2,142 research outputs found

    DRM and Privacy

    Get PDF
    Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies. This Article begins, in Part II, by identifying the privacy interests that individuals enjoy in their intellectual activities and exploring the different ways in which certain implementations of DRM technologies may threaten those interests. Part III considers the appropriate scope of legal protection for privacy in the context of DRM, and argues that both the common law of privacy and an expanded conception of consumer protection law have roles to play in protecting the privacy of information users. As Parts II and III demonstrate, consideration of how the theory and law of privacy should respond to the development and implementation of DRM technologies also raises the reverse question: How should the development and implementation of DRM technologies respond to privacy theory and law? As artifacts designed to regulate user behavior, DRM technologies already embody value choices. Might privacy itself become one of the values embodied in DRM design? Part IV argues that with some conceptual and procedural adjustments, DRM technologies and related standard-setting processes could be harnessed to preserve and protect privacy

    MAPPING THE INFORMATION ENVIRONMENT: LEGAL ASPECTS OF MODULARIZATION AND DIGITALIZATION

    Get PDF
    The Article highlights the language of the digital and the principle of modularization as the basic concepts which the further development of the information environment will have to pivot around, regardless of how conflicts between freedom and control are temporarily solved. Perceiving both the computer and the Internet as complex systems, the authors look at how modular design of these systems freed the functionality of applications from the physicality of infrastructures, describe the evolutionary gains adhering to modularity, and how to preserve them - elaborating on the issues of access to the cable platform for broadband Internet and to virtual networks for computer technology. Their second focus shows how digitalization of information makes possible the merger of content and its protection. Especially through the use of DRM systems, private actors can create right enforcement mechanisms independent of the State. The legal system therefore faces new and more complex relations between private will and public sovereignty. In such a merged system it is harder to maintain freedom - much like in the fusion of function and infrastructure

    Privacy in an Ambient World

    Get PDF
    Privacy is a prime concern in today's information society. To protect\ud the privacy of individuals, enterprises must follow certain privacy practices, while\ud collecting or processing personal data. In this chapter we look at the setting where an\ud enterprise collects private data on its website, processes it inside the enterprise and\ud shares it with partner enterprises. In particular, we analyse three different privacy\ud systems that can be used in the different stages of this lifecycle. One of them is the\ud Audit Logic, recently introduced, which can be used to keep data private when it\ud travels across enterprise boundaries. We conclude with an analysis of the features\ud and shortcomings of these systems
    corecore