Who the Hell is Digital Privacy About?!?

This may sound absurd to some of you that either speak with me on a regular basis, or that have been reading this blog or others that I frequent on a regular basis: I sometimes struggle to offer a concise, clear, sound answer to this post’s topic.

I don’t necessarily see this as a failure, but (perhaps as a self-defence mechanism) more as proof that I need to work on condensing my ideas into ‘bite-sized’ fragments that I can then build the big picture from. I know, it sounds silly easy but I often have problems condensing problems to make them immediately approachable to other. So, you ask me, why do I persistently worry about privacy in the digital space? Common reasons why individuals aren’t concerned with their privacy follow (in no particular order, and not a comprehensive list):

  1. If it means that business can make things cheaper than me, then who cares?
  2. If it means that my children are safer, or that criminals are more effectively prosecuted, then who cares?
  3. As long as it doesn’t interfere with my daily life, then who cares?
  4. If I have nothing to hide, then what do I care?
  5. If it safeguards me from terrorism, then who cares?
  6. If it only affects people in other nations, then who cares (more of an American position, but it’s important to deal with)?

I can’t spend too much time on these, but I want to address most of them, in part so that I can steal from this post in the coming weeks.

Continue reading

Global Privacy and the Particular Body Politic

Different countries have different privacy laws, and different attitudes towards what should be counted as private information. As Peter Fleischer rightly notes, this often means that citizens of various nation-states are often confused about their digital privacy protections – in part because of the influx of foreign culture (and the presumed privacy standards in those media) – and consequently are unaware of their nation’s privacy resources, or lack thereof.

Google Corporation has recently begun to suggest that a global data protection system has to be implemented. In his private blog (which isn’t necessarily associated with his work with Google) Fleischer notes that,

…citizens lose out because they are unsure about what rights they have given the patchwork of competing regimes, and the cost of compliance for businesses risks chilling economic activity. Governments often struggle to find any clear internationally recognised standards on which to build their privacy legislation.

The ultimate goal should be to create minimum standards of privacy protection that meet the expectations and demands of consumers, businesses and governments. Such standards should be relevant today yet flexible enough to meet the needs of an ever changing world. Such standards must also respect the value of privacy as an innate dimension of the individual . . . we should work together to devise a set of standards that reflects the needs of a truly globalised world. That gives each citizen certainty about the rules affecting their data, and the ability to manage their privacy according to their needs. That gives businesses the ability to work within one framework rather than dozens. And that gives governments clear direction about internationally recognised standards, and how they should be applied. (Source)

Continue reading

So…You Want to Redefine ‘Privacy’, eh?

There has been a sustained argument across the ‘net and in traditional circles, that privacy is being redefined before our very eyes. Oftentimes, we see how a word transforms by studying its etymology – this is helpful in understanding the basis of the words that we utter. What do we do, however, when we work to redefine not just a word’s definition (such as what the term ‘cool’ refers to) but its normative horizons?

In redefining the work ‘privacy’ to account for how people are empirically protecting their privacy, are we redefining the word, or the normative horizon that it captures? Moreover, can we genuinely assume that the term’s normative guide is changing simply because of recent rapid changes in technology increase the difficulty in exercising our right to privacy in digitized environments? To argue that these normative boundaries are shifting largely because of how digital networks have been programmed presupposes that the networks cannot be designed in any other way, that digital content will flow as it does now the same way that gravity acts on our physical bodies as it presently does. The difficulty in maintaining such an analogy is that it assumes that there are natural laws to an immanent programming languages that structure how we can participate in digital environments.

Continue reading

Social Networking – Why We Need to Educate Youth

This is a short post, but gives three definitive examples of why we need to develop and instill norms in youth concerning how to use digital resources.

Let’s help this woman find her camera!

Here’s the story (remember that…story).

In Britain a young woman (unfortunately) lost her camera. Some delightful chap decided that, rather than keeping the camera to himself, he’d try to get it back to her. Problem: he didn’t have her name, address, or anything that identified her beyond the pictures on the camera. Solution: post all of the pictures from the camera on Facebook and encourage tons of people to join the group the hopes that someone recognizes her. Problem: the embarrassment of having adult and non-adult pictures of yourself posted on the net.

Now, it turns out that this whole thing was viral marketing – the woman is an adult model and this was intended to promote a particular adult website. Nevertheless, based on the posts in the group that was set up, people saw this as a legitimate way to deliver missing property – many didn’t see anything wrong with deliberately posting pictures of a woman in various states of dress without first receiving her willful consent.

Continue reading

Education, Social Networks, and Privacy

In this post I want to consider privacy from a bit of a ‘weird’ point of view: What information do you want students to reveal to each other and yourself, and what do you want to reveal to them? What ethical responsibilities do educators have to their students concerning their disclosure of information to one another?

In many classrooms, instructors and their students develop bonds by becoming vulnerable to one another by sharing personal stories with one another. ‘Vulnerability’ should be understood as developing a rapport of trust that could be strategically or maliciously exploited, though there is not an implicit suggestion that vulnerability will necessarily lead to exploitation. Some of the best teachers and professors that I have ‘revealed’ themselves as human beings – once I saw that they were like me I felt more comfortable participating in the classroom environment. With this comfort and increased participation, I developed more mature understandings of subject material and my personal stances regarding it. The rapports of trust that I developed with faculty led to the best learning environments I have ever experienced.

Continue reading

Education, Web 2.0, and Privacy

I have a lot that I could talk about here, but rather than working through philosophical arguments for the value of privacy in education, I want to constrain myself to establishing some key points that educators should be mindful of when using Web 2.0 applications in the classroom. I begin by listing a series of factors that organizations should consult to determine if they are collecting personal information, and then follow by talking about the value and importance of privacy statements. I will conclude by providing a brief (and non-comprehensive) list of personal information that educators probably want to keep offline, unless their University can provide granular access to the information.

Is this information personal information?

Pretty well all Web 2.0 tools gather some kinds of data from individuals that use them, be it in the form of email addresses, Internet Protocol (IP) addresses, telephone numbers, messenger names, or social networking information. Before deploying any Web 2.0 technology it is important for organizations to determine whether they are capturing what is identified as ‘personal’ data, and can do so by reflecting on the following factors:

Continue reading