Information & protecting the vulnerable

advertisement
11:00-12:30
Information & protecting the vulnerable
Page 3 - ‘What do leaks and open government reveal about State Crimes?’ Matt Clement, University
of Winchester
Page 4 - ‘Child Protection MASH-up: the case of AB v Haringey, and whether seeking consent
increases risk or increases trust’ Allan Norman, Celtic Knot
Page 5 - ‘The End of the Volunteer Coach? Child Protection and Sports Coaching’ Merijn van Willigen,
University of Winchester
Trust & transparency – family courts, charities & whistle-blowing
Page 6 - ‘Family court closures and cuts alongside the new online services’ Sarah Meads, University
of Winchester
Page 7 - ‘Exploring Construct of Public Trust in Charities: An Empirical Study Based on Scale
Development’ Yongjiao Yang, University of Hull
Page 8 - ‘Whistle while you work: effective data sharing and protection of the vulnerable’ Helen
James, University of Winchester
Misuse of information & miscarriages of justice
Page 9 - ‘The Prosecutor’s Fallacy: how many innocent people have been convicted, and how can
miscarriages of justice be identified after the event?’ Vincent Scheurer, Sarassin LLP
Page 10 - ‘Assessing Criminal Law Response to the Misuse of Information’ Audrey Guinchard,
University of Essex
Page 11 - ‘Privacy by Design – a real solution or a daydream?’ Katarzyna Witkowska, University of
Lodz
Surveillance, encryption, State secrets & fashion!
Page 12 - ‘Secrets of State and the Rights of Access in Spain after the approval of the Law on
Transparency’ Pilar Cousido González, Universidad Complutense de Madrid
Page 13 - ‘Binding the leviathan: encryption, surveillance and the digital state of nature’ Lawrence
Serewicz
Page 14 - ‘Electronic surveillance, fashion, marketing & the law’ Savithri Bartlett, University of
Winchester, Matteo Montecchi, University of the Arts London, London College of Fashion and
Marion Oswald, University of Winchester
1|Page
14:30 – 16:00
Anonymity, the benefits of reporting data breaches & balancing efficiency and efficacy
Page 15 - 'Privacy, the impact of anonymisation & the ICO's Code' Iain Bourne, Information
Commissioner’s Office
Page 16 - ‘Do the Benefits of Voluntarily Reporting Serious Data Breaches to the ICO Outweigh the
Risk of Monetary Penalties?: A Theoretical Analysis’ Jack Manhire, Visiting Faculty member &
Executive Program Officer, Treasury Executive Institute, United States Department of the Treasury
Page 17 - ‘Towards a Risk-Based Approach to Data Protection: Economic Efficiency at the Expense of
Fundamental Rights Efficacy?’ Orla Lynskey, London School of Economics
Alternative approaches – regulation of risk, information as property and information
sharing
Page 18 - ‘Contemporary evolutions of EU Personal Data protection: the risk management of
nothing?’ Raphaël Gellert, Vrije Universiteit Brussel
Page 19 - ‘Through a Glass Darkly: Revisiting Information as Property in Boardman v Phipps [1967]’
Louisa Dubery, University of Winchester
Page 20 - ‘NEISAS – a pilot system for secure information sharing in critical infrastructures’ David
Sutton, tacit.tel limited
Disclosure of national statistics, forensic information & DNA – trust, control & anonymity
Page 21 - ‘The push for open data: should EUL be replaced with OGL?’ Caroline Tudor, Office for
National Statistics and Mark Elliot, University of Manchester
Page 22 - ‘Trust and the International Exchange of Forensic Information’ Carole McCartney,
Northumbria University
Page 23 - ‘The governance of genetic information: a view from the trenches’ Maru Mormina,
University of Winchester
Data linking, statistical disclosure control, Facebook privacy policies & the right to be
forgotten
Page 24 - ‘Should the Law Prescribe Statistical Disclosure Control? Emmanuel Lazaridis, University
College London
Page 25 - ‘The people v Facebook: the transparency of privacy policies’ Estrella Gutiérrez, University
Carlos III of Madrid
Page 26 - ‘The right to be forgotten in the age of Big Data’ Monika Zwolinska, University of Nice Sophia Antipolis
2|Page
What do leaks and open government reveal about State Crimes?
The policing of whistleblowers, notably Wikileaks and Edward Snowden, has purposely
promoted a message that this activity will not be tolerated and has led to the exile and
imprisonment of the perpetrators. At the same time sensitive data which reveals the
arguably criminal actions of states and their agencies is in the public domain to a far greater
degree than in the cold war years.
