Right to Privacy
1. what is
the right to privacy?
¡á Right to be alone
According to the Article
12 of the Universal Declaration of Human Rights, right
to privacy means that you should be free in terms of
your private life, home, place of residence and communications.
Article
12 Anyone
should not be interfered in their private
life, home, place of residence and communications.
Their reputation and credit should be protected
in terms of those matters. Everyone should
be duly protected by the laws. |
Therefore the primary
concept of right to privacy is the right to be alone
or the right to enjoy own private life without interferences
of others. This concept mainly concerns possible interferences
in private life. Specifically, the privacy right means
as follows;
- Banning
plagiarism: names or pictures should not be commercially
used without the consent of the owner. - Banning
trespassing: no one should break into private properties,
eavesdrop private conversation or communication.
Pictures should not be taken without the consent.
- Banning
defamation: no one should make any public statements
that may cause a wrong impression on the public
in relation to a certain individual, or announce
what could be unfavorable to an individual.
¡á Right of self-decision,
self-control on one's own personal information
Since 1970s, as computer
technologies have been actively introduced and developed,
people's private lives have been compromised due to
exposures of personal information. For example, commercial
and advertisement mails have started to flood mailboxes
and the number of door-knocking salespeople has increased
due to the huge of amount of personal information gathered
through whatever means. Thereby, right to privacy came
to take on another concept. Now it came to mean the
right of self-decision, self-control on one's own personal
information.
The 1980 OECD privacy
guidelines explain clearly the concept of the right
of self-decision, self-control on one's own personal
information. ¡®Personal information¡¯ means any information
that is distinct enough for others to distinguish the
owner of the information such as names, personal identification
numbers, letters, voice and images. It also includes
information regarding everyday lives, activities and
work performances. Even if specific information does
not mean anything to others, it should be considered
as personal information when it does tell something
about individuals once it gets combined with other information.
OECD
recommendation concerning and guidelines
governing the protection of privacy and
transborder flows of personal data
1) Collection
Limitation Principle There should be limits to
the collection of personal data and any
such data should be obtained by lawful and
fair means and, where appropriate, with
the knowledge or consent of the data subject:
2) Data
Quality Principle Personal data should be relevant
to the purposes for which they are to be
used, and, to the extent necessary for those
purposes, should be accurate, complete and
kept up-to-date.
3) Purpose
Specification Principle The purposes for which personal
data are collected should be specified not
later than at the time of data collection
and the subsequent use limited to the fulfilment
of those purposes or such others as are
not incompatible with those purposes and
as are specified on each occasion of change
of purpose.
4) Use
Limitation Principle Personal data should not
be disclosed, made available or otherwise
used for purposes other than those specified
in accordance with Paragraph 9 except: (a)
with the consent of the data subject; or
(b) by the authority of law.
5) Security
Safeguards Principle Personal data should be protected
by reasonable security safeguards against
such risks as loss or unauthorised access,
destruction, use, modification or disclosure
of data.
6) Openness
Principle
There should be a general policy of openness
about developments, practices and policies
with respect to personal data. Means should
be readily available of establishing the
existence and nature of personal data, and
the main purposes of their use, as well
as the identity and usual residence of the
data controller.
7) Individual
Participation Principle An individual should have
the right: (a) to obtain from a data controller,
or otherwise, confirmation of whether or
not the data controller has data relating
to him; (b) to have communicated to him,
data relating to him (i) within a reasonable
time; (ii) at a charge, if any, that is
not excessive; (iii) in a reasonable manner;
and (iv) in a form that is readily intelligible
to him; (c) to be given reasons if a request
made under subparagraphs (a) and (b) is
denied, and to be able to challenge such
denial; and (d) to challenge data relating
to him and, if the challenge is successful,
to have the data erased, rectified, completed
or amended.
8) Accountability
Principle
A data controller should be accountable
for complying with measures which give effect
to the principles stated above. |
These guidelines
have formalized the right to decide and control personal
information by oneself by supporting that information
should be obtained with the clear knowledge and consent
of the subject regarding the purposes of the collection
of information. Furthermore, individuals should be informed
of the existence of their personal information and have
the right to view, correct and request the removal of
the information.
