scholarly journals The right of information privacy between the challenges of technology and the reality of legal protection: الحق في الخصوصية المعلوماتية بين تحديات التقنية وواقع الحماية القانونية

Author(s):  
Ben Qara Mustafa Aisha

This study aimed to identify the international, regional and even national efforts to protect the rights and privacy of the individual from the impact of informatics, and the extent to which it succeeded in achieving this. To achieve this, the researcher used the analytical method by explaining the new technical challenges to personal data and various legal mechanisms to protect this right. The research was based on an introduction, two papers and a conclusion. The first topic was entitled "What is the privacy of informatics and the dangers it faces in the digital age", while the second topic is devoted to international and regional efforts to protect information privacy. The results of the study showed that most of the legislations, especially the Arab ones, are not able to deal with violations of personal data, and concluded that new legal rules must be enacted to protect information privacy, based on established international principles in the field of informatics.

2021 ◽  
Vol 03 (02) ◽  
pp. 60-67
Author(s):  
Assia BOUAMRA

The new millennium has brought about profound developments in society, reaching all fields through which means of communication have become, as a result of the digital revolution, basic pillars for the growth of countries' economies, which has affected the traditional human lifestyle socially, economically and culturally, and it became necessary to update the current legal arsenal to match the new bets, as the law Not in isolation from developments in the technological arena, it has become necessary to frame these technologies in order to protect the individual and society alike, as it is wrong to ignore the thesis of the effects of cyberspace on society and the law.


2019 ◽  
Vol 34 (5) ◽  
pp. 1487-1490
Author(s):  
Merisa Çeloaliaj

Actuality, recent, has made us witnesses of rapid technological developments, as part of the globalization process, which inevitably affect to our lives.Technological developments facilitate our day-to-day life starting from the most common aspects and advancing at the speed of light to more complex processes that the human mind would not have been able to solve in the same space of time and with the same resources utilized. Free movement, downloading different apps on our smartphones, shopping online or the registering on social networks are just some of the activities that each of us performs daily, often without being aware of what brings these activities together is actually an action, which is legally called "processing of personal data of the individual".Often with the help of technology, private companies and public authorities collect personal information from clients, services receivers or ordinary citizens and they use it to an unprecedented extent in the pursuit of their activities and goals. The protection of personal data of individuals is in fact a fundamental right, which is sanctioned by a legislation of particular importance in international and domestic law.Even in the Albanian legal order, the right to protection of personal data is sanctioned by a specific legal corpus. In the context of the particular importance of the sensitivity that personal data bears, the European Union has adopted the GDPR, an improved act that reinforces the level of protection of the individual against bureaucracy and rapid technological developments.This modest paper focuses on the impact of this regulation in Albania on public and private legal entities that collect and process personal data.How will the GDPR affect, as an act focusing on respect for private and family life, housing and communications, personal data protection, free thought, conscience and religion, freedom of expression and information, freedom to perform business, the right to effective protection and fair trial in terms of cultural, religious and linguistic diversity, decision-making and activity of various entities in the Republic of Albania?The structure of this paper includes in the introductory section a brief history of the relevant legal acts, goes on to explain some specific terms and addresses important aspects of the impact on legal entities of the latest European Union regulation in the field of protection of personal data.


2020 ◽  
Vol 1 (3) ◽  
pp. 1-23
Author(s):  
José Poças Rascão

This article reflects on freedom of expression, privacy, ethical and social responsibility, in the context of social networks, in the context of the experience of democracy in cyberspace. It asks questions about ensuring the protection of privacy, freedom, and autonomy of internet users in the internet environment. It identifies national and international legislation that guarantee the right to privacy and the protection of citizens' personal data. It reviews the literature on the concept of ethics and social responsibility, in democracy, in the digital age, associating this domain of knowledge with the concept of privacy, freedom, and ethical and social responsibility, in the context of social networks. The article discusses the concepts that guide this theme and that are directly involved with related domains. It is alert to the need for ethical and legal protection of the digital data of internet users, aiming at the autonomous safeguarding of their digital identities.