Well-kept secrets, known to key figures in state bureaucracies but shielded from public
view, have been leaked in recent years. Scandals such as child abuse in state-run
institutions, and by celebrated cultural icons, now disgraced, have been exposed. Other
notorious examples of dereliction of duty by state care providers, such as at Mid- Staffs.
Hospital, have been campaigned against by the friends and relations of those who died; due
to the actions of a bureaucracy whose criminal neglect resulted from a failed government
policy of ‘care provision’.
Information can be a tool protecting the sick and vulnerable where there is a body resolved
to wield it to its purpose: Without this active intervention, knowledge alone will not presage
the changes required, as the state’s reaction to potential exposure of its failings is more
often punitive than restorative.
Matt Clement
Lecturer, Criminology
University of Winchester
Matt.clement@winchester.ac.uk
3|Page
Child Protection MASH-up: the case of AB v Haringey, and whether seeking consent
increases risk or increases trust
Countless Serious Case Reviews have identified poor information-sharing as a contributory
factor in child tragedies. These findings have provided a basis for successive governments to
promote “improved” information-sharing. In many areas of the country, ‘Multi-Agency
Safeguarding Hubs’ or MASHs have been developed. They are not the result of a specific
statutory initiative, but are consistent with the direction of information-sharing policy.
Within MASHs, information is routinely shared without the knowledge or consent of the
information subjects. Meanwhile, the underlying data protection law and human rights law
is unchanged.
In 2011, two parents contacted by social workers immediately challenged such sharing
without knowledge or consent of anonymous concerns. I brought their legal challenge which
led to the ruling in AB & Anor, R (on the application of) v The London Borough of Haringey
[2013] EWHC 416 (Admin) (13 March 2013). The court declared the information-sharing
breached data protection laws, and awarded Human Rights Act damages, the first known
example of such an award.
The judgment has had wide ramifications, including as a direct result that the London
Safeguarding Children Board has rewritten its MASH guidance, and OFSTED its guidance on
compliant information-sharing.
This paper not only explores and questions the legal and policy framework underpinning the
MASH initiative, but does so by asking bigger questions about trust. Underpinning MASH
information-sharing policies are a lack of trust: parents cannot be trusted not to inflict harm
on their children if we seek to work with them consensually. This in turn fosters a lack of
trust in parents: how can I trust social workers who have already gone behind my back?
I will argue that an alternative model of consensual information sharing carries risks, but will
reap rewards by fostering trust which improves the relationship between citizen and state;
it also conforms better to information-sharing and human rights law.
Allan Norman
Registered social worker and solicitor
Celtic Knot, The Warehouse, 54-57 Allison Street, Birmingham, B5 5TH
allan@celticknot.org.uk
4|Page
The End of the Volunteer Coach? Child Protection and Sports Coaching
The permeation of aspects of law into what had previously been purely social relations has
been highlighted for some considerable time. This ongoing process of ‘juridification’ of
social spheres such as family life, the environment and intimacy – to name but a few - seems
in fact to be an irreversible social trend, and one that needs to be taken seriously also when
regarding the development of a variety of sports practices. Over time, a number of child sex
abuse cases involving sports coaches have highlighted the realities of risk involved in an area
where adults had historically assumed in loco parentis roles without being exposed to the
checks and scrutiny that other professions had been.
The presentation will identify the changes that have occurred in sports coaching as a
consequence of a growing concern with the risks involved in allowing adults access to young
athletes. It will question whether the legalization of this sports field has effectively meant
the end of a culture of volunteerism, and what the future holds for an area of sport that has
historically relied on amateur involvement but is now forced to professionalise its practices.
Merijn van Willigen
Department of Sports Studies
University of Winchester
Meryn.willigen@winchester.ac.uk
5|Page
Family law query, go online!
Family court closures and cuts alongside the new online services
Family law practitioners face interesting times as the Government seeks to minimise the
role of lawyers and instead focus on information being made available online. This, it
seems, is the new “access to justice”. Since 1st April 2013 legal aid has been removed for
private family cases in all but a small majority of cases. The number of litigants in person
chartering their way through the family courts is increasing. Yet at the same time the
opening times for family courts counters are being reduced, from 10am-4pm, commonly to
10am-12noon and family courts are under threats of being closed.
In tandem with the legal aid cull the Government has introduced the new web app, “Sorting
out Separation”. This is intended to be a “one stop shop” of information for separating
families. There is further Government provision available for out of court support, including
a national “virtual” internet-based mediation service hosted by Relate. The role of
information being provided through lawyers is markedly absent from Government
provision.
The Child Maintenance Options website is set to continue, being provided by G4S in a
contract worth £18m over five years. This focuses on information available by telephone,
online chat, and social media.
