The Right to be Forgotten: Standard on Deleting the Exposed Personal Information on the Internet

Author(s):  
Hee Joo Lee ◽  
Jang Ho Yun ◽  
Hyun Sik Yoon ◽  
Kyung Ho Lee
Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


Author(s):  
Hans Graux ◽  
Jef Ausloos ◽  
Peggy Valcke

Author(s):  
Cãlin Gurau

The Privacy Journal (2003), a print newsletter and Web site devoted to privacy matters, defines the present-day use of the word privacy as “the right of individuals to control the collection and use of personal information about themselves.” Similar definitions are provided by law specialists (Gavison, 1980; Warren & Brandies, 1890). The networked society changes the way in which privacy rights are defined, used and interpreted, because: a. The IT-enabled channels of communication change the rules of personal and commercial interaction; b. The participation in the networked society implies a diminishing of individual privacy rights. The fundamental principle of the networked society is information sharing and processing (Kling & Allen, 1996). Advances in computing technology—that represents the infrastructure of the networked society—make possible to collect, store, analyze, and retrieve personal information created in the process of participation. The manifestation and the protection of individual privacy rights represent the field of conflict between various disciplines and social events. The heterogeneous nature of this phenomenon is mirrored in this paper, which aims to present the complex nature of privacy rights in the context of the networked society. The study proposes a negotiating model of online privacy rights, and analyses the necessary conditions for the implementation of this model on the Internet. The new economy is redefined on the basis of information entrepreneurism (Kling & Allen, 1996; Zwick & Dholakia, 1999). This cultural paradigm emphasizes the use of data-intensive analysis techniques for designing and implementing effective marketing and management strategies. This has as a direct consequence the use of an information superpanopticon–a concept derived from Foucault’s panopticon, a system of perfect surveillance and control. Online privacy is a major concern for Internet users (Ackerman, Cranor, & Reagle, 1999). For the individual Internet user, the privacy threats fall into two main categories: a. Web tracking devices that collect information about the online behavior of the user (e.g., cookies); b. The misuse of the personal information provided by the online user in exchange of specific benefits: increased personalization, Web group membership, etc. The databases, intelligent agents and tracking devices are surrounding the Internet users with a Web of surveillance, which is often hidden and unknown to the users. The surveillance is initiated by the simple act of presence on the Internet. Specialized software applications, such as cookies are tracking the online behavior of Internet users, feeding the data into databases, which create and permanently update a profile of online consumers. These profiles are then used for segmenting the market and targeting the most profitable consumers. A company can use cookies for various valid reasons: security, personalization, marketing, customer service, etc., however, there is an important distinction between cookies, which are active only within a specific Web site, and the ones that can track the user’s activity across unrelated Web sites. Recently, some aggregator networks have deployed hidden ‘pixel beacon’ technology that allows ad-serving companies to connect unrelated sites and overcome the site-specific nature of traditional cookies (Mabley, 2000). Additionally, some companies are now connecting this aggregated data with offline demographic and credit card data. Eventually, these resulting databases can be used or sold as powerful marketing tools. Exercising control of information, after it was voluntarily released, presents another critical problem. The misuse of personal information covers many possible aspects, which can be defined as any use which is not explicitly defined in the company’s privacy disclaimer, or which is not approved by the informed customer. For example, in 2000, Toysurus.com was subject to intense debate and controversy, when it was discovered that shoppers’ personal information was transferred through an unmarked Internet channel to a data processing firm, for analysis and aggregation. This operation was not disclosed in the company’s privacy disclaimer, and therefore, online customers were not aware of it. Regulators and legislators have addressed the controversial privacy issue quite differently across the world (Nakra, 2001). The USA, the largest world’s financial and Internet market, has not yet adopted a national, standard-setting privacy law (Jarvis, 2001). U.S. privacy statutes have primarily focused so far on protecting consumers’ financial data, health information, and children’s personal information (Desai, Richards, & Desai, 2003; Frye, 2001). In comparison with the American official opinion that online privacy protection is a matter of voluntary self-regulation by market-driven companies, the Europeans consider that it is more effective to enforce specific legislation regarding this issue. The current European approach is based on three basic tenets: 1. Individuals have the right to access any data relating to them and have it kept accurate and up-to-date; 2. Data cannot be retained for longer than the purpose for which it was obtained, nor used or disclosed “in a matter incompatible with that purpose”, and must be kept only for “lawful purposes”; 3. Those who control data have “a special duty of care” in relation to the individuals whose data they keep. Data commissioners oversee these rights in each European country and require most “data controllers”—people who handle data—to register with them to track what information is being collected and where. They are charged also with investigating all complaints from citizens. These principles have been incorporated in the European Data Directive, which came into effect in 1998, and more recently, in the European Directive on Privacy and Electronic Communications, adopted in 2002. Despite these legislative efforts, it is not yet clear how effective are the measures implemented by EU States. The direct involvement of governmental institutions can be considered as a form of censorship that can undermine the freedom and the flexibility of the Internet domain.