Author(s):  
Vitalii Serohin

The paper attempts to expose the basic concepts of informational privacy reflected in Western jurisprudence, as well as to outline the author's vision of the content and scope of informational privacy, to distinguish the relevant powers from which this right consists, to reveal its place and role from the standpoint of system-structural approach. It is noted that in the modern scientific literature, dedicated to ensuring the privacy and respect for his / her privacy, clearly distinguishes two main approaches to understanding the informational advantage - broad and narrow. Proponents of the narrow approach consider the primes solely in the informational aspect, and other constituents (physical, visual, phonetic privacy, etc.) tend to relate to the content of other fundamental rights. However, one group of authors interprets information privacy as the right of the person to control their personal data, while the second group considers it more rational and efficient to consider information pricing as the right of ownership of personal data. Attempting to unite both camps of supporters of a narrow interpretation of the information front is the Restricted Access / Limited Control (RALC) theory. Proponents of the broad-based approach view information primacy as important, but only one of the many substantive elements of constitutional law in favor. At the same time, the authors' exit beyond the information sphere when considering the content of the precedence can be considered progressive and more consistent with the essence of this right and its purpose in ensuring personal freedom and autonomy. In view of the author, revealing the content of the right to privacy, it should be borne in mind that the object of this right includes several areas (aspects), in each of which a person may be in different states of privacy, and the privacy itself has certain measurements. On this basis, information is regarded by the author as an element of the constitutional right of privacy, distinguished by the aspects of privacy and the form (method) of its objectification. Unlike other aspects of privacy, the informational aspect is detached from the physical body of the individual and exists independently, and relevant information continues to exist even after the death of the individual. Therefore, even the death of a person does not make sense of the information associated with that person, and sometimes even enhances its value and significance. It is noted that unlike other aspects of the case, information privacy has no states (such as loneliness, intimacy, anonymity, etc.); it merely provides information protection for such states and does not allow them to be disclosed without the consent of the entity itself.


Laws ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 40
Author(s):  
Susana Mosquera

During the COVID-19 pandemic, many governments established important restrictions on religious freedom. Due to a restrictive interpretation of the right to religious freedom, religion was placed in the category of “non-essential activity” and was, therefore, unprotected. Within this framework, this paper tries to offer a reflection on the relevance of the dual nature of religious freedom as an individual and collective right, since the current crisis has made it clear that the individual dimension of religious freedom is vulnerable when the legal model does not offer an adequate institutional guarantee to the collective dimension of religious freedom.


2017 ◽  
Vol 6 (1) ◽  
pp. 1-8
Author(s):  
Jorida Xhafaj ◽  
Almarin Frakulli

The main object of this paper is the tender balance that exists and arises even more between the use of personal information that people provide in the course of most public security actions and privacy. This study analyze the most famous and strong related decision of the European Court of Human Rights, with the aim to give our opinion how has to be understand the barrier between the power of individuals over information and the power of public institutions to guaranties security. The protection of personal data is of fundamental importance to a person’s enjoyment of his or her right to respect for private and family life, and how law allocates power over information in different countries, will give us the possibility to define the most important criteria’s which define the existence of abuse or not over personal data and information.


2021 ◽  
pp. 125
Author(s):  
GULNAZ AYDIN RZAYEVA ◽  
AYTAKIN NAZIM IBRAHIMOVA

The development of new technologies also has an impact on human rights. In the previous “epochs” of global information society, it was stated that that traditional rights can be exercised online. For instance, in 2012 (and again in 2014 and 2016), the UN Human Rights Council emphasized that ‘the same rights granted to people, so to speak, in an “offline” manner, must be protected online as well’. This, in its turn, implicitly brought to the reality that the new technetronic society did not create new rights. Though, we should take into consideration that in the digital world national legislative norms that guarantee the confidentiality of personal data often do not catch up with the technological development and, thus, can’t ensure confidentiality online. Therefore, the impact of digitalization on human rights within the frames of international and national laws should be broadly analysed and studied. The article’s objective is to analyze the impact of new technologies on human rights in the context of the right to be forgotten and right to privacy. Because the development of new technologies is more closely linked to the security of personal data. With the formation of the right to be forgotten, it is the issue of ensuring the confidentiality of certain contents of personal data as a result of the influence of the time factor. The authors conclude that, the right to be forgotten was previously defended more in the context of the right to privacy. However, they cannot be considered equal rights. The right to be forgotten stems from a person’s desire to develop and continue his or her life independently without being the object of criticism for any negative actions he or she has committed in the past. If the right to privacy contains generally confidential information, the right to be forgotten is understood as the deletion of known information at a certain time and the denial of access to third parties. Thus, the right to be forgotten is not included in the right to privacy, and can be considered an independent right. The point is that the norms of the international and national documents, which establish fundamental human rights and freedoms, do not regulate issues related to the right to be forgotten. The right to be forgotten should be limited to the deletion of information from the media and Internet information resources. This is not about the complete destruction of information available in state information systems. Another conclusion of authors is that the media and Internet information resources sometimes spread false information. In this case, there will be no content of the right to be forgotten. Because the main thing is that the information that constitutes the content of the right to be forgotten must be legal, but after some time it has lost its significance. The scope of information included in the content of the right to be forgotten should not only be related to the conviction, but also to other special personal data (for example, the fact of divorce).