This paper will look at the changes in the way the Government seems to be steering the
provision of family law information and what this may mean for family law practitioners and
separating families.
Sarah Meads
Solicitor, Lecturer
University of Winchester
6|Page
Exploring Construct of Public Trust in Charities: An Empirical Study Based on Scale
Development
This study seeks to examine the construct of public trust in charities based on a large scale
survey in the UK. It fills the gaps of existing empirical study on measuring public trust in
charities which regard trust as a one-dimensional concept without looking into what ‘trust’
truly means.
A conceptual model of public trust in charities is proposed combining previous studies on
trust and the characteristics of charity. In this model, public trust in charities is viewed as a
multidimensional concept, which is defined as the willingness to take risk based on the
truster’s propensity to trust, the expectation of the charity’s trustworthiness, and
perception of value similarity.
In order to examine whether this conceptual model capture the true meaning and construct
of public trust in charities, both qualitative and quantitative methodologies are employed.
First, focus group interviews are conducted in the UK to explore the participants’
perspectives on charities and the role of public trust therein and investigate the reasons for
trust and lack of trust in these organisations. It aims to search for potential items and
dimensions which could present accurately of meaning and each domain of trust in
charities. Based on these focus group interviews and literature review, a preliminary Likert
scale containing 49 items and four dimensions is developed. Then three waves of
questionnaire surveys (609 samples) are conducted for scale refinement including item
analysis, exploratory factor analysis and confirmatory factor analysis. In the process of scale
refinement and validation, the construct of public trust in charities is examined.
The findings confirm the validity of the conceptual model proposed in this study. It also
proves that the scale developed is reliable for measuring public trust in charities in the UK
and predicting risk in this sector.
Yongjiao Yang
Department of Social Sciences, University of Hull
Yongjiao.Yang@2012.hull.ac.uk
7|Page
Whistle while you work: effective data sharing and protection of the vulnerable
In today’s high-tech computer aged society, many of us express concerns around the
electronic storage of our sensitive personal data.1 Such data includes information relating to
physical and mental health. Whilst such concerns are perhaps understandable, especially in
light of the many highly publicised data breaches of recent years, effective information
sharing is an essential tool in affording protection to the vulnerable.
Public inquiries such as those following the appalling abuses which took place at
Winterbourne View Hospital and Mid- Staffordshire NHS Foundation Trust have focused on
the need for good practice in data-sharing and whistle-blowing in order to eliminate further
such instances. It is against this background that this paper considers mechanisms through
which a culture of openness and transparency can be created, whilst maintaining public
confidence in the protection of sensitive personal data.
Helen James
Head of Law
University of Winchester
Helen.james@winchester.ac.uk
1
S2 Data Protection Act 1998
8|Page
The Prosecutor’s Fallacy: how many innocent people have been convicted, and how can
miscarriages of justice be identified after the event?
This talk is divided into four short sections: (i) an explanation of the term “Prosecutor’s
Fallacy” as it is understood by the writer, with examples from actual criminal trials including
R v Sally Clark and R v Barry George; (ii) a summary of the writer’s core thesis that the
Prosecutor’s Fallacy is probably responsible for multiple, currently undetected miscarriages
of justice in the UK; (iii) a description of the writer’s use of the Freedom of Information Act
to identify the steps (if any) taken by the Ministry of Justice to remedy this issue; and (iv)
the writer’s thoughts about how these miscarriages of justice might be identified and
corrected in the future.
Associated documentation:
The Freedom of Information Request for the Ministry of Justice, and any response (if
received).
Vincent Scheurer
Sarassin LLP
9|Page
Assessing Criminal Law Response to the Misuse of Information
In its 2011 report on “Personal Data: the Emergence of a New Asset Class”, the World
Economic Forum highlighted the main feature of the digital economy, i.e. that “Personal
data is the new oil of the Internet and the new currency of the digital world” (quoting the
European Consumer Commissioner, Meglena Kuneva, March 2009). Indeed, internet
companies have been very successful in building business models that exploit the digital
footprint of their users. The problem is that companies have not been the only ones to
harness the economic value of data. Today, it is more lucrative to hack into computers and,
for example, sell the data obtained than it is to steal one’s neighbour’s TV or car and resell
it. Thus, the question is whether criminal law is or not successful in recognising that data is
the new object of crime and that the misuse of information today can severely damage our
trust in the digital. Are the existing offences and their corresponding penalties adequate?
How do these offences feature in respect to the international framework, notably the
Convention on Cybercrime, the new 2013 EU cybersecurity strategy, the EU Directive on
cybercrime and the draft EU Regulation on General Data Protection?