They emphasize that the
ultimate right over decisions regarding collecting and
usage of personal information should not reside on either
governments or firms, which collect personal information,
but individuals that is the owner of the information.
That is why the OECD recommendation is regarded as meaningful
guidelines to human rights in the age of information
society.
Since the publication
of the guidelines, many governments have introduced
similar laws and established supervisory authorities
to protect personal information. The UN also adopted
its own guidelines concerning computerized personal
data files in 1990.
United
Nations Guidelines concerning computerized
personal data files
1) Principle
of lawfulness and fairness Information about
persons should not be collected or processed
in unfair or unlawful ways, nor should it
be used for ends contrary to the purposes
and principles of the Charter of the United
Nations.
2) Principle
of accuracy Persons responsible for the compilation
of files or those responsible for keeping
them have an obligation to conduct regular
checks on the accuracy and relevance of
the data recorded and to ensure that they
are kept as complete as possible in order
to avoid errors of omission and that they
are kept up to date regularly or when the
information contained in a file is used,
as long as they are being processed.
3) Principle
of the purpose-specification The purpose which
a file is to serve and its utilization in
terms of that purpose should be specified,
legitimate and, when it is established,
receive a certain amount of publicity or
be brought to the attention of the person
concerned, in order to make it possible
subsequently to ensure that:
(a) All the
personal data collected and recorded remain
relevant and adequate to the purposes so
specified; (b) None of the said personal
data is used or disclosed, except with the
consent of the person concerned, for purposes
incompatible with those specified; (c)
The period for which the personal data are
kept does not exceed that which would enable
the achievement of the purpose so specified.
4) Principle
of interested-person access Everyone who offers
proof of identity has the right to know
whether information concerning him is being
processed and to obtain it in an intelligible
form, without undue delay or expense, and
to have appropriate rectifications or erasures
made in the case of unlawful, unnecessary
or inaccurate entries and, when it is being
communicated, addressees. Provision should
be made for a remedy, if need be with the
supervisory authority specified in principle
8 below. The cost of any rectification shall
be borne by the person responsible for the
file. It is desirable that the provisions
of this principle should apply to everyone,
irrespective of nationality or place of
residence.
5) Principle
of non-discrimination Subject to cases
of exceptions restrictively envisaged under
principle 6, data likely to give rise to
unlawful or arbitrary discrimination, including
information on racial or ethnic origin,
colour, sex life, political opinions, religious,
philosophical and other beliefs as well
as membership of an association or trade
union, should not be compiled.
6) Power
to make exceptions Departures from principles 1 to
4 may be authorized only if they are necessary
to protect national security, public order,
public health or morality, as well as, inter
alia, the rights and freedoms of others,
especially persons being persecuted (humanitarian
clause) provided that such departures are
expressly specified in a law or equivalent
regulation promulgated in accordance with
the internal legal system which expressly
states their limits and sets forth appropriate
safeguards.
Exceptions
to principle 5 relating to the prohibition
of discrimination, in addition to being
subject to the same safeguards as those
prescribed for exceptions to principles
1 and 4, may be authorized only within the
limits prescribed by the International Bill
of Human Rights and the other relevant instruments
in the field of protection of human rights
and the prevention of discrimination.
7) Principle
of security Appropriate measures should be
taken to protect the files against both
natural dangers, such as accidental loss
or destruction and human dangers, such as
unauthorized access, fraudulent misuse of
data or contamination by computer viruses.
8) Supervision
and sanctions The law of every country shall
designate the authority which, in accordance
with its domestic legal system, is to be
responsible for supervising observance of
the principles set forth above. This authority
shall offer guarantees of impartiality,
independence vis-a-vis persons or agencies
responsible for processing and establishing
data, and technical competence. In the event
of violation of the provisions of the national
law implementing the aforementioned principles,
criminal or other penalties should be envisaged
together with the appropriate individual
remedies.
