30 research outputs found
Perspective: manufacturers should be liable when computer bugs leave consumers in the lurch
Auto makers are responsible for the safety and reliability of their cars. So why shouldn't software makers be held responsible for buggy computer programs?Computers ; Consumer protection
ICT policies relating to privacy, freedom of expression and access to information : a briefing paper
Meeting: International Workshop on the Nexus between ICTs and Human Rights in Africa, 2-4 April, 2009, Kampala, UGICTs have made access to information and freedom of expression easier for those with less resources, and expanded the capacity for mass distribution of information. At the same time, ICTs allow for automated censorship and pose new threats to privacy. This document is a brief primer on some key issues in Africa in areas of privacy, freedom of expression and access to information, and how they relate to ICT policy. The digital divide is a significant problem in many African countries, limiting access to information. The document was prepared for the International Workshop on ‘The Nexus Between ICTs and Human Rights in Africa.
The uncertain relationship between transparency and accountability
The concepts of transparency and accountability are closely linked: transparency is supposed to generate accountability. This article questions this widely held assumption. Transparency mobilises the power of shame, yet the shameless may not be vulnerable to public exposure. Truth often fails to lead to justice. After exploring different definitions and dimensions of the two ideas, the more relevant question turns out tobe: what kinds of transparency lead to what kinds of accountability, and under what conditions? The article concludes by proposing that the concept can be unpacked in terms of two distinct variants. Transparency can be either ‘clear’or‘opaque’, while accountability can be either‘soft’or‘hard’
Global Trends in Privacy Protection: An International Survey of Privacy, Data Protection, and Surveillance Laws and Developments, 18 J. Marshall J. Computer & Info. L. 1 (1999)
The right to privacy is one of the most fundamental rights recognized. References to privacy date back to ancient Greece and China. Rapid advances in information technology and high-speed data networks have had an enormous impact on privacy. Today, personal medical and financial information can easily be transmitted with and without the one knowing. Can privacy law keep up with these changes and challenges? Privacy advocates are concerned. Nearly every country in the world has some form of privacy provision in its constitution. However, the definition of privacy differs from context and environment. The authors chronicle the status of privacy law in 53 countries. As guidance, the authors break down privacy into four sub-categories: information privacy, bodily privacy, privacy of communications, and territorial privacy. Their analysis presents an insightful foray into the different ways that right privacy is viewed and protected around the world
Cryptography and Liberty: An International Survey of Encryption Policy, 16 J. Marshall J. Computer & Info. L. 475 (1998)
The speedy progress of the digital revolution has significantly changed the manner in which individuals and other entities communicate and exchange information. Since traditional paper based media for communication is being replaced by high tech means, new security measures such as cryptographic security techniques are sought to ensure individual privacy. This is a drastic change because encryption technology was traditionally utilized by military and diplomatic communications. Human rights activists, political dissidents and journalists employ encryption technology to protect communication from government surveillance. The Global Internet Liberty Campaign ( GILC ) was organized to protect civil liberties and human rights in the on-line world. GILC monitors activities in regard to the free use of cryptography around the world. The Electronic Privacy Information Center ( EPIC ) conducted a survey on behalf of GILC. The purpose of the survey was to provide a comprehensive review of the cryptography policies of almost every national and territorial jurisdiction in the world. The result of the survey indicated that many countries throughout the globe do not have regulations on the use of cryptography. Cryptography is freely employed without any due restrictions. This holds true for both leading industrial countries and countries that have emerging markets. EIPC noted that recent trends in international law and policy favor greater relaxation in controls on cryptography. Responses from seventy-six countries are included in the comment