1 / 23

Analyzing privacy in a surveillance society: from biometric ID card to social media

Analyzing privacy in a surveillance society: from biometric ID card to social media. Pirongrong Ramasoota. Brief background about Thai society and privacy. A long standing surveillance society Ancient system of wrist-tattooing for manpower control

tosca
Télécharger la présentation

Analyzing privacy in a surveillance society: from biometric ID card to social media

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Analyzing privacy in a surveillance society: from biometric ID cardto social media Pirongrong Ramasoota

  2. Brief background about Thai society and privacy • A long standing surveillance society • Ancient system of wrist-tattooing for manpower control • Citizen ID card a staple since 1940s and biometric technology incorporated since 1990s • An emerging privacy regime in a political divide • Personal data protection law under consideration since 1990s but never enacted • Abuses of dissidents’ privacy politicized amidst color-coated conflict and clashes

  3. Evolution of citizen ID cards in Thailand – 1913, 1963, 1988, 1996, and 2005

  4. Lessig’scode: adopted framework for analyzing privacy • Lawrence Lessig. 1999. Codes and other Laws of Cyberspace. New York: Perseus Books.

  5. Four regulators • norms constrain through the stigma that a community imposes • markets constrain through the price they exact • architecture constrains through the physical burdens they impose • law constrains through the punishment it threatens The case of the cigarette

  6. Case of biometric ID – analytical dimensions Unique context of privacy Stakeholders Issue surrounding surveillance/privacy regime

  7. Unique context for privacy – biometric ID

  8. Strict screening Provincial authorities are taking steps to ensure the new ID cards for children are not issued to the offspring of foreign migrant workers.

  9. Stakeholders in biometric ID card in Thailand People – as citizens and service beneficiaries Government agencies Public administrators Politicians Procurers – vendors and suppliers Design and IT developers Businesses Each has different expectations with respect to privacy intrusion, data security, accuracy, and retention and can also play a different role in their variant sphere to affect to drive or impede privacy/data protection

  10. Other issues surrounding biometric ID card in Thailand

  11. SNS and surveillance Social networking thrives on surveillance and directly subverts individual privacy. SNS’s existence and business model depends on individuals’ voluntary (and sometimes inadvertent) revelation of detailed personal information and their activities to “friends” and corporate-owned sites that aggregate and mine their information for commercial purposes (Regan & Steeves, 2010)

  12. Unique context for privacy – SNS in Thailand

  13. Cyber-witchhunting via privacy abuse became politicized History of Miss Jane Doe – detailing her real name, address, her parents’ name, their profession. Items 1. to 5. listed her academic background, her being expelled from school for lèsemajesté, her participation in the red-shirts’ rally, and her constant posting of lèsemajesté content on her facebook wall.

  14. Content regulation in computer crime law • Section 14 of the law defines as offences the import into a computer system of such type of content: • forged computer data, false computer data, in a manner that is likely to cause damage to a thirdpartyor the public; • false data in a manner likely to damage national security or to cause public panic; • data constituting an offence against national security under the Penal Code; and • pornographic data in a manner that could be publicly accessible. • Section 15 provides that service providers who knowingly or allow the above offences to take place in their service are subject to the same penalty as offenders – intermediary liability

  15. According to the law, competent officialsare allowed to • summon alleged party to appear • request information and evidence, • duplicate, decrypt, censor, access computer information • confiscate or freeze computer system.

  16. Traceability regulation • Due largely to the enforcement of the computer crime law, ISPs and online service providers (OSPs) – those that host social networking services, blogs and websites -- have growingly set up a system that enables “traceability regulation.” To access content and services on these websites, users are required to provide some sort of ID or certification first. • With the availability and widespread diffusion of citizen ID number, many OSPs require that users submit a scanned copy of their ID card upon first subscription. • Lawrence Lessig describes “traceability regulation” as requirement by the state for service providers to employ software that facilitates traceability by conditioning access on the users’ providing some minimal level of identification.

  17. Timeline of Facebook’s privacy policy

  18. Timeline of Facebook’s privacy policy (cont.)

  19. Other issues surrounding surveillance/privacy on SNS in Thailand

  20. Policy considerations for privacy • In order to be relevant, both public and private public policies aimed at protecting privacy in both contexts need to consider data subjects (citizens in biometric ID case and SNS users) practices, perspectives, and attitudes towards privacy, which might be different from general assumptions and may vary in different socio-cultural contexts. In other words, evidenced-based policy-making which also needs to cope with the fast changes of technology as well as changing behavior of users • Public policy makers need to consider the full range of available approaches, not only law, but – importantly – also education. Hence, the emerging privacy protection framework needs to incorporate mechanism of social learning.

  21. Policy considerations for privacy • In the case of SNS, platform providers have a direct responsibility not only as far as consent and defaults are concerned, but also in terms of educating users, particularly the young ones, about privacy issues • One key challenge to be addressed by policy-makers in the case of SNS is the question of third-party use (commercial or political) of the data as well as dealing with long-term implication of data sharing, data profiling (including cyber-witchhunt), and data aggregation • Crisis of privacy abuse could be turned into opportunity to raise public awareness through case studies of real life high-impact stories. But constant advocacy is necessary to make it stick in the public’s mind.

  22. Thank you for your attention

More Related