9) Transborder
data flows When the legislation of two or
more countries concerned by a transborder
data flow offers comparable safeguards for
the protection of privacy, information should
be able to circulate as freely as inside
each of the territories concerned. If there
are no reciprocal safeguards, limitations
on such circulation may not be imposed unduly
and only in so far as the protection of
privacy demands.
10) Field
of application The present principles should
be made applicable, in the first instance,
to all public and private computerized files
as well as, by means of optional extension
and subject to appropriate adjustments,
to manual files. Special provision, also
optional, might be made to extend all or
part of the principles to files on legal
persons particularly when they contain some
information on individuals. |
In recent years,
protecting personal information in the private sectors
has been considered as a serious issue.
¡á Anti-surveillance
¡®Surveillance¡¯ has
become increased and deeply existed in our life. With
the development of computers and digitization, it became
possible to reproduce personal information without any
restrictions. Therefore, it became virtually impossible
to obtain an active control right over the complicated
process of information flow. In other words, it is difficult
to say that one has a proper control over one¡¯s own
information simply by obtaining the right to decide
whether to give the consent over collection and usages.
Besides, state-of-the-art
technologies allow governments and companies to collect
and manage personal information cheaply, rapidly and
massively. Governments around the globe are able to
watch and analyze the way people think and behave. Also
they can even analyze any individual's past and future
as well as the present life with the help of study of
one¡¯s genetic information.
Experts on the privacy
issue defined the surveillance as a system that allow
the monitoring party to tell who is violating rules,
and take a proper punitive action on those who are responsible.
They also viewed it as to collect and manage personal
information in order to govern societies. Systematic
surveillance causes many problems, which cannot merely
be addressed with the right of self-decision, self-control
on one's own personal information.
One of the biggest problems
with it is that it can violate the basic human rights
of the subject. Surveillance involves observation of
the subject's everyday life, which allows the monitoring
party to understand how the subject think and behave.
As a result, the subject would become aware of the fact
that he/she is monitored and implant the discipline
to restrain him or herself from behaving, thinking and
talking freely to avoid possible troubles, which is
beyond the concept of obeying rules but possible violation
of human rights. In other words, surveillance can violate
the freedom of expression, behavior and thoughts. Also
it may undercut the democracy because, if a person had
to be mindful of a system or society, the power does
not come from the people but from the monitoring party¡¯s
control. Furthermore, if information gathered through
monitoring was used to manage and govern the society,
it could go against the will of people including consumers
and workers. Another problem is that if
personal information
gathered through monitoring was used as a means to manage
and control individuals with a database storing all
such information, this would allow governments to categorize
individuals. Categorization may allow people to reason
their discriminatory behaviors or cause discrimination
and exclusion towards a certain group of people. For
example, information such as races, place of origin
and gender are often used to evaluate individuals, which
do not have anything to do with their capability, performance
or potential.
Therefore the right to
privacy needs to more actively deal with potential threats
posed by the systematic surveillance to the principles
of democracy and human rights. Anti-surveillance concerns
not only the right of self-decision, self-control on
one's own personal information but also the right to
have a control over the whole process of producing and
utilizing such information. It is actively against any
activities that may intervene the freedom of expression
or behavior of individuals or groups in order to protect
human rights.
To support anti-surveillance,
we need to go beyond the concept of give-and-take that
it is enough to give consent over collecting of personal
information or be notified of the use of information
for the price of convenience. Such belief would work
only when the subject of personal information can offer
the information with the equal status to that of who
collects information. However, such consents or notices
are not always requested in modern surveillances. For
example, surveillance cameras in the streets do not
obtain the agreement of passers by whose photos are
taken. Even if you had made the consent or received
a notice regarding the use and collection of your personal
information, no further measures are normally undertaken
regarding new technologies or new purpose of use and
collection of such information, which can have more
invasive effects on subjects. Besides, citizens and
workers are already living in an unfair social system
where they cannot get a job without giving consents
to governments or companies regarding collection
of their personal information and surveillances.
