scholarly journals Digital Earth Ethics

2019 ◽  
pp. 785-810 ◽  
Author(s):  
Yola Georgiadou ◽  
Ourania Kounadi ◽  
Rolf A. de By

Abstract Digital Earth scholars have recently argued for a code of ethics to protect individuals’ location privacy and human dignity. In this chapter, we contribute to the debate in two ways. First, we focus on (geo)privacy because information about an individual’s location is substantially different from other personal information. The compound word (geo)privacy suggests that location can be inferred from people’s interests, activities, and sociodemographics, not only from traditional geographic coordinates. (Geo)privacy is a claim of individuals to determine for themselves when, how, and to what extent location information about them is communicated to others. Second, we take an interdisciplinary perspective. We draw from (geo)computing to describe the transformation of volunteered, observed, and inferred information and suggest privacy-preserving measures. We also draw from organization studies to dissect privacy into ideal types of social relationships and privacy-preserving strategies. We take the point of view of Alice, an individual ‘data subject’ encountered in data protection legislation, and suggest ways to account for privacy as a sociocultural phenomenon in the future. Although most of the discussion refers to the EU and the US, we provide a brief overview of data protection legislation on the African continent and in China as well as various global and regional ethics guidelines that are of very recent vintage.

Author(s):  
Yola Georgiadou ◽  
Rolf de By ◽  
Ourania Kounadi

The General Data Protection Regulation (GDPR) protects the personal data of natural persons and at the same time allows the free movement of such data within the European Union (EU). Hailed as majestic by admirers and dismissed as protectionist by critics, the Regulation is expected to have a profound impact around the world, including in the African Union (AU). For European–African consortia conducting research that may affect the privacy of African citizens, the question is ‘how to protect personal data of data subjects while at the same time ensuring a just distribution of the benefits of a global digital ecosystem?’ We use location privacy as a point of departure, because information about an individual’s location is different from other kinds of personally identifiable information. We analyse privacy at two levels, individual and cultural. Our perspective is interdisciplinary: we draw from computer science to describe three scenarios of transformation of volunteered/observed information to inferred information about a natural person and from cultural theory to distinguish four privacy cultures emerging within the EU in the wake of GDPR. We highlight recent data protection legislation in the AU and discuss factors that may accelerate or inhibit the alignment of data protection legislation in the AU with the GDPR.


2019 ◽  
Vol 8 (3) ◽  
pp. 157 ◽  
Author(s):  
Yola Georgiadou ◽  
Rolf de By ◽  
Ourania Kounadi

The General Data Protection Regulation (GDPR) protects the personal data of natural persons and at the same time allows the free movement of such data within the European Union (EU). Hailed as majestic by admirers and dismissed as protectionist by critics, the Regulation is expected to have a profound impact around the world, including in the African Union (AU). For European–African consortia conducting research that may affect the privacy of African citizens, the question is `how to protect personal data of data subjects while at the same time ensuring a just distribution of the benefits of a global digital ecosystem?’ We use location privacy as a point of departure, because information about an individual’s location is different from other kinds of personally identifiable information. We analyse privacy at two levels, individual and cultural. Our perspective is interdisciplinary: we draw from computer science to describe three scenarios of transformation of volunteered or observed information to inferred information about a natural person and from cultural theory to distinguish four privacy cultures emerging within the EU in the wake of GDPR. We highlight recent data protection legislation in the AU and discuss factors that may accelerate or inhibit the alignment of data protection legislation in the AU with the GDPR.


Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4651
Author(s):  
Yuanbo Cui ◽  
Fei Gao ◽  
Wenmin Li ◽  
Yijie Shi ◽  
Hua Zhang ◽  
...  

Location-Based Services (LBSs) are playing an increasingly important role in people’s daily activities nowadays. While enjoying the convenience provided by LBSs, users may lose privacy since they report their personal information to the untrusted LBS server. Although many approaches have been proposed to preserve users’ privacy, most of them just focus on the user’s location privacy, but do not consider the query privacy. Moreover, many existing approaches rely heavily on a trusted third-party (TTP) server, which may suffer from a single point of failure. To solve the problems above, in this paper we propose a Cache-Based Privacy-Preserving (CBPP) solution for users in LBSs. Different from the previous approaches, the proposed CBPP solution protects location privacy and query privacy simultaneously, while avoiding the problem of TTP server by having users collaborating with each other in a mobile peer-to-peer (P2P) environment. In the CBPP solution, each user keeps a buffer in his mobile device (e.g., smartphone) to record service data and acts as a micro TTP server. When a user needs LBSs, he sends a query to his neighbors first to seek for an answer. The user only contacts the LBS server when he cannot obtain the required service data from his neighbors. In this way, the user reduces the number of queries sent to the LBS server. We argue that the fewer queries are submitted to the LBS server, the less the user’s privacy is exposed. To users who have to send live queries to the LBS server, we employ the l-diversity, a powerful privacy protection definition that can guarantee the user’s privacy against attackers using background knowledge, to further protect their privacy. Evaluation results show that the proposed CBPP solution can effectively protect users’ location and query privacy with a lower communication cost and better quality of service.


