According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand, the privacy protection norm is dominated by privacy rights. The European Union, for example, requires Member States to include comprehensive statutory protections for its citizens when it comes to privacy rights.
The fact that the electronic flow of information occurs on an increasingly global platform has complicated the issue, as divergent national norms and statutes confront each other with increasing frequency where privacy protection is concerned. The various national responses to the terrorism issue is a further complicating factor. The international policy confrontations regarding privacy protection for citizens ultimately resulted in prolonged international negotiation, and finally in a compromise known as the "Safe Harbor" agreement (Long and Quek 2002: 326). In this compromise, the somewhat stringent privacy requirements to protect EU citizens were relaxed to match the more lenient requirements by the United States. The purpose of the agreement was to facilitated electronic commerce between EU countries and the United States.
Where the EU then operates from a basis of privacy rights for citizens, other countries, like the United States, tend to again focus upon a more government-centered view, where national security and other political issues dictate privacy laws. This has been a particular issue in the years after 9/11, while still remaining controversial in the political and e-commerce arenas. Horn, writing in 2002, addresses some of the issues that created controversy in terms of the conflict between privacy rights and security after the 2001 attacks.
Horn (2002: 2234) addresses the specific concern of privacy advocates regarding electronic surveillance paradigms in the United States. Indeed, both privacy advocates and citizens in general have displayed an increasing distrust of electronic devices used by law enforcement agencies for electronic surveillance of suspects. The author notes that such distrust may not be displaced. The Carnivore system created by the FBI for example is the focus of such distrust. The system was created to intercept and collect electronic communications where criminal activity was suspected. As justification, the reason for the new system was that criminals are increasingly sophisticated in their use of the Internet for illegal activities. To counter this, Carnivore is installed on a computer network -- generally those of Internet Service Providers (ISPs) to capture and store information running through these networks.
Significantly, the system has been in existence since 1997, but only became known to the public in 2000 (Horn 2002: 2235). This resulted in significant controversy regarding the control the government and law enforcement have over citizens and their use of private information. While some have acknowledged the importance of electronic surveillance to ensure the safety of citizens, others believed that Carnivore and other electronic surveillance systems are simply too invasive, particularly in cases where no criminal activity has been proven.
This is also the case with the "War on Terrorism." Citizens and privacy advocates alike have increasingly voiced their concern over the increasing power of the government and law enforcement agencies to engage in surveillance of private citizens without their knowledge (Soma et al., 288). In addition to privacy rights, these activities have also resulted in controversies regarding the Constitution. Indeed, especially during the early part of the decade, there were numerous reports of profiling and general government harassment that targeted certain nationalities under the umbrella of "suspected terrorism." It therefore appears that privacy rights in the European Union have enjoyed greater constitutionality than those in the United States. It is however also important to make a specific comparative study of these issues in various major countries to obtain a more global view of how privacy and its variety of related concepts manifests itself across the world. Furthermore, the issue of terrorism and other types of crime also manifests itself in a variety of differential ways across national borders. All these issues have significant effects upon privacy rights and issues.
7.2
Impact of Telecommunications Interception and Access Law on Privacy
As seen above, the impact of telecommunications interception on privacy was varied since the time of its inception. With the development of technology today, this is becoming an increasingly important as well as controversial issue. Indeed, a variety of laws and policies have been implemented in order to mitigate the negative impacts of telecommunications interception on privacy and the rights that go along with it. It is also important however to consider what is being protected apart from human rights; the free flow of...
Telecommunication equipment industry has undergone drastic developments and changes since the 1990s. The telecommunication equipment industry has become quite popular due to the tremendous increase in the use of communication services all over the world. This paper provides a deep insight into the major manufacturers involved in the telecommunication equipment industry. It also highlights the core policy transformations and privatization changes occurring in the global telecommunication industry which is affecting
An example of this is how quickly Microsoft responded to their exclusion of the Internet as a viable strategy shift. Using a global telecommunications system and their global knowledge management network, they were able to quickly devise a product roadmap and recruit developments who knew the Web development platforms better than anyone did globally. This shift in strategy saved Microsoft from facing a daunting task of playing catch-up to
Track II diplomacy takes over when Track I fails. A third great revolution has been described as enveloping the world in modern times (Wriston 1997) and the catalyst has been technological change. Technology, or telecommunications, has astoundingly affected the sovereignty of governments, the world economy, and military strategy. What took a century for the Industrial Revolution to do is nothing like what the combination of computers and telecommunications has been
The law's intended purpose of preventing and detecting future attacks was the dominant concern of lawmakers. Yet, the hasty manner in which the law passed through Congressional lawmaking processes causes opponents to argue that lawmakers gave disproportionate consideration to the law enforcement and intelligence community's viewpoint in drafting the provisions. It is thought that in the future the law will face many challenges in the court system. Even though
Cultural shifts and changes will always affect World-Wide communications because as culture changes so too does the manner in which people do business. World-Wide telecommunications are constantly adapting to meet the needs of modern man as man progresses into the next century. Cultural shifts and changes occur as a result in part of technological changes that allow men to communicate in more efficient and productive ways. As technology continues to
Technology There are elements that drive successful technology and telecommunications integration and planning for an organization. Management needs to prioritize and evaluate technology used by the organization in day-to-day operations to identify which processes are critical to the organization's ability to conduct operations and which processes can be put on hold during an emergency. Scrambling to deal with technology issues once a disaster has hit is guaranteed to cost an organization. According
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now