2014 ◽  
pp. 1975-1989
Author(s):  
Maria Giannakaki

The globalization and ubiquitous character of information in the era of social media and cloud computing has led to a loss of control over individuals' own data, who face significant difficulties to understand and measure the consequences of the disclosure of their personal information on the Internet, as well as the means and the context in which they are or will be processed. Under the reviewing process of the EU Data Protection Directive, the “right to be forgotten” appears to be the means by which individuals will be able to regain control over their data. However, implementing the new right in the ICT environment and striking the proper balance between conflicting rights, such as the freedom of expression, will not be easy. The purpose of the chapter is to identify the challenges that Web 2.0, Web 3.0, and cloud computing technologies raise, focusing on how these challenges are addressed under the new “right to be forgotten” and providing an insight of the alternative “quasi legal” measures that emerge.


Author(s):  
Anabelen Casares Marcos

The right to informational self-determination has raised bitter debate over the last decade as to the opportunity and possible scope of the right to demand withdrawal from the internet of personal information which, while true, might represent a detriment that there is no legal duty to put up with. The leading case in this topic is that of Mario Costeja, Judgment of the EU Court of Justice, May 13, 2014. The interest of recent European jurisprudence lies not so much in the recognition of such a right but in the appreciation of certain limits to its implementation, assisting data protection authorities in balancing the rights at stake in each case. Reflection on the current status of the issue considers rights and duties imposed in the matter by Regulation (EU) 2016/679, of 27 April, known as the new General Data Protection Regulation.


Author(s):  
Jamal Barafi ◽  
Ali Hadi Al-Obeidi

Abstract The development of the Internet and mass media has facilitated access to information and freedom of expression in unprecedented ways, but in so doing there have been many violations, especially of the right to privacy. Such violations have led to calls for the establishment of the right to be forgotten. In this paper, we focus on clarifying the concept of the right to be forgotten and the conditions for establishing this. Moreover, we consider the European approach to the right to be forgotten (RTBF), showing how different European instruments have been employed to recognize this right, such as recommendations, regulations, and directives, in order to coordinate national efforts on this issue. In addition, this paper will analyze the stance of some national Arabic legislation regarding the RTBF.


Author(s):  
Oleh M. Omelchuk ◽  
Mariia P. Muzyka ◽  
Mykola O. Stefanchuk ◽  
Iryna P. Storozhuk ◽  
Inna A. Valevska

The rapid spread of the Internet and communication technologies raises the issue of access to information, especially access to information via the Internet. The amount of information on the network is constantly increasing, and at the same time more and more efforts are being made to limit users' access to it to some extent. The more restrictions state bodies create in this area, the more efforts are made to circumvent or violate these prohibitions. Free access to information in a democratic society should be the rule, and restriction of this right – the exception. These restrictions should be clearly defined by law and applied only in cases where legitimate and vital interests, such as national security and privacy, need to be respected. The main purpose of this study is to consider the legal and socio-philosophical aspects of access to information. Restricting access to documents as media has been practiced since ancient times. The study highlights the existing inconsistencies and lags in the implementation of the principles of exercise of the right to information in Ukraine at the level of laws and subordinate legislation. The study classifies information according to the nature of restrictions (exercise) of constitutional rights and freedoms in the information sphere. It was discovered that the legislation of Ukraine does not systematise the list of confidential information in a single regulation in contrast to the Russian Federation and provides the main types of confidential personal information. It was found that restrictions on any freedoms and human rights, including in the information space, can be established with the help of various regulators, the dominant among which are the following levels of implementation: legal (legislative); moral self-consciousness of society; autonomy of the person. Features and spheres of action of regulators of restriction of freedoms and human rights are described. To restrict access to information, various methods are used to protect it from unauthorised receipt, which can be divided into two groups: formal and informal


Sign in / Sign up

Export Citation Format

Share Document