Furthermore, recent events have shown that the offenders are not always those we have in
mind. The News of World scandal has revealed that beyond individuals, it is the structure of
a company which is orientated towards illegal access and then misuse of information for
profit. The Snowden leaks exposed the collusion between the private sector and the
Governments to conduct surveillance of ordinary citizens. Thus, do we need to rearticulate
the criminal liability of corporations which, as the key players of the digital economy, need
to earn our trust as much as Governments need to do so?
Audrey Guinchard
University of Essex
abguin@essex.ac.uk
10 | P a g e
Looking for the interdisciplinary approach: Privacy by Design – a real solution or a
daydream?
Data is the lifeblood of the new economy as Ann Cavoukian, Privacy Commissioner of
Ontario, Canada says. Information society is currently standing on the doorstep of the datadriven future, in which information is shared and processed by all possible means.
Undoubtedly, the abovementioned phenomena influences privacy in a very significant way
and becomes though one of the most important challenges for privacy protection.
Looking onto the global village we live in, it can easily be observed that this global village is
like a mosaic, like a jigsaw puzzle made of various elements: legal, cultural, mental
differences that have to be combined somehow. Not only the legal systems differ, but even
privacy as a cultural value is often understood in a completely different way. It all leads to
the conclusion that working on the common standard for privacy protection is extremely
challenging.
Regardless of the difficulties and obstacles to overcome when trying to guarantee respect
for privacy in the data reality, information society requires effective solutions, especially
that changing online world that affects traditional informational environment entails
insufficiency of the traditional mechanisms for privacy protection.
The paper aims to explore whether the interdisciplinary solutions by the example of the
Privacy by Design concept can become effective remedies for privacy infringements in the
profiled world and Big Data reality. It examines the idea itself, its advantages and the weak
points, trying to prove that this concept should be taken into account when talking about
privacy. It asks the fundamental question whether preventive attitude towards data
protection should prevail and oust reactive way of thinking about privacy. It also exposes a
need for the international cooperation and the international debate about changing privacy
in the new technologies’ reality.
Katarzyna Witkowska
University of Lodz
11 | P a g e
Secrets of State and the Right of Access in Spain after the approval of the Law on
Transparency
Thirty eight years have passed after its approval and the Spanish Constitution not only has
not been fully developed but it seems to have arrive at its very end, in the middle of current
circumstances of deep economic and political crisis. Constitutional institutions had had
mixed fortunes and modern politico- legal trends such as transparency as principle of law
had had little resonance among the Spanish political authorities.
After 10 terms in office, no government has seriously considered the need to replace the
Francoist Official Secrets Law (Law 9/1968 , revised by Law 48 /1978), by a law adapted to
the current democratic and advanced times in the context of the technological revolution
and the era of open governments. It is not easy to guess which ones might be the reasons
that explain why the development of data protection, for example, is widely detailed in
Spain, and, on the contrary, no political figure until almost now had sought to face the
regulation of the right of access or of transparency or the replacement of legislation on
State secrets. The coincidence of the three institutions in the common area of
administrative policy is striking, in particular, considering the huge development of Private
Law in Spain.
The passing of the Act on Transparency at the Senate (November 27, 2013) leaves it only
pending of its publication in the Official Gazette to be a law. Consequently, such a statute is
to create a new framework where to reinterpret the existing Official Secrets Act, by
definition opaque and, in this case, dictatorial, or compels to finally consider a new Official
Secrets Act that fits in the geopolitical position of Spain and in its strategy on domestic
policy and that could help to save the country of the crisis the current regime is undergoing.
M. Pilar Cousido González
Prof. Titular UCM, Visiting Prof. Winchester University
12 | P a g e
Blinding the leviathan: encryption, surveillance and the digital state of nature
States use surveillance to keep their citizens safe and protect the regime. The digital
surveillance limits the digital autonomy that many individuals expect the state to respect. In
response, they use encryption to protect their digital autonomy. As encryption allows the
individual to demarcate a space that the state cannot penetrate without great effort or
without clear justification, it creates a challenge to the state’s authority. In domestic politics,
the state can justify its sovereignty through the rule of law, which reflects its legitimate
political authority. Outside the state, the state does not have to rely upon the rule of law
because it is beyond the bounded political sphere. In political terms, the digital domain
presents a problem because it offers no immediate way to distinguish between friend and
enemy. The difference between foreign and domestic, bound up with the idea of
sovereignty, is a central tenet of the modern social contract that began with Hobbes. In
particular, the Leviathan determines the exception not the individual. Encryption inverts
that relationship.
