Tuesday, 24 July 2018

Tugas Pertemuan 11

Internet Privacy and Freedom of Expression dan Privacy on the internet an integrated eu approach to on line data protection

Assalamualaikum.wr.wb



Global standards

Privacy finds direct and explicit protection under international human rights law. Article 12 of the UDHR states: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

The right was given formal legal protection in Article 17 of the ICCPR, which states:

(1) No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation.

(2) Everyone has the right to the protection of the law against such interference or attacks. These two definitions are similar, albeit with some important differences. The UDHR only protects against arbitrary, but not unlawful, interferences with privacy. In practice this is likely to be of limited importance, since an unlawful interference will always qualify as arbitrary. As far as honour and reputation go, the ICCPR only protects against unlawful attacks, while the UDHR protects against all such attacks. This may be more significant in nature, although this remains untested in the jurisprudence.

The UN Human Rights Committee has made it clear in a General Comment on Article 17 that the right to privacy encompasses the right to protection “against all such interferences and attacks whether they emanate from State authorities or from natural or legal persons.The Committee’s General Comment provides little guidance, however, as to what either ‘arbitrary’ or ‘privacy’ mean. Regarding the former, the Committee stated that an interference that was provided by law could still be arbitrary, and that all such interferences would need to be “in accordance with the provisions, aims and objectives of the Covenant and should be, in any event, reasonable in the particular circumstances. This ultimately provides very little guidance as to what may be considered to be ‘arbitrary’, although it would at least rule out interferences with privacy that were established by laws which ran against the aims of the Covenant or which were not reasonable.

The General Comment also includes fairly expansive, if general, statements on data protection, stating that the gathering and holding of personal information, whether by public or private bodies, must be regulated, that individuals have a right to ascertain what information about them is held, and for what purposes, and by whom. The jurisprudence of the Committee in this area has also been sparse. In the case of Hulst v. the Netherlands, the Committee had to assess whether or not interception of the telephone calls by the author, who was a lawyer, which were used to convict him of a crime, represented an unwarranted invasion of his privacy. In deciding that there had been no interference, the Committee quoted the standards noted above in its General Comment, and held that the interference was authorised by law and was reasonable.

African and Inter-American System
There is no explicit protection for privacy in the African Charter on Human and Peoples’ Rights.135 Protections for privacy are also found in the American Convention on Human Rights (ACHR),136 at Article 11, and the European Convention on Human Rights (ECHR),at Article 8.

The relevant provisions of the ACHR state:

(1) No one may be the object of arbitrary or abusive interference with his private life, his family, his home, or his correspondence, or of unlawful attacks on his honor or reputation.

(2) Everyone has the right to the protection of the law against such interference or attacks.

These provisions are very similar to those found under the UDHR and ICCPR. There has been little direct jurisprudence on this issue before the Inter-American Court of Human Rights. An important recent case on privacy, decided in November 2011, is Fontevecchia & D’Amico v. Argentina.138 In that case, the Inter-American Court held that the publication of certain private information about Menem, the former President of Argentina, was not an invasion of his privacy. It gave as reasons that the information was already well known, it had not even been treated confidentially by Menem and there was considerable public interest in the information.

The Inter-American Court has dealt with privacy on a number of other occasions as well. In the case of Tristán Donoso v. Panama, the Court found a breach of the right to privacy when State officials disseminated a recording of a private telephone conversation, which had apparently been made by a private party, to church officials and members of the bar association.139 In the case of Escher et al. v. Brazil, the Court came to a number of important conclusions regarding privacy in the context of telephone surveillance. First, it held that while the burden proof of the facts of a human rights violation normally lay with the complainant, it was legitimate to draw reasonable conclusions where it was impossible for the complainant to prove these facts conclusively, due to secrecy on the part of the State.

Given the intrusive nature of telephone interception, the Court held: This measure must be based on a law that must be precise and indicate the corresponding clear and detailed rules, such as the circumstances in which this measure can be adopted, the persons authorised to request it, to order it and to carry it out, and the procedure to be followed. In this case, the rules had not been followed properly, and so the invasion of privacy did not meet the requirement of legality, as stipulated in the ACHR.142 The dissemination of some of the private material by State agents represented a further breach of the right to privacy. In terms of data protection, the Inter-American Commission has made it clear that it believes that a right of habeas data exists under the ACHR, which gives individuals the right to know what information the State and private actors have collected on them, to access that data and to modify, correct or remove it, as appropriate.The Inter- American Court has never directly addressed the issue of habeas data.