Recently, there are an
increasing number of cases where the database established
through these means is used to categorize citizens according
to the potential of being terrorists or pickpockets
and results in a violation of human rights.
So, supporters of anti-surveillance
argue that citizens and workers should be able to take
an active role and control over the whole process of
surveillance. They claim that people should participate
from the planning stage of personal information management,
which could affect the principles of democracy and human
rights.
One possible solution
could be an introduction of a system that rates how
much the surveillance affects people¡¯s privacy. Under
this system, any new technologies those are likely to
invasive to right to privacy would be evaluated before
they get introduced, and the decision regarding the
introduction would be dependant on the result of the
evaluation. Recently more workers believe that they
should be allowed to take part in producing their personal
information in the labor process and should not regard
the information as the only measure to evaluate workers¡¯
performance. 2. Right to Privacy VS Government's
Surveillance
¡á Identification
systems
Recently, many countries
are adopting various kinds of identification systems.
As such systems become electronic and include even genetic
information, there are concerns that those systems might
be used as a means to control people.
Of course, one can hardly
imagine any society without some kinds of identification
systems. Modern nations have introduced various kinds
of identification systems in order to define the extent
of their people, thus they could provide the welfare
services to their people. Now most governments have
the national identification cards system in place. However,
some of such modern systems pose threats to human rights,
because they may involve a compulsory registration,
and collection of excessive amount of information and
physical information such as fingerprints.
Among them, the compulsory
registration poses a serious threat to human rights.
Some governments including South Korean government have
the compulsory registration system that people are subject
to punishment or penalty if they fail to register with
the government offices. In fact, a proof of identity
should be presented in other ways the subject want such
as using medical insurance cards. For the purpose of
offering the welfare services, it would be enough to
let local authorities to carry out non-compulsory measures
such as the resident registration system.
Information collected
for the purpose of the nationwide compulsory registration
systems should be kept to the minimum level. However,
in many cases, people do not know the specific purposes
of such compulsory systems, which do not even have any
legal rationales behind. Those systems allow the government
to watch and control people regarding their activities
using the information gathered on details of everyday
life of people.
Compiling biometrics
including fingerprints is a human rights violation.
In South Korea, at the age of 17, each and every citizen
should get their fingerprints registered and carry the
information on the back of identification cards. However,
biometrics should only be collected at limited situations
because it could undermine the freedom of physical well-being.
Law enforcement must obtain such information only when
accompanied with warrants.
Furthermore, generating
distinct identification numbers to each citizen should
be carried out only when it is highly necessary. Identification
numbers such as South Korea's and tax file number in
many countries like Australia must be handled very carefully
because those numbers might have lasting adverse effects
on the subject once improperly revealed, given the nature
of such numbers that is unique to a single individual
and can easily be used to identify the individual. However,
in many private and public sectors, identification numbers
are collected occasionally and individuals are not able
to use the Internet services without offering them.
Also Identification numbers due to their unique nature
are being used as a key field to combine each other
database which is collected and established by the private
and public sectors. Personal identification numbers
should not be revealed or shared by the public for commercial
reasons and purposes of collecting and using such information
should be limited to cases such as offering the
welfare services and statistics analysis.
¡á E-Government (electronic
government) system
In recent years, many
countries have introduced the electronic government
system. Government officials claim that the electronic
government should boost efficiency because it would
minimize the need to use documents. In fact, they are
building a massive database covering personal information
of the general public. Unfortunately, proper legislative
systems are not in place yet for governing such collection
of personal information.
This has resulted in
the situation where the subjects of e-government database
system do not have any knowledge regarding who compiles
their personal information and why they do so. Hence,
they are rarely able to exercise their rights to give
consents or refusal concerning the use of own personal
information. Particularly, these various databases are
combined and shared among government agencies through
nationwide identification numbers.
This will allow the government
to obtain all the information about each and every citizen.