The paper uses Hobbes’ social contract theory in the Leviathan to analyse how encryption
returns us to the digital state of nature by limiting the Leviathan’s capacity to enforce the
rule of law in the digital domain. I review the writings by Scheier and other technology
writers on digital encryption as a response to the surveillance state. I then draw on Carl
Schmitt’s critique of liberalism regarding the exception. I argue that encryption undermines
liberalism. The state cannot enforce rights and sustain equality unless it can stop those who
want to live beyond the reach of the law. As the law requires surveillance and encryption
hinders that surveillance, the rule of law is weakened. The leviathan is blinded.
Lawrence Serewicz
13 | P a g e
Electronic surveillance, fashion, marketing & the law
With 2014 being dubbed the year of wearable tech and with apps such as ‘NameTag’
promising to make facial recognition and profile matching available to the masses, will
everyone now be regarded as a ‘data controller’ and if so, how can the law respond to the
rise of smart-phone and wearable surveillance technology? The privacy issues are all too
evident but with the take-up of wearable tech by high fashion brands, will the desirability of
wearable tech override privacy concerns or will consumers be put off by the intrusive
factor? And what might fashion offer those consumers who feel a growing need to exert
control over their loss of privacy? Might their dress of metallised fabric protect against
thermal surveillance from drones, or inhibit incoming and outgoing iPhone signals or act as
camouflage, both as deception and decoration, which protects from intrusion?
Combining fashion marketing, dress history and legal elements, this inter-disciplinary paper
will explore a possible future where the law has failed to respond swiftly and adequately to
technological innovations, leaving consumers to take matters into their own hands, using
fashion and dress to prevent surveillance or to indicate their lack of consent, eventually
generating a new societal norm.
Savithri Bartlett, University of Winchester
Matteo Montecchi, University of the Arts London, London College of Fashion
Marion Oswald, University of Winchester
14 | P a g e
Privacy, the impact of anonymisation & the ICO's Code
Iain will discuss his involvement with ICO’s work on privacy and anonymisation and the
impact of the ICO’s anonymisation code on year on.
Iain Bourne
Group Manager (Policy Delivery Department)
Information Commissioner’s Office
15 | P a g e
Do the Benefits of Voluntarily Reporting Serious Data Breaches to the ICO Outweigh the
Risk of Monetary Penalties?: A Theoretical Analysis
The Upper Information Rights Tribunal recently held that controllers not required by law to
report data breaches are still subject to monetary penalties even if they voluntarily report a
breach. The ICO and some information law experts stated that this holding notwithstanding,
the economic benefits of self-reporting still outweigh the risk of penalties since the ICO
considers self-reporting a mitigating factor in determining the amount of any fine. This
paper attempts a theoretical analysis of controllers’ risk calculi to determine if they are truly
better off self-reporting breaches.
Based on historic ICO data, we first examine the claim that self-reporting mitigates a
penalty’s magnitude. We then investigate whether the mitigation of penalty amounts alone
is sufficient to persuade controllers that they are better off self-reporting given their
“chances of being fined.” Conventional models use a fixed value for this probability in
analyzing economic benefit. Through the employment of the principle of perspectivity, we
show that for these models to accurately reflect experience we must modify our definition
of the “chances of being fined” and factor in a controller’s decision to report or not report.
Modifying the traditional models accordingly, we conclude that controllers as a population
are currently not better off self-reporting. We close by offering specific suggestions for the
ICO to create conditions where controllers will be better off self-reporting breaches even if
they are fined.
J. Manhire
Visiting Faculty, Treasury Executive Institute, USA
16 | P a g e
Towards a Risk-Based Approach to Data Protection: Economic Efficiency at the Expense of
Fundamental Rights Efficacy?
The EU introduced data protection legislation on the legal basis that it was necessary for the
completion of the EU’s internal market and for the free movement of personal data
throughout the EU. Nevertheless, EU data protection regulation also serves the purpose of
protecting the fundamental rights of individuals. This dual purpose for data protection
regulation makes it difficult to categorise from a regulatory perspective as it encompasses
elements of both economic and social regulation. However, recent negotiations on the EU’s
draft Data Protection Regulation reveal that numerous EU Member States now favour a riskbased approach to data protection regulation.