ECHR: an overview

Article 8 of the ECHR formulates the right in rather different terms that the ICCPR or ACHR, as follows:
(1) Everyone has the right to respect for his private and family life, his home and his correspondence.
(2) There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.

The characterisation of the right here is more positive; a right to respect for one’s privacy rather than to be protected against interferences. Another difference is that the protection is restricted to interference by public authorities, although the European Court of Human Rights has not interpreted the provision in such a limited fashion (see below). Finally, the tandards for restrictions are set out in a much clearer form. Instead of vague terms such as ‘arbitrary’, ‘unlawful’ and ‘abusive’, we have a clear three-part test: a) in accordance with the law; b) necessary in a democratic society; and c) to protect one of the listed interests (national security, public order and so on). In terms of the scope of the notion of privacy, the European Court has identified a number of specific types of State actions that may breach the right, such as interception of private communications or telephone tapping, regardless of the content of the communication, allocation of rights over children, interference with sexual life, compulsory medical treatment and access to certain types of State-held information. The Court has refrained from proposing a generic definition of privacy, holding instead, as noted above, that this is not possible. The Court has, however, indicated a number of features of the right. In the case of Von Hannover v. Germany, for example, the Court held that privacy covers “aspects relating to personal identity, such as a person’s name, or a person’s picture” and “a person’s physical and psychological integrity”. Furthermore, the right is intended to “ensure the development, without outside interference, of the personality of each individual in his relations with other human beings. In Niemietz v. Germany, it held that “it would be too restrictive to limit the notion to an ‘inner circle’ in which the individual may live his own personal life as he chooses and to exclude therefrom entirely the outside world”. Instead, “private life must also comprise to a certain degree the right to establish and develop relationships with other human beings. Business and professional relations came within the scope of the concept, so that a search of a business premises did represent an interference with private life.

The Court has noted that “a person’s reasonable expectations as to privacy may be a significant, although not necessarily conclusive, factor. Even information collected in public situations may, through the unexpected use to which it is put, raise private life issues. Thus: “Private-life considerations may arise, however, once any systematic or permanent record comes into existence of such material from the public domain. In practice, the Court has tended to recognise a fairly wide scope of the right, while also recognising the possibility of restrictions, along with a wide margin of appreciation to States, particularly in cases involving protection of children. For example, in the case of Keegan v. Ireland, the Court stated that States “enjoy a wide margin of appreciation in the area of adoption. The case involved a father seeking guardianship over his child, whom the mother, who was estranged from the father, had put up for adoption. In Von Hannover v. Germany (No. 2), which involved the publication of pictures alleged to be private, the Court stated: “Contracting States have a certain margin of appreciation in assessing whether and to what extent an interference with the freedom of expression protected by this provision is necessary”.

ECHR: restrictions

The Court has developed a fairly clear methodology for applying the three-part test for restrictions in cases involving interferences with privacy. In a number of cases, especially regarding telephone tapping and other forms of surveillance, the Court has noted that due to the particularly invasive nature of these activities, they must “be based on a ‘law’ that is particularly precise … especially as the technology available for use is continually becoming more sophisticated. In the case of Kruslin v. France, the Court held that this part of the test was not met because the conditions on telephone tapping were not sufficiently precise. In particular, there was no restriction on the categories of person who might have their telephones tapped, no obligation on judges to set a time limit on tapping, no procedures for drawing up reports on intercepted conversations or procedures for destruction of recordings, and no requirements that recordings be kept intact.

In the case of Malone v. United Kingdom, the European Court examined the practice of ‘metering’ of phone calls (i.e. recording the numbers called and length of the calls). It distinguished this from actual interception of calls, but noted that while this was legitimate (presumably on the basis of consent) for purposes of billing and monitoring of proper use of the service, passing this information on to the police represented an interference with private life. There was no law that required the Post Office, which conducted the metering (a public body which had become British Telecommunications by the time of the case), to pass the records over to the police, but in practice they did so in cases where this information was “essential to police enquiries in relation to serious crime” and could not be obtained from other sources”. This practice did not meet the standard of being “in accordance with the law” for purposes of Article 8(2) of the ECHR. This is clearly relevant for other cases in which private actors – such as Internet service providers – engage with public bodies in areas which impact on privacy rights.