In some countries, the government even sells or reveals
such information for commercial purposes, which is a
violation of privacy rights.
¡á Smart Card
Smart cards are regular
sized plastic cards equipped with integrated circuits
with a great memory capacity and high quality functionality,
and they are highly secure. The reason smart cards have
received a great interest from the public is because
its such capacity which can even be upgraded.
Since the 1980s, Australia,
the Philippines, South Korea, Japan and Venezuela have
paid attention to the smart cards. The United States
has also shown interests in smart cards since the September
11th terror attacks. Those countries are willing to
adopt this system because of its great capacity; they
can serve as identification cards, medical insurance
cards, credit cards and so on. In other words, a single
card can combine a massive amount of information about
an individual in itself. Yet, these countries have faced
an opposition from the public regarding the use of smart
cards as a national identification card.
Critics argue that if
single smart card could serve all information related
services of single person, this would, at the same time,
mean that single card can be served as a key to the
whole personal information database of the individual.
They admit the possible increase in efficiency but argue
that this would pose threats to the right of self-decision,
self-control on one's own personal information.
¡á Protection of private
communications
Most countries have laws
to protect the private communications between individuals
and the right to communicate freely with others as basic
rights. However, many changes have been introduced to
the communication systems these days due to development
of information communication technologies compared to
the past when mails and telephone communication systems
were the main tools for communication.
First of all, the quality
and the range of services have changed dramatically;
there are e-mails, online chat rooms, instant messaging
services, online bulletin boards, websites, wireless
Internet services, mobile communications and SMS(short
message service) messages through mobile phones and
so on. The communication traffic has increased enormously
with an increasing number alternative ways of communication
and there are different types of the communication medium
such as text, sound and images are available. The world
has blurred lines between private communications and
public announcement.
Technologies have changed
the characteristics of communications; communication
devices used to focus on the speed of sending messages
and were instant in nature. Now new communication devices
focus more on the capacity of saving data. For example,
SMS messages through mobile phone, messages as well
as the identification of the receiver are saved. As
for online communications, they include the information
about the sender and the receiver, the log-on locations
and contents of the communication. Particularly in cases
of mobile SMS messages and online communications, even
if the sender or receiver deletes messages or communication
contents, they still remain at the server computers.
Hence, such data for log-on information are saved automatically
without users realizing such data storage.
The saved messages through
these procedures are an easy target of monitoring. Furthermore,
technologies now enable people to observe any online
communication flows on the Internet in real time without
getting the users to realize that their activities are
being observed.
Given these potential
adverse effects, new regulations for protecting the
private communications are required. When law enforcement
officials want to collect communication information
of individuals from any communication companies, they
should be required to obtain warrants to be eligible
to demand such data. These wiretapping activities should
only be taken into action when all other means are failed
to assist investigation and should be limited to a relevant
period and information content. Warrants should also
clearly state the use and purpose of the information.
All these efforts are necessary to minimize any possible
violations of basic rights in the name of police activity.
3. Right to
Privacy vs workplace surveillance
Workers have the right
to give consents or refusals regarding the collection,
recording and storing of their own information. This
is vital right for workers so that their dignity and
right to privacy get respects and they can be treated
fairly while they are working. Employee surveillance
by companies can invade employees¡¯ private lives as
well as labor control, given the fact that there are
blurred lines between work and leisure in terms of time
and place, due to new powerful communication and surveillance
technologies.
While most constitutions
around the world protect the dignity of workers and
the right to privacy, few countries have any rules and
regulations in place to control companies that monitor
their workers through sophisticated technologies. Therefore,
surveillances by the employer should be addressed with
the international rules set by the International Labor
Organization and labor unions should try to formulate
any group contracts the way they reflect much of these
international guidelines.
International
Labour Office Protection of worker's
personal data
1) Personal
data should be processed lawfully and fairly,
and only for reasons directly relevant to
the employment of the worker.
2) Personal
data should be, in principle, be used only
for the purposes for which they were originally
collected.