This paper sets out to examine to what extent the adoption of a risk-based approach to data
protection law will strike the right balance between economic efficiency and fundamental
rights efficacy. From a substantive perspective, the attraction of risk-based regulation is that
it has the potential to ensure that the regulatory burden placed on those who process
personal data remains proportionate to the nature and the extent of their activities. In this
sense, it is economically efficient. Nevertheless, the pitfalls of adopting a risk-based
approach to personal data processing are also immediately obvious. For instance, how can a
data processor determine the level of risk particular processing entails for an individual? A
risk-based approach to data protection therefore also has the potential to lower the current
level of fundamental rights protection afforded to individuals. Moreover, from a procedural
perspective, national data protection authorities, constrained by austerity measures, are
prioritising their work. Some, such as the UK’s ICO, have stated they will focus their limited
resources on tackling ‘systemic problems ahead of individual lapses’. Such prioritization,
stemming from economic necessity, is arguably a procedural reflection of ‘risk-based
regulation’ and will also be analysed in this paper.
Dr Orla Lynskey
Lecturer in Law
London School of Economics
o.lynskey@lse.ac.uk
17 | P a g e
Contemporary evolutions of EU Personal Data protection: the risk management of
everything?
The aim of this contribution is to provide a critical analysis on the emergence of “risk
discourse” and risk management techniques in EU legislation on personal data protection.
It takes as a point of departure the on-going overhaul of EU personal data protection
legislations, and observes that new provisions on the management of privacy and data
protection risks are to be found in the European Commission’s proposal for a General Data
Protection Regulation, that of the DAPIX, as well as that of the LIBE Committee of the
European Parliament.
It relates the emergence of these provisions notably to Michael Power’s work on “The Risk
Management of Everything” and argues that they are thus yet another occurrence of the
trends therein described.
However it also makes the point that though these risk management provisions are new
indeed, it can be demonstrated that to some extent data protection has been a risk
regulation regime since its very inception.
The question it then asks is the following: if data protection has always been about the
regulation of risks (to citizens’ fundamental rights), then it might allow for another account
to the regulation of risk than that of risk management.
Could this alternative account be related to the precautionary principle? And if so, how?
Raphaël Gellert
Ph.D. candidate
Vrije Universiteit Brussel, Law, Science, Technology, and Society (LSTS) research group
raphael.gellert@vub.ac.be
18 | P a g e
Through a Glass Darkly: Revisiting Information as Property in Boardman v Phipps [1967]
The Court of Appeal in the recent case of Fairstar Heavy Transport NV v Adkins [2013] EWCA
Civ 886 left open the question of whether, or how, proprietary constructions may contribute
to protection against the risk of abuse of information. For the argument against information
as property, the judge (a point seemingly affirmed in the Court of Appeal) relied on
Boardman v Phipps [1967] 2 AC 46. This is despite the fact that, of the three majority
opinions in Boardman, two stated that the trust information in the case was property and
the third, while inconclusive, was far from dismissive on the point. Boardman is a
notoriously difficult case. As typified in Fairstar, later judges have read into it or taken from
it what was necessary to justify the instant decision, creating a façade of stability which may
be illusory.
The object of this paper is to revisit constructions of property in Boardman in the context of
orthodox proprietary reasoning, and especially relative to Fairstar. The analysis focuses on
the tension between the dominant textual approach, which expounds the words in a
judgment, and the historical approach, which is based not merely on what is stated, but
why. In particular, the paper considers if problems of language in eliciting ratio decidendi
have excluded more fruitful contributions to the discourse on the protection of information.
Louisa Dubery
Senior Lecturer in Property Law
University of Winchester
19 | P a g e
NEISAS - A pilot system for secure information sharing in critical infrastructures
In the various sectors of critical infrastructure (communications, emergency services,
energy, financial services, food, government, health, transport, and water), the sharing of
information between the public and private sector is of primary importance in helping to
preserve the confidentiality, integrity and availability of information, and especially the
integrity and availability of services.
Between 2009 and 2011, a pilot project funded by the European Commission – the National
And European information Sharing and Alert System (NEISAS) developed a means of
exchanging vital information in a secure manner between private sector organisations and
public sector agencies.
The project addressed in particular the need to ensure that all contributors could use a
common methodology centred at the time around the ISO/IEC 27010 draft standard, which
NEISAS helped to develop, and which deals with the security aspects of transfer of
information between organisations.
Next, the project ensured that information was classified using the so--‐called ‘traffic light
protocol’ which, as the name suggests, classifies information as red, amber and green
according to its sensitivity and need for protection. NEISAS also addressed the need for
anonymity in cases where an organisation might suffer embarrassment or reputational
damage if details about impacts to its operations became public knowledge. This was
addressed through the principle of using a trusted intermediary or Trust Master to
anonymise the information.
The next objective of the project was that of information rights management, in which the
actions that recipients could take with information they receive could be tightly controlled
and previously posted information could be withdrawn.
Finally, as this was an EU--‐wide project, the need for sharing information across national
borders was key to its success, as was the need to share information between the different
critical infrastructure sectors.
