privacy a very short introduction feb 2010

177 512 0
privacy a very short introduction feb 2010

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... 12 State of privacy map 62 # Privacy International (adapted) 13 Catherine Zeta-Jones and Michael Douglas 65 # Nicolas Khayat/ABACA USA/ Empics Entertainment 14 Naomi Campbell 82 # Getty Images 15 Cartoon: revealing personal information is hard to resist 90 # 2008 Geek Culture 16 Cartoon: the use of personal data is justified as being in the public interest 123 18 Princess Diana paparazzi 136 # Handout/Getty... identification) chip More sensitive personal information is kept at back-end computer systems Data for different applications are segregated All the non-immigration applications are voluntary The collection, storage, use, and release of data must comply with, amongst other legislation, the Personal Data (Privacy) Ordinance Only authorized departments have access to the relevant database; there is no sharing... quite apart from their actual efficacy in curbing harmful activities, their establishment inevitably invokes fervent hostility, especially from privacy advocates, and particularly in common law jurisdictions such as the United Kingdom, Australia, Canada, the United States, Ireland, and New Zealand where attempts to introduce them have so far been unsuccessful Resistance has been intense also in Scandinavian... Images # Sidney Harris/CartoonStock.com 17 Privacy International poster 130 Privacy # Privacy International xvi Chapter 1 The assault Once upon a time, passengers boarded an aircraft without a search Hacking described a cough – probably caused by a virus; and cookies were to be eaten rather than feared You are being watched The ubiquity of Big Brother no longer shocks ‘Low-tech’ collection of transactional... Graham Greenleaf, Godfrey Kan, Michael Kirby, Stephen Lau, ` Charles Raab, Megan Richardson, Stefano Rodota, Jamie Smith, and Nigel Waters None should be indicted as a co-defendant for the transgressions I have committed here and elsewhere As always, members of Oxford University Press have been congenial collaborators in this project I am especially grateful to Andrea Keegan, Emma Marchant, Keira Dickinson,... problems This wastefulness hurts everybody Therefore boredom and drudgery are not just unpleasant but actually evil Hackers are naturally anti-authoritarian Anyone who can give you orders can stop you from solving whatever problem you’re being fascinated by – and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so So the authoritarian attitude has to be... sharing of databases among government departments Cardholders may view data on the card through smart identity card readers installed at immigration self-service kiosks after their identities have been authenticated Privacy Impact Assessments (PIA) are conducted at different stages of the Smart Identity Card 19 The assault Recently the Hong Kong government ‘upgraded’ the cards into what are now styled... ‘locational’ privacy, but also interfere with ‘decisional’ matters often of a moral character such as abortion, contraception, and sexual preference 1 Privacy In the case of surveillance, a moment’s reflection will reveal some of its many ironies – and difficulties Its nature – and our reaction to it – is neither straightforward nor obvious Is ‘Big Brother is Watching You’ a threat, a statement of fact,... understanding of and judgment about privacy and data protection I am grateful to members of the Law Reform Commission of Hong Kong privacy sub-committee from whom I have learned so much The campaign to defend and preserve our privacy is indefatigably waged by several public interest research and advocacy groups around the world This precarious frontline is patrolled by various remarkable individuals to... intense play rather than drudgery That attitude is vital to becoming a hacker Eric Steven Raymond, How to Become a Hacker, http://www.catb.org/esr/faqs/ hacker-howto.html 16 ‘mashup’ sites that combine different databases could be converted to criminal use ‘Imagine if a hacker put together information he’d harvested from a travel company’s database with Google Maps He could provide a tech-savvy burglar with .

Ngày đăng: 11/06/2014, 02:05

Từ khóa liên quan

Mục lục

  • Privacy A Very Short Introduction (2010) (ATTiCA)

  • Contents

  • Preface

  • List of illustrations

  • 1 The assault

  • 2 An enduring value

  • 3 A legal right

  • 4 Privacy and free speech

  • 5 Data protection

  • 6 The death of privacy?

  • Annex

  • References

  • Further reading

  • Index

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan