Examples of how ICT may/can breach civil rights
Surveillance Cameras- having surveillance cameras is not illegal but how you use the video in the surveillance camera sometimes may breech civil right. Putting the video online or broadcasting it to everyone may be considered as illegal.
Phone hacking- is illegally listening to the voicemails or conversation of a mobile phone without the consent of the phone’s owner. Mobile phone hacking can also mean intercepting mobile calls to listen, taking control of the phone to receive copies of text messages etc.
Phone hacking has been all over the news this recent years and the biggest talk is the News of the world. This is an article: http://www.bbc.co.uk/news/uk-16265505
The Internet
How Internet-related civil rights covered by current law?
The UN Universal Declaration of Human Rights and the ECHR both contain articles relating to freedom of thought, expression and association. The ECHR also contains an article relating to the right to private life and private correspondence. Article 19 of the UN Universal Declaration of Human Rights states:
Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers
Is there an alternative model for Internet rights?
Many governments have promoted rights for electronic commerce and strengthened intellectual property rights, but few have done parallel work to represent the interests of the general public. They believe that the new digital media, there has been no specific move to protect rights to access and use information and communications technologies.
The Association for Progressive Communications has been developing a Charter for Internet Rights as part of its work on Internet rights. It sets out seven key themes:
- The right to communicate
- Freedom of expression and information exchange
- Diversity of content, ownership and control, and the protection of user rights
- The licensing and control of intellectual property
- Privacy
- Global, regional and national governance of the Internet
- Rights awareness and realisation of rights
Data Protection Act 1998
Data protection act 1998 covers how information about a person is used and stored. This act is a UK law on processing data on identifiable living people. It requires protecting people’s fundamental rights and freedoms to the processing of their personal data. It provides a way for individual to control information about themselves and anyone holding personal data for other purpose is legally obliged to comply with this Act.
This act covers 8 data protection principles:
- Personal data shall be obtained only for lawful purposes
- Personal data shall not be transferred to a country without adequate protection
- Personal data shall be processed fairly and lawfully
- Personal data shall always be accurate and up to date
- Personal data shall be adequate, relevant and not excessive and other data needed may be used
- Personal data shall not be kept for longer than necessary for that purpose or purposes
- Rights of individuals, you should have the right to have data about you removed
- Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data
Computer Misuse act is an act of the UK Parliament in 1990. It’s design to stop computer/internet crimes as hacking into other people’s computer or system, helping a person to gain access to protected files on someone else’s computer.
It’s split into sections
- Accessing computer material without permission with intent to commit further criminal offences. EG hacking into bank’s computer and wanting to put more money into your account
- Changing or altering computer data without permission. EG writing a virus to someone else’s data
How can you or how to prevent computer misuse?
- Closing down chat rooms
- Some chat rooms have moderators who help to prevent abuses
- Reduce email spamming
- Never reply to anonymous emails
- Setting filters on your email account
- Reporting spammers
- Security
- Keeping their data safe with “backups” and sufficient security with passwords
No comments:
Post a Comment