David Sutton
tacit.tel limited
20 | P a g e
The push for open data: should EUL be replaced with OGL?
ONS has a publicly declared commitment to the government’s transparency agenda. As part
of our output range, ONS produce over 250 End User Licence microdata files which provide
users - typically researchers - access to a huge range of social survey data such as the Labour
Force Survey and Living Costs and Food Survey. The files have been anonymised so that the
risk of disclosure is remote, however in addition users must agree to certain conditions of
access.
This paper discusses issues of disclosure in considering whether the End User Licence (EUL)
could potentially be replaced by an Open Government Licence (OGL). This requires careful
assessment of probability of disclosure and how it might be used as evidence within the law.
We provide an overview of the work Manchester University have carried out in helping the
ONS to address this issue.
Dr Caroline Tudor (Office for National Statistics) and Dr Mark Elliot (Manchester
University)
caroline.tudor@ons.gsi.gov.uk, mark.elliot@manchester.ac.uk
21 | P a g e
Trust and the International Exchange of Forensic Information.
While policing and judicial cooperation across international borders has been an
expectation for many years, increasingly, strategies to combat terrorism, organized and
serious crime, incorporate the exchange of forensic information. While informal forensic
cooperation is not wholly novel, often having been undertaken on an ad hoc basis in
response to a particular event, exchange capabilities and initiatives are now numerous and
formal bilateral and multi-lateral agreements to exchange forensic data between countries
proliferate apace. Since the Prüm Treaty of 2005, automated exchange of DNA profiles and
dactyloscopic data (fingerprints) has become mandatory across the EU. Such increasing
demand and capacity for the extra-territorial exchange of forensic information between law
enforcement professionals and agencies, mean that there are growing numbers of criminal
investigations where evidence may have been collected, examined, or interpreted across
national borders.
As well as presenting technological challenges, mutual assistance in evidence-gathering and
utilization pose important and urgent questions. Attempts to regulate case-based forensic
practice across the EU have barely commenced and time is still needed for regulation to
‘bed-down’. Yet as forensic technologies become more sophisticated, there is the threat
that the technology progresses faster than the law, social and political systems can utilise,
and importantly, regulate them. Those developing the technology (scientists), and those
charged with utilising it (police and legal authorities), however, (understandably) focus upon
technical issues, rarely interrogating the complex inter-relationship between trust,
confidence, control, security, inter alia. The social and ethical challenges facing the
utilisation of forensic information shall thus be the focus here, considering how the
‘integrity’ of forensic information plays an essential role in the production and maintenance
of ‘trust’: a critical factor in international policing cooperation.
Carole McCartney
Reader in Law
School of Law
Northumbria University
22 | P a g e
The governance of genetic information: a view from the trenches
Since the sequencing of the human genome and the advent of new and increasingly
accessible technologies, the “genomic revolution” poses ethical, legal and social challenges
on a scale proportional to the unprecedented volume of data that has become and
continues to become available through public repositories and biobanks. As geneticists
plough quietly through data to infer gene function, and link it to clinical records to find
association with traits and diseases, ethicists voice concerns about individual rights to
privacy, confidentiality, autonomy and self-determination being undermined, but are they?
Current governance models of biobanks include the anonymisation of genetic information
and various forms of informed consent. These checks and balances are the “gold standards”
of ethical practice but have been criticised as ineffective and bureaucratic. Why are
anonymisation and consent so problematic? Can scientists not be trusted with sensitive
information? What are the real threats to individual liberties if any at all? In part, the nature
of DNA material is itself to blame. Genetic information is as much about the individual as it
is about his or her “connected others”. Thus, models of governance based on a postenlightenment individualistic discourse will inevitably fail to offer adequate ethical
protection, whilst a move towards governance modes that encapsulate the collective nature
of DNA data (e.g. through group consent) provoke fears that individual choices may not be
adequately represented. Moreover, the biobanks’ potentially indefinite capacity to expand
and link genetic data with other types of data means that the possibility of re-identification
by cross-referencing makes anonymity next to impossible, and given that future findings
cannot be predicted, regulation requires not rigid governance models but adaptable and
reactive mechanisms. In this talk I review current trends in biobank governance, with
particular emphasis on issues of privacy (anonymisation), autonomy (consent) and trust
arising from population based research in an attempt to offer an ethical perspective from
the embattled scientist’s trench.
Maru Mormina
Senior Lecturer in Forensics
University of Winchester
23 | P a g e
Should the Law Prescribe Statistical Disclosure Control?