Author(s):  
William Bülow ◽  
Misse Wester

As information technology is becoming an integral part of modern society, there is a growing concern that too much data containing personal information is stored by different actors in society and that this could potentially be harmful for the individual. The aim of this contribution is to show how the extended use of ICT can affect the individual’s right to privacy and how the public perceives risks to privacy. Three points are raised in this chapter: first, if privacy is important from a philosophical perspective, how is this demonstrated by empirical evidence? Do individuals trust the different actors that control their personal information, and is there a consensus that privacy can and should be compromised in order to reach another value? Second, if compromises in privacy are warranted by increased safety, is this increased security supported by empirical evidence? Third, the authors will argue that privacy can indeed be a means to increase the safety of citizens and that the moral burden of ensuring and protecting privacy is a matter for policy makers, not individuals. In conclusion, the authors suggest that more nuanced discussion on the concepts of privacy and safety should be acknowledged and the importance of privacy must be seen as an important objective in the development and structure of ICT uses.


Author(s):  
Tamar Gvaramadze

This chapter discusses the impact of the pan-European principles of good administration on Georgian administrative law. It shows that the legal reforms and modern administrative legislation that started in Georgia in the 1990s were mostly influenced, and directed by, Western values and European principles, including core provisions of the Council of Europe. This influence has manifested itself, among other things, in the Georgian legislator giving constitutional importance to the right to a fair hearing in administrative proceedings and underlining the importance of good administration. Moreover, special parts of administrative law, such as regulation of local self-governance and personal data protection, have also not been immune to this influence, which has been strengthened by the progressive approach undertaken by Georgian courts.


Author(s):  
Tatiana-Eleni Sinodinou

The present chapter explores privacy issues posed by the use of RFID systems and applications. The existing legal framework for data protection is analyzed in order to discover how general privacy safeguarding principles should be applied in the case of RFIDs, with special focus on the main areas which are going to experience widespread use of such applications. The structure of the chapter is based on a chronological order which follows the consecutive phases of contact and interaction between the individual and the RFID tag. The implementation of a tag to a product or in the human body establishes the first point of contact of the individual with the RFID tag. This stage of data processing is examined in the first part of the chapter. In more particular, this part deals with the application of general principles of fair processing, such as information transparency, the debate about the necessity to require the prior consent of the individual (possible opt-in and opt-out solutions) and the precondition of a clearly defined purpose of the data processing. The symbiosis of the person with the tag is examined in the second part. Indeed, privacy concerns are equally significant during the phase of processing of personal information, even if processing is conducted lawfully, either based on the legal ground of the individual’s consent or justified on another legal basis. The requirement of data quality and the obligation to secure the RFID system against unauthorized interceptions or alterations of data by third parties constitute essential guarantees of fair data processing. Privacy protection in the activation phase of the tag is also ensured by the obligation to inform the tagged individual every time a reading takes place and by the right to verify the accuracy of the tag data, whether stored from the beginning or added at a later date. Finally, the last part of the chapter examines the legal regime of separation between the person and the tag. This phase refers to the termination of the processing either by act of the data subject or by act of the RFID system controller. The focus is given to the exercise of the right to object to the processing of personal data through RFID devices. In this context practical solutions, such as the “tag kill” or “tag sleep” command should be taken into consideration in order to the make the exercise of the right to object feasible.


Sign in / Sign up

Export Citation Format

Share Document