In terms of the second part of the test, in general, the Court has no problem recognising a legitimate aim which requires protection in privacy cases, often the rights of others or public order. Thus, in Leander v. Sweden, the Court held in one short paragraph that a law allowing police to keep secret information gathered on job applicants for certain positions was necessary in the interests of national security,while in Murray v. the United Kingdom the Court similarly devoted only one paragraph to recognising the prevention of crime as a legitimate aim.
In assessing the necessity part of the test, the Court has stated: “[R]egard must be had to the fair balance that has to be struck between the competing interests of the individual and of the community as a whole”.Furthermore, “the notion of necessity implies that the interference corresponds to a pressing social need and, in particular, that it is proportionate to the legitimate aim pursued” and that the “reasons adduced to justify the interferences at issue are ‘relevant and sufficient’”. As with national courts, the European Court has relied upon the idea of the overall public interest when assessing restrictions on privacy, especially when competing human rights come into play, as is clear from the box below on the Von Hannover case.

ECHR: private actors

The European Court has addressed the question of interference with privacy by private interests on a number of occasions. It has stressed that “the object of [Article 8] is ‘essentially’ that of protecting the individual against arbitrary interference by the public authorities”. The Court has recognised that privacy interests may impose positive obligations on States to take action to safeguard privacy. Sometimes, the Court uses positive obligations in cases in which “it is not that the State has acted but that it has failed to act” to protect privacy. Some of these cases deal with the relationship between individuals and the State, or the ‘vertical’ application of rights. Gaskin v. United Kingdom is an example of this. In that case, the Court held that a public authority was obliged to release certain personal information relating to the applicant to protect a privacy interest.
At the same time, the Court has in some cases referred to States’ positive obligation to regulate relations between non-State actors, the ‘horizontal’ application of rights. In such cases, it is not the relationship between the State and an individual – either because of an action the State has taken or the failure of a State to act – that is in issue. Rather, the claim is that the effective protection of private life requires the State to regulate relations between non-State actors, for example by providing a legal remedy against privacy invasions.

In some of these cases, there has been an element of State involvement in the privacy breach. For example, in López Ostra v. Spain, the Court held that the failure of the authorities to take action to prevent the detrimental effects of severe environmental pollution arising from a waste-treatment plant breached Article 8. However, the Court specifically noted that the legality of the plant under Spanish law was in question and focused on the fact that the authorities had not only failed to protect Mrs. López Ostra but had also contributed to prolonging the situation.In X and Y v. the Netherlands, the Court held that a civil remedy was insufficient to protect individuals against sexual assault and that a criminal remedy should be available. The Netherlands did normally provide ma criminal law remedy for sexual assault; it was not applicable in this case because of certain procedural issues relating to the fact that the victim was mentally handicapped. In other cases, however, the Court has held that States were in breach of the right to mprivacy purely due to actions between private parties (see box).

SURFING AND SEARCHING

Technical description and actors involved

The process of websurfing

• Telecoms providers. In order to contact a website an Internet user generally contacts
the Internet by a telephone connection to an Internet Service Provider (ISP). The telecom
provider logs the call to the ISP.

• Internet Access Provider. The entry point to the ISP is the network access server. This
server generally records the Calling Line Identification of the connection. Most IAP’s log
the login name, login and logout times and the amount of data transferred during a
session. It should be noted that in some cases the telecoms provider is also the IAP.

• Allocation of the IP address. Once the contact with the IAP has been established, the
IAP allocates a dynamic IP-address for the duration of the Internet user’s session.
Henceforth all communication during a session is to and from this IP-address. The IP
number is carried with all the packets transmitted in all subsequent stages of
communication. It should be noted that the allocated IP number is always within a certain
range of numbers allocated to the respective IAP. Hence external parties can easily
retrieve the IAP from which IP-packets originate.

After this, the Internet traffic is sorted at the ISP by the so-called port number, which
specifies the service and corresponding protocol. A request to visit a website is generally
done through the HTTP protocol. At the ISP this traffic is recognised by a corresponding
port number. It may also be transferred directly to a router which connects the Internet
user with the external websites required.

The request is often transferred to a dedicated proxy server. This server logs the request
for a certain website. The proxy server contains a copy of the content of the most
frequently visited websites. If the website requested by the Internet user is in the proxy
server, this server only needs to prompt the respective website for an update of any
changes since the moment the copy was stored in the proxy. This measure strongly
reduces the amount of data to be exchanged between the ISP and the website, since it
only communicates the changes instead of the full pages. The proxy server may store a
detailed list of the visits to websites connected to an IP-address at a given time. These
can be linked to an individual user by the IP-address and the logging of the session times.

• Routers. On the path between the ISP and the website visited, the traffic generally
passes through several routers that direct the data between the IP-address of the Internet
user and the IP-address of the website. With regard to the storage of personal data, these
routers are considered as neutral elements, even though dedicated facilities could be
applied to intercept the Internet traffic at these points.