The government's transparency agenda reflects a heightened awareness of the benefits that
can be derived from improved access to data. However, the sharing and linking of data
across governmental agencies and services, and with private entities, combined with the
recent lowering of the bar to data release by way of the government's transparency agenda,
increases the likelihood that the identities of persons on whom sensitive data are
collected will inadvertently be disclosed. Even so, the importance of data linkage to the
development of evidence-based public policy cannot be overstated. New statistical
disclosure control methods are needed in this context to enable wider distribution of
record-level data, methods that will ensure that the informational content of data is
retained while the risk of inadvertent breaches of confidentially is quantified, reduced and
managed.
This paper reports on a new approach and method for statistical disclosure control that
finds and targets for protection only the most sensitive data. This approach is applied to
data from the Myocardial Ischaemia National Audit Project (MINAP), a national clinical audit
of the management of heart attack commissioned by the Healthcare Quality Improvement
Partnership (HQIP). It is shown that the insertion of small, targeted amounts of synthetic
data into records for public release helps ensure that the informational content of the data
as a whole remains as intact as possible while confidentiality is substantially enhanced.
In light of these developments we consider whether regulation of the use of statistical
disclosure control methods on record-level data may be necessary. We develop some
thoughts on how disclosure control could be regulated and outline the potential benefits
and drawbacks of a legal approach.
Emmanuel Lazaridis
Senior Information Analyst
National Institute for Cardiovascular Outcomes Research Institute of Cardiovascular Science
University College London
24 | P a g e
The people v Facebook: the transparency of privacy policies
According to Kosinski et al. (2013), digitally mediated behaviours can easily be recorded,
analysed and use to accurately predict a range of highly sensitive personal attributes
including personality traits, sexual orientation, ethnicity, religious and political views.
One may agree with Warren and Brandeis´ statement in their classic approach on The Right
to Privacy that: “There are others who, in varying degrees, have renounced the right to live
their lives screened from public observation.” Thus, if we share with our friends personal
photos on Facebook, it might be reasonable to wonder, as Eady J. did in Mosley case (2008),
to what extent we are the authors of our “own misfortune”.
Sponsored stories are one of the last concerns on privacy protection. According to his
Statement of Rights and Responsibilities, Facebook users agree to the following: firstly, to
“give us permission to use your name, profile picture, content, and information in
connection with commercial, sponsored, or related content (such as a brand you like) served
or enhanced by us”; secondly, Facebook states that it “will not give your content or
information to advertisers without your consent.”
The wording of the statement is anything but clear. Whereas paragraph (1) suggests that
users have no choice to object Facebook disclosure of their content and information;
paragraph (2) seems to say the opposite: that explicit consent is required for such
disclosure.
In the light of the principle of transparency, as set forth in the EU Proposal on General Data
Protection Regulation (2102), this paper shall analyse whether privacy policies of Facebook
are easily accessible and understandable or make use of a clear and plain language. A survey
conducted by the authors shall reveal privacy policies are not transparent enough and to
what extent users cannot make an informed decision on whether they should exchange
their personal data stored on their account.
PhD. Estrella Gutiérrez
Information Law Lecturer at University Carlos III of Madrid and ICT Lawyer
Lucía Herrero
Corporate Lawyer
Universidad Carlos III de Madrid
25 | P a g e
The right to be forgotten in the age of Big Data
The increasing ability to analyze data represents well-recognized benefits for both
companies and individuals, enabling them to provide and receive more accurate information
and better adapt their private and business choices. However, given the increased volume
of data creation, usage and storage, as well as the growing velocity with which it is used and
exchanged, direct implications may be identified for privacy rights. As more data, from more
sources, assembles around a single individual, reliable protection of identity may easily be
compromised. Therefore, privacy shall not anymore be viewed as a personal good and a
matter of individual responsibility, but rather as a societal one, to be protected by public
rules.
These concerns are reflected in the debate around the recently proposed European
legislation which includes a ‘right to be forgotten’ that is aimed at helping individuals better
manage data protection risks online by requiring organizations to delete their data. While
this right allows individual to control the public dissemination of private information, it is
clear that it cannot amount to a right of the total erasure of history. Neither must it take
precedence over freedom of expression or freedom of the media. Therefore, several points
need yet to be clarified: what type of data are concerned, who the data controller precisely
is, till what extent the purpose of data processing may evolve and be enlarged, what kind of
technological measures may be implemented, how to reach data that is being shared by
multiple users, how this right may be enforced in a system that is open and global by
definition, is the concept of privacy by design any response to the debate, etc. As long as all
these questions remain unanswered, the constant reuse of our data will represent an
important threat to our privacy.
Monika Zwolinska
University of Nice - Sophia Antipolis
26 | P a g e
Download