3) If personal
data are to be processed for purposes other
than those for which they were collected,
the employer should ensure that they are
not used in a manner incompatible with the
original purpose, and should take the necessary
measures to avoid any misinterpretations
caused by a change of context.
4) Personal
data collected in connection with technical
or organizational measures to ensure the
security and proper operation of automated
information systems should not be used to
control the behaviour of workers.
5) Decisions
concerning a worker should not be based
solely on the automated processing of that
worker's personal data.
6) Personal
data collected by electronic monitoring
should not be the only factors in evaluating
worker performance.
7) Employers
should regularly assess their data processing
practices: (a) to reduce as far as possible
the kind and amount of personal data collected;
and (b) to improve ways of protecting
the privacy of workers.
8) Workers
and their representatives should be kept
informed of any data collection process,
the rules that govern that process, and
their rights.
9) Persons
who process personal data should be regularly
trained to ensure an understanding of the
data collection process and their role in
the application of the principles in this
code.
10) The processing
of personal data should not have the effect
of unlawfully discriminating in employment
or occupation.
11) Employers,
workers and their representatives should
cooperate in protecting personal data and
in developing policies on worker's privacy
consistent with the principles in this code.
12) All persons,
including employers, workers' representatives,
employment agencies and workers, who have
access to personal data, should be bound
to a rule of confidentiality consistent
with the performance of their duties and
the principles in this code.
13) Workers
may not waive their privacy rights. |
Companies can monitor
their workers or collect their personal information
with the consents of workers only when they attempt
to reduce possible accidents. Monitoring without obtaining
any consents from the subject is unacceptable any circumstances.
Workplace surveillance
by employers without any consents of workers is unlawful
laboring activity since it may undermine basic human
rights such as privacy rights, right to work and right
to unite. Companies must inform workers including leaders
of labor unions about their monitoring policies and
encourage union leaders and workers to participate in
the decision making process regarding workplace monitoring.
Monitoring conducted
secretly must be strictly prohibited. Any monitoring
devices installed or operated without prior notice would
be regarded as secret monitoring activities. Workers
should not be unfairly treated based on the information
secretly collected in evaluating their performance.
Furthermore, monitoring any private conversation, social
life and union activities should not be permitted.
Companies must fully
explain the possible effects of monitoring and collection
of information to workers before they ask for workers
consents. Consents made under pressure should not be
valid. Workers should have the right to change their
mind even after the consent was given and right to demand
the removal of devices used to collect unnecessary personal
information. Companies must use the information only
for the purposes that workers agreed to. Companies should
not use the information as a basis for discrimination
or unfair treatment of workers.
4. Right to
privacy vs monitoring by markets
¡á Profiling
Personal information
has been significant assets in many ways for quite a
long time. Personal information of customers collected
and organized into database has potential for value-added
products. CRM (Customer Relationship Management) that
has received attentions from companies recently allows
companies to manage their customers according to customers¡¯
personal information, collected or purchased by the
companies.
Customer information
can be collected in various ways. Such information can
be acquired by membership agreements or from other companies
in the process of merger activities. Most firms use
¡®cookie¡¯ to collect customer information. Some firms
install programs on customers¡¯ PCs to collect information
or others intercept routers to obtain network information.
Information collected
through these means gets analyzed and categorized to
groups before being managed. For example, say a customer
is found to put one item in the basket out of every
twenty visits to a website and actually make a purchase
for one among five items; Companies can utilize this
specific information in their marketing plans. Credit
card companies are even said to read their customers¡¯
mind through customers¡¯ credit card statements. For
instance, if a customer buys decorating bulbs for Christmas
trees, it could mean that he or she is interested in
interior designs or cares about young children. As such
information gets accumulated, companies can utilize
these information to analyze the tastes of their customers
better.
Since 1920s, General
Motors, U.S. auto manufacturer began to analyze the
connection between customers¡¯ demographic and socioeconomic
background and their purchasing patterns. IBM started
to offer such information to its corporate customers
since 1930s. Companies have been able to affect demand
patterns of a certain product by analyzing this information
and offering a specific product line to specific customers
in a specific area. The rationale behind this strategy
is that people would get interested in a new product
if they can easily get access to it. Similar logic applied
to the restaurant industry where customers are willing
to try new food or dishes.