• Regular websites. Once the connection with the website has been established, the
website collects information on the visiting Internet user. All requests are accompanied
by the destination IP-address. The website also knows from which page an Internet user
has been transferred (the previous page reference, or URL, is known). The information
on website visits is generally stored in the ‘Common Log File’. All the above mentioned
information can be used to create, by means of a log analyser, accumulated information
on the traffic to and from a website and the activities of visitors.

Upon connection with a website, some additional information is collected in the
communication between the most common browser software used by Internet users and
the websites visited. This is often referred to as ‘chattering data.’ It generally includes the
following items:
- Operating system
- Type and version of browser
- Protocols used for websurfing
- Referring page
- Language preferences
- Cookies

The website has additional gathering power if it posts so-called cookies. These are
pieces of data that can be stored in text files which may be put on the Internet user’s hard
disk, while a copy may be kept by the website. They are a standard part of HTTP traffic,
and can as such be transported unobstructed with the IP-traffic. A cookie can contain a
unique number (GUI, Global Unique Identifier) which allows better personalisation than
dynamic IP-adresses. Such cookies extend the capability of websites to store and
‘personalise’ information on their visitors. The cookie may be re-read on a regular basis
by the site to identify a Internet user and recognise him/her when he/she visits again,
check possible passwords, analyse the path during a session and within a site, record
transactions, such as Articles purchased, customise a site etc.

Cookies can differ in nature: they can be persistent but can also have a limited duration,
when they are called “session cookies”. In some cases, they may be useful for providing a certain service through the Internet or to facilitate the surfing of the Internet user. For
instance, certain custom websites rely on cookies to identify users each time they return,
so users do not have to log into the website each time they check their news.
The privacy implications of the use of cookies should however not be underestimated.
This issue will be dealt with in the legal analysis section of this chapter.
• Portal sites
Because of the growing complexity of the Internet, Internet users often connect to a
website via a so-called portal site, which provides an overview of weblinks in an ordered
way.

Often such portals contain links to commercial sites, and could be compared to a
shopping mall hosting many stores. The portal sites collect information in the same way
as websites in general, but may also store information on visits to all the sites ‘behind’
the portal.

A portal site is always hosted by an Internet Service Provider and in some cases can
belong to the ISP. In such cases, the ISP has the possibility of collecting data on a user’s
visits to sites " behind" this portal and can therefore create a complete profile of the user.
The Dutch Data Protection Authority (Registratiekamer) concluded in a report about
the Internet and privacy, based on investigations into 60 ISPs in the Netherlands, that it is
possible for the content provider (in this case the ISP that owns a portal) to know how
many advertisements have been placed, how often a user has visited an e-shop, which
products he/she has bought and how much he/she has paid for them.

• Providers of additional services
The data collected by websites is sometimes (automatically) transferred to a third party to
the original communication (e.g. companies specialised in the analysis of web statistics,
such as Nedstat). The purpose can be to create accumulated statistical data on visits to the
website, which is sold back to the owner of the respective websites. Advertisement
banners generally collect information on the websites visited by a person by means of
cookie-files. Service providers like DoubleClick or Globaltrash accumulate the
information on website visits to all the different sites on which they put advertisements.
A profile of the Internet users’ preferences can be compiled with these data, and
subsequently used to customise webpages.

Surfing from the perspective of the Internet user
A PC installed with browser software will in many cases, after starting up, automatically
load a selected starting page from the web. This starting page may contain hyperlinks that
can be activated to visit other websites or search engines. While browsing, the browser
programme of the Internet user sends a request to a server (that can be located anywhere
in the world) to transmit a specified webpage (marked by its URL) that is hosted by this
webserver. By clicking on a hyperlink the Internet user in fact downloads the requested
webpage to his/her computer.
After having connected to his/her ISP, the Internet user generally chooses one of the
following approaches when surfing:

• Directly addressing the website required by entering the URL, such as
www.amazon.com. The URL also contains the protocol.

• Reaching the website via a referring (portal) site that contains hyperlinks towards other
sites. These portal services are becoming more popular as the number of webpages is
growing and Internet users need more guidance to find interesting material.

• Retrieving relevant sites by first entering a query to a website using a search-engine.
Search engines use indexing by means of keywords. The user enters one or more
keywords and initiates the search. The search engine then searches for the titles of the
corresponding sites and their URL addresses in its own index database. The search
engine has the power to assemble personal profiles as it accumulates the search terms
entered by an Internet user and the websites consequently visited. The personalisation is
often done by means of cookies. Several search engines also offer more personalised
services whereby an Internet user is required to provide information on personal
preferences in order to get, for example, regular updates of websites on a certain topic.