2014 ◽  
Vol 13 (6) ◽  
pp. 1315 ◽  
Author(s):  
Michelle De Bruyn

South Africa has received its own data protection legislation - the Protection of Personal Information (POPI) Act - in November 2013 and is expecting the government to appoint an Information Regulator to enforce the letter of the law. Until then, South African businesses will have time to get their house in order, but uncertainty exists as to how businesses will be affected when this happens. It is anticipated that the enforcement activities by the Information Regulator will be similar to how it is done by the Information Commissioners Office (ICO) in the United Kingdom. The ICO has been enforcing compliance with the Data Protection Act (DPA) of the United Kingdom since it obtained its enforcement powers in April 2010. This article summarises all actions taken by the ICO from April 2010 until the end of December2013 to determine the industries most affected, the contraventions with the highest frequency and, where applicable, the highest monetary fines. This article should provide some insight into what South African businesses can expect after the Information Regulator is appointed and starts to enforce the law. It will also enable them to focus their attention on the safeguarding of business areas with increased data protection risks as well as provide some counter measures that can be taken to prevent punishable contraventions.


2019 ◽  
Vol 28 (3) ◽  
pp. 399-422
Author(s):  
Adéle Da Veiga ◽  
Ruthea Vorster ◽  
Fudong Li ◽  
Nathan Clarke ◽  
Steven M. Furnell

Purpose The purpose of this study was to investigate the difference between South Africa (SA) and the United Kingdom (UK) in terms of data protection compliance with the aim to establish if a country that has had data protection in place for a longer period of time has a higher level of compliance with data protection requirements in comparison with a country that is preparing for compliance. Design/methodology/approach An insurance industry multi-case study within the online insurance services environment was conducted. Personal information of four newly created consumer profiles was deposited to 10 random insurance organisation websites in each country to evaluate a number of data privacy requirements of the Data Protection Act and Protection of Personal Information Act. Findings The results demonstrate that not all the insurance organisations honored the selected opt-out preference for receiving direct marketing material. This was evident in direct marketing material that was sent from the insurance organisations in the sample to both the SA and UK consumer profiles who opted out for it. A total of 42 unsolicited third-party contacts were received by the SA consumer profiles, whereas the UK consumer profiles did not receive any third-party direct marketing. It was also found that the minimality principle is not always met by both SA and UK organisations. Research limitations/implications As a jurisdiction with a heavy stance towards privacy implementation and regulation, it was found that the UK is more compliant than SA in terms of implementation of the evaluated data protection requirements included in the scope of this study, however not fully compliant. Originality/value Based upon the results obtained from this research, it suggests that the SA insurance organisations should ensure that the non-compliance aspects relating to direct marketing and sharing data with third parties are addressed. SA insurance companies should learn from the manner in which the UK insurance organisations implement these privacy requirements. Furthermore, the UK insurance organisations should focus on improved compliance for direct marking and the minimality principle. The study indicates the positive role that data protection legislation plays in a county like the UK, with a more mature stance toward compliance with data protection legislation.


Author(s):  
Danilo Doneda ◽  
Mario Cunha

The Brazilian National Traffic Council, in a Resolution adopted in 2006, stated that every vehicle to be sold in the country should have an RFId chip. The nature of the whole project, named SINIAV, is to assemble an infrastructure all over public roads and streets capable of recognizing and identifying vehicles. A surveillance system such as SINIAV, presented as a cutting-edge system capable of bringing security to Brazilian’s streets by reducing car’s theft, has a crucial (and political) aspect which addresses the level of security that should be developed in the IT system for the use of such database, especially in a country which does not have a specific data protection legislation. The regulation of databases of personal information is an unavoidable step to be done, as the real danger to personal liberties in an automatic surveillance system, such as this one, is not based in personal surveillance, but is related to the use of this personal data. It is not by chance that the European Union is currently discussing a new Action Plan for the Deployment of Intelligent Transport Systems in Europe. Taking into account this scenario, the current chapter analyses the SINIAV regulation from a data protection perspective.


2021 ◽  
Vol 11 (5) ◽  
pp. 332-343
Author(s):  
Szilvia Váradi

The pandemic situation caused by the SARS-CoV-2 virus has changed our lives significantly. Recent research has shown that seeking competent and advanced technological solutions to combat the COVID-19 pandemic is crucial to address not only this pandemic situation, but similar epidemics and pandemics in the future as well. However, the legal compliance of their application especially with European data protection legislation can be challenging. In this work, we would like to highlight the relevant data protection provisions of the Council of Europe and the European Union, which should be borne in mind while using digital solutions to fight against the pandemic. In the second part of our paper, we will analyse the main challenges of the three most frequently used emerging technologies from data protection point of view. As a result of our research, we can state that the main problem is to meet the requirement of data minimisation. In case the source data is not accurate, the results might be ineffective, unreliable or it may lead to data breaches. Therefore, to solve this paradox, we emphasize the importance of the data protection by design approach.


Sign in / Sign up

Export Citation Format

Share Document