It is true that sellers
cannot force people to purchase their products or services.
Most people are vaguely concerned about privacy invasive
technologies, but they willingly provide their personal
information when they believe that it is necessary to
get better services. Apparently companies provide better
services or more customized services without charging
extra costs. In fact, the better services that look
like to be provided for free of charge are actually
not free.
The biggest problem comes
from the procedures of processing such information.
As information gets processed, customers are divided
into groups solely based on their purchasing power and
economic/income levels. Prism, a Virginia based research
firm, once categorized African Americans, Latinos and
other overseas-background people as ¡®dangerous minor
groups¡¯. These dangerous groups are automatically isolated
in the database. Privacy experts warn that these categorization
and isolation could be expanded to the whole society
and deepen the discriminatory behaviors in real life.
This can be the start point of social surveillance.
¡á Spam mail
Spam mails cause problems;
they waste people¡¯s resources in terms of time spent
on deleting such mails from mailboxes and financial
burdens on business people. But what is worse is that
they may invade the recipients¡¯ privacy.
Spam mails overwhelm
recipients¡¯ accounts by the volume of mails and means
of sending out which cannot be controlled by the recipients
without asking the recipients whether they are willing
to receive such unsolicited mails. The truth is that
a volume of tens of thousands trades email addresses,
which fall into personal information category, are traded
among companies, but the owner of such information,
account holders, have no control over such activities.
That is why users are interested in opt in system under
which users are given a control over spam mails.
What
is the opt-in system? Under the opt-out
system, spammers can send spams until users
refuse to receive such mails. On the other
hand, under the opt-in system, spammers
can send spams only when users allow them
to do so. Although most marketing businesses
support the opt-out system, an increasing
number of users favor the opt- in system
especially for commercial spams, emphasizing
the possibility of commercial use of private
email addresses.
|
¡á Protection of medical records
Medical records should
be strictly protected given the sensitive nature of
the information. However, related legislations do not
provide specific and practical rules in protecting such
information, but mainly state a vague and general principle,
¡®protection of confidentiality¡¯. Therefore, many private
firms including insurance companies often make use of
such personal information commercially.
Recently genetic information
is at stakes. Government agencies and various companies
are eager to collect such information. Prosecutors'
office in South Korea had hoped to establish a controversial
genetic data bank in cooperation with private companies.
Under the scheme, they argued that law enforcement authorities
must collect genetic data of convicted criminals to
address the possible second offense. Critics argue that
the plan is focused on collecting genetic data starting
from the less privileged people to the rest of the society.
Against this backdrop,
an increasing number of citizens are supporting that
strict measures should be taken to regulate companies,
which try to collect medical records, and control any
transactions between government agencies and those companies.
¡á Information regarding
credibility
As credit rating companies
start to rate credibility of individuals, virtually
all types of information regarding one¡¯s history of
financial transactions are become available to public
including loans records, any overdue payments history
as well as online transaction history. This may cause
situations where Individuals get disadvantaged or treated
unfairly due to minor mistakes concerning financial
transactions they made in the past. Particularly, problems
regarding credibility information have become serious
issues throughout the society since 2000, as broader
range of information has become available to public
such as tax payments history, litigations record, and
even information regarding transactions between suppliers
and customers.
Now, it is highly likely
that people may get disadvantaged due to being captured
in credibility information net, as personal information
including banking records, litigation records, payments
of utilities are made available to public. Usually,
the business of credit rating of individuals gets originated
as a format of banks-dominated consortium, and once
retailers and communications firms join the business,
individuals would end up in revealing every single detail
of personal records even against their will. Accordingly,
as the personal credibility rating go up with its full
potential, harmful effects would be caused by revealing
personal records; it could also undermine privacy rights,
and minor financial mistakes could devastate any individual. |