Part 1: Changes to the Code of Ethics Break Part 2: Strategies for Addressing Ethical Dilemmas Break Part 3: Practice Session Small group

More information

Technology and Normativity

Technology and Normativity van de Poel and Kroes, Technology and Normativity.../1 Technology and Normativity Ibo van de Poel Peter Kroes This collection of papers, presented at the biennual SPT meeting at Delft (2005), is devoted

More information

Langdon Winner: Frankenstein s Problem and Technology as Legislation

Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner Political theorist at Rensselaer Polytechnic Institute Best-known books: Autonomous Technology: Technics Out-of-Control

More information

Social Media, information and communication technologies: Part 3

Social Media, information and communication technologies: Part 3 Social Media, information and communication technologies: Part 3 Providing social work services online/remotely This guideline will focus on the ethical considerations for social workers when using technology

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Country Paper : Macao SAR, China

Country Paper : Macao SAR, China Macao China Fifth Management Seminar for the Heads of National Statistical Offices in Asia and the Pacific 18 20 September 2006 Daejeon, Republic of Korea Country Paper : Macao SAR, China Government of

More information

Rulemaking Hearing Rules of the Tennessee Department of Health Bureau of Health Licensure and Regulation Division of Emergency Medical Services

Rulemaking Hearing Rules of the Tennessee Department of Health Bureau of Health Licensure and Regulation Division of Emergency Medical Services Rulemaking Hearing Rules of the Tennessee Department of Health Bureau of Health Licensure and Regulation Division of Emergency Medical Services Chapter 1200-12-01 General Rules Amendments of Rules Subparagraph

More information

summary Background and scope

summary Background and scope Background and scope The Royal Academy is issuing the report Trust in Science 1 in response to a request for advice by the Dutch State Secretary for Education, Culture and Science. The State Secretary

More information

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard 1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/

More information

2018 / Photography & Video Bell Lane Primary School & Children s Centre

2018 / Photography & Video Bell Lane Primary School & Children s Centre 2018 / 2019 Photography & Video Use @ Bell Lane Primary School & Children s Centre Bell Lane Primary School & Children s Centre Responsible: Headteacher & Governing Body Last reviewed: Summer 2018 Review

More information

Social: The Ethics of Pervasive Games

Social: The Ethics of Pervasive Games Social: The Ethics of Pervasive Games Mobile and Ubiquitous Games ICS 163 Donald J. Patterson Content adapted from: Pervasive Games: Theory and Design Experiences on the Boundary between Life and Play

More information

Machines can learn, but what will we teach them? Geraldine Magarey

Machines can learn, but what will we teach them? Geraldine Magarey Machines can learn, but what will we teach them? Geraldine Magarey The technology AI is a field of computer science that includes o machine learning, o natural language processing, o speech processing,

More information

OUR WORLD YOUR POTENTIAL OUR PROGRAMME

OUR WORLD YOUR POTENTIAL OUR PROGRAMME COMMUNICATION SCIENCE MASTER PROGRAMME OUR WORLD YOUR POTENTIAL OUR PROGRAMME PROGRAM FOR TODAY 1. 2. 3. 4. 5. THIS IS YOU THIS IS THIS IS OUR COMMUNICATION PROGRAMME SCIENCE THIS IS OUR WORLD CAREER PROSPECTS

More information

What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics

What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics Why Should We Care? Volume of health research is increasing more researchers, more

More information

clarification to bring legal certainty to these issues have been voiced in various position papers and statements.

clarification to bring legal certainty to these issues have been voiced in various position papers and statements. ESR Statement on the European Commission s proposal for a Regulation on the protection of individuals with regard to the processing of personal data on the free movement of such data (General Data Protection

More information

GUIDELINES SOCIAL SCIENCES AND HUMANITIES RESEARCH MATTERS. ON HOW TO SUCCESSFULLY DESIGN, AND IMPLEMENT, MISSION-ORIENTED RESEARCH PROGRAMMES

GUIDELINES SOCIAL SCIENCES AND HUMANITIES RESEARCH MATTERS. ON HOW TO SUCCESSFULLY DESIGN, AND IMPLEMENT, MISSION-ORIENTED RESEARCH PROGRAMMES SOCIAL SCIENCES AND HUMANITIES RESEARCH MATTERS. GUIDELINES ON HOW TO SUCCESSFULLY DESIGN, AND IMPLEMENT, MISSION-ORIENTED RESEARCH PROGRAMMES to impact from SSH research 2 INSOCIAL SCIENCES AND HUMANITIES

More information

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service 1 Legitimate interest of the controller or a third party: General description of the processing environment Users can commence the registration required for using the MOL LIMO service in the Mobile Application

More information

AI AS A FORCE OF GOOD

AI AS A FORCE OF GOOD AI AS A FORCE OF GOOD Mariarosaria Taddeo Digital Ethics Lab - Oxford Internet Institute, University of Oxford Alan Turing Institute, London @RosariaTaddeo AI Definition Outline AI Challenges Ethics for

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information