III. Privacy risks
Millions of Internet users around the word often surf the World Wide Web or search for
information on the Internet. These activities are, however, not risk-free from a privacy
point of view.
In the context of the Internet, a lot of information is collected and processed in a manner
which is invisible to the data subject. The Internet user is sometimes not aware of the fact
that his/her personal data have been collected and further processed and might be used
for purposes that are unknown to him/her. The data subject does not know about the
processing and has no freedom to decide on it.

Additional risks exist when data collected during the surfing activities of Internet users
can be linked with other existent information on the same user. The fear of such a
connection of personal data concerning Internet users has been very present in the
discussion on the merger between Internet advertiser DoubleClick and market research
firm Abacus Direct.

It was feared that, should the two firms merge, the DoubleClick database containing data
on Internet usage habits would be cross-referenced with the Abacus Direct database
containing real names and addresses, as well as detailed information on customer buying
habits.

This merger took place in November 1999. According to the information provided on the
Doubleclick website, name and address information volunteered by a user on an
Abacus Alliance website were to be linked by Abacus through the use of a match code
and the DoubleClick cookie with other information about that individual.
Information in the Abacus Online database includes the user's name, address, retail
catalogue and online purchase history, and demographic data. The database also includes
the user's non-personally-identifiable information collected by websites and other
companies with which DoubleClick does business. According to Double Click, no link has been made up to now between the Double Click and the Abacus databases.

New monitoring software
New monitoring technologies are becoming available to ISPs which will generate far
more information about traffic patterns and content preferences than existed in the public
switched telecommunications network (PSTN). Such technologies promise to deliver the
Internet equivalent of PSTN call-detail records, and more.
These kinds of software programs are popularly known as E.T. applications “because
once they have lodged in the user's computer and learned what they want to know, they
do what Steven Spielberg's extra-terrestrial did: phone home”.
To given an example, Narus, a private software company in Palo Alto, Californa (USA),
offers software to ISPs that ‘monitors the data stream and parses each packet to extract
packet header and payload information. Narus claims to work closely with key partners,
including Bull, Cisco and Sun Microsystems. This software can be used for the
identification and measurement of Internet telephony and other applications (eg, the web,
e-mail or IP fax), but it also aims to monitor potentially billable content within the IP traffic (eg copyrighted material requiring a royalty or on-demand use of an application, or audio clips). The Narus software reports to ISPs in real time on the top websites visited as well as the types of content viewed and downloaded.

Alexa is a tool that can be added to a browser to accompany the user while surfing, by
providing additional information about the site visited (about the registered site owner,
ratings and reviews of the site) and making suggestions on related sites. In return for
providing this service to users, Alexa has complied one of the largest databases on
patterns of web usage. Amazon paid 250 million US dollars in stock for Alexa in early
1999. In its privacy policy, Alexa states that it collects information on web usage which
remains anonymous, by using their web usage logs and cookie data.

Amongst other products produced by Alexa is the zBubbles program, an on-line
shopping tool that collects surfing data on the user in order to offer product
recommendations, comparative shopping advice, etc. According to the information
published by Time Magazine, zBubbles also sends information back to Alexa when
users are not shopping. This product is designed to be installed on the screen during the
whole duration of the navigation session, even though most users are not shopping all the
time.

Another interesting example of monitoring software is Radiate, formerly known as
Aureate. Radiate is an advertising company that works with the makers of shareware. It
is reported that Radiate's advertisements came with E.T. software that embedded
themselves in 18 million people's computers and used their Internet connection to report
back on what advertisements people were clicking on. The original version of Radiate's
software, which still resides in countless computers, was written to keep phoning home
even after the shareware that put it there was deleted. Users needed a special tool to
delete the file, which the company provided on its website later on.

Presently hundreds of E.T. applications exist. More than 22 million people are believed
to have downloaded them. E.T. monitoring software programs are again an example of
technologies that process personal data on users without their knowledge (invisible
processing): most computer users have no idea that these software programs have been
placed in their computers.
Often the makers of these E.T. applications say that, although they are able to collect data
about computer users, they do not connect them to individuals. This does not, however,
offer sufficient guarantees to the user since, given the commercial value of individualised
data, companies that collect them could change their policies at any time. The potential

risk of data misuse is still there.

No comments:

Post a Comment