SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
© by Tech and Law Center – www.techandlaw.net 1
Privacy of the Digital Natives
Francesca Bosco1
and Giuseppe Vaciago2
May, 2012
Abstract
Even if the term “digital native” have been debated for years by several esteemed scholars, this ar-
ticle aims to seek the digital natives’ attitude towards data protection and safety. It is fundamental,
in a society which is evolving so fast, not to focus solely on the present, but to endeavour to improve
the future by paying the utmost attention to the new generations. What balance of interests must we
achieve between privacy vs transparency, secrecy vs security, reputation vs freedom of expression
in a world of Internet which is increasingly regulated by Moore’s Law, rather than by State legisla-
tion? The purpose is to analyze the current tension between privacy and other fundamental rights
from a predominantly legal standpoint, pointing out that the solutions adopted by legislation and
case law are not sufficient and that maybe it is also necessary to reconsider this value from an ethi-
cal viewpoint.
Table of Content
1. Digital natives’ and Digital Immigrant........................................................................................ 2
2. Privacy in the third millennium................................................................................................... 4
3. Regulating global privacy ........................................................................................................... 5
4. Conclusions.................................................................................................................................. 7
1
Francesca Bosco obtained her law degree from Università degli Studi di Torino, with a focus on International Law and was a practicing attorney for two
years before joining UNICRI in 2006 as a member of the Emerging Crimes Unit. Her role in this organization is to be responsible for the cybercrime preven-
tion projects, and in conjunction with key strategic partners, has developed new methodologies and strategies for researching and countering computer re-
lated crimes. She began collaborating information on different cybercrime-related projects such as the Hackers Profiling Project (HPP), SCADA (Supervisory
Control and Data Acquisition) Security and a multi-level training program for ICT and security professionals, lawyers, and law enforcement agencies. Ms.
Bosco also participated as a speaker in various conferences and training seminars on the topic of child online pornography and contributed to the develop-
ment ITU Child Online Protection (COP) guidelines.More recently Ms. Bosco is researching and developing technical assistance and capacity building pro-
grams to counter the involvement of organized crime in cybercrime and a methodology with which to ascertain the social and financial ramifications of cy-
bercrime and online abuse.She is member of the TLC Executive Committee.
2
Giuseppe Vaciago has been a lawyer and a member of the Milan Bar since 2002 and for the last 10 years his primary focus has been IT Law with a focus
on cyber crime. He has assisted many national and international IT companies. Academically, he received his PHD on Digital Forensics from Università di
Milano and he is a lecturer at Insubria University (Varese and Como) where he holds a course on IT law. He recently attended Fordham Law School and
Stanford Law School as a ‘Visiting Scholar’ to expand his studies in his own particular research area. Giuseppe Vaciago is the author of many publications on
cybercrime, including both scientific journals and textbooks, which have been adopted by the University where he teaches. He has also delivered many lec-
tures and presentations in both Italy and abroad.He is member of the TLC Executive Committee.
© by Tech and Law Center – www.techandlaw.net 2
1. Digital natives’ and Digital
Immigrant
The terms “digital native” and “digital immi-
grant” were coined in 2001 by Marc Prensky3
,
but they are slowly becoming ubiquitous
amongst scholars and activists working in the
youth-technology sector, especially in emerg-
ing Information Societies. “Digital native” is
generally used to differentiate the generation
that was born after 1980 – who has an un-
precedented (and often inexplicable) relation-
ship with information technology4
. The distinc-
tion between digital natives and digital immi-
grants is controversial, not least because the
digital universe currently inhabited by digital
natives was in fact conceived and created by
digital immigrants.
Generational differences are seen as the
cause of wide shifts in our ability to engage
with technologies and the concept of the digi-
tal native has gained popularity in certain are-
as of policy and practice. But generation is
only one of the predictors of advanced inter-
action with the Internet. Breadth of use, expe-
rience, gender and educational levels are also
important, indeed in some cases more im-
portant than generational differences, in ex-
plaining the extent to which people can be de-
fined as a digital native. Helsper and Eynon’s
study suggests that it is possible for adults to
become digital natives, especially in the area
of learning, by acquiring skills and experience
in interacting with information and communi-
cation technologies5
.
Ten years after Prensky’s definition, White
and Le Cornu proposed the terms ‘Visitors’
and ‘Residents’6
as a replacement for Pren-
3
Prensky Marc, Digital Natives, Digital Immigrants, From On the Hori-
zon, MCB University Press, Vol. 9 No. 5, 2001 available at:
http://www.marcprensky.com/writing/Prensky%20-
%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf.
4
There are many critical voices caution against presuming that all those
born after the advent of the Internet are Digital Natives. Shah, Nishant
and Abraham, Sunil, Digital Natives With A Cause?, Centre for Internet
and Society, 2009, available at: http://cis-india.org/digital-
natives/blog/uploads/dnrep1); Bennett, Sue, Maton, Karl and Kervin,
Lisa, The “Digital Natives” Report: A Critical Review of the Evidence’,
British Journal of Educational Technology, 2008, available at
http://kimhuett.wiki.westga.edu/file/view/The-digital-natives-debate-A-
critical-review-of-the-evidence.pdf).
5
Helsper, Ellen Johanna and Eynon, Rebecca, Digital natives: where is
the evidence?, British Educational Research Journal, 2010, Vol. 36, 503.
6
White, S. David and Le Cornu, Alison, ‘Visitors and Residents: A New
Typology for Online Engagement’, First Monday, Vol 16 No 9, 2011,
available at:
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/317
1/3049.
sky’s much‐criticised digital natives and digital
immigrants. The new approach wanted to rep-
resent people behaving in different ways
when using technology, depending on their
motivation and context, without categorising
them according to age or background. The
proposed typology should be understood as a
continuum and not a binary opposition. Indi-
viduals may be able to place themselves at a
particular point along this continuum rather
than in one of two boxes. Zur said that
“By age 20, kids will have spent 20,000
hours online –the same amount of time a
professional piano player would have spent
practicing”7
.
According to Born Digital8
,
“Many Digital Natives incorrectly perceive
that their conversations online are far more
private than they are. In other words, there
is a new incentive to post information about
yourself online (social norms suggest that
more information about yourself will attract
more friends), but less of a check on your
behaviour (an innate sense of privacy, or
someone telling you “don’t you dare go out
dressed like that”). The result is that at no
time in human history has information
about a young person been more freely
and publicly accessible to so many others”.
Our privacy is becoming “liquid”: we publish
and use, in a networked environment, ex-
tremely valuable data, of which we quickly
lose availability. These data after some time
can become harmful. While personal identity
offline is characterized by a unitary base that
makes it immune to selective cuts, the digital
identity is by definition exposed to the inevita-
ble fragmentation and contingency of traces,
paths and preferences that characterize surf-
ing on the web: within the multiplicity and
fragmentation, the common denominator of
our own digital life is the crucial position occu-
pied by the user’s personal and sensitive da-
ta.
Another issue that comes to mind when dis-
cussing youth and media is the issue of online
7
Zur, Ofer and Zur, Azzia Psychology of the Web & Internet Addiction,
Zur Institute, 2011, available at
http://www.zurinstitute.com/Internetaddiction.html.
8
Gasser, Urs, Palfrey, John, Born Digital - Understanding the First Gen-
eration of Digital Natives, Perseus Publishing, 2008.
© by Tech and Law Center – www.techandlaw.net 3
safety9
. The public spaces in which young
people interact have expanded. Much of the
social life of young people takes place in a
converged space that links the online and the
offline. These new public spaces are often
held in private hands, by corporations like Fa-
cebook, Google, MySpace, and many others.
In the process of dismantling the boundaries
between the public and the private10
, often
youngsters put themselves in grave danger,
not only in their immediate present but also in
their unsuspecting futures. Youth tend to fo-
cus more on the potential benefits of infor-
mation disclosure than they do on potential
harms11
. Despite having knowledge and in-
formation, digital natives tend to forget their
online safety and privacy rights – a phenome-
non that Mayer- Schoenberger calls ‘the art of
forgetting in the age of ubiquitous compu-
ting’12
.
It is ascertained that young people share too
much information about themselves online.
The Internet’s capacity to archive identities in
a way that permanently records everything
ever expressed online often leads to embar-
rassing stories and personal information being
laid bare to public scrutiny. As Palfrey, Gasser
and Boyd stated, “we fret over an erosion of
the reasonable expectation of privacy in the
online environment”13
.
The general public welcomes even ordinary
changes in the privacy policy and terms of
service at large social network sites such as
Facebook. But then real behaviour is different.
Gross and Acquisti further examined how in-
dividuals disclose information and protect pri-
vacy on Facebook, finding that most users
share personal information openly and few
9
Gasser, Urs, Maclay, Colin M. and Palfrey, John G., Working Towards
a Deeper Understanding of Digital Safety for Children and Young People
in Developing Nations (June 21, 2010). Berkman Center Research
Publication No. 2010-7; Harvard Public Law Working Paper No. 10-36.
Available at http://ssrn.com/abstract=1628276.
10
Boyd, Dana Michele, Taken Out of Context: American Teen Sociality
in Networked Publics. Doctoral Dissertation, University of California,
Berkeley, Available at:
http://www.danah.org/papers/TakenOutOfContext.pdf.
11
Santo, R., James, C., Davis, K., Lee Katz, S., Burch, L., & Joseph, B.,
Meeting of Minds: CrossGenerational Dialogue on the Ethics of Digital
Life. A report in collaboration of Global Kids, Common Sense Media &
GoodPlay Project at Harvard University, 2009.
12
Mayer-Schoenberger, Viktor, Delete: The Virtue of Forgetting in the
Digital Age, Princeton University Press, 2009.
13
Palfrey, John G., Gasser, Urs and Boyd, Danah, Response to FCC
Notice of Inquiry 09-94: Empowering Parents and Protecting Children in
an Evolving Media Landscape, Berkman Center Research Publication
No. 2010-02; Harvard Public Law Working Paper No. 10-19. Available
at: http://ssrn.com/abstract=1559208.
modify their default privacy settings for in-
creased protection14
.
Many young people do care about privacy
and their personal reputations15
. But often,
they lack sufficient skills and tools to keep pri-
vate from others data they wish to protect.
From the Eurobarometer16
, it is possible to
evince that around 94% of those aged 15-24
use Internet (EU 66%). 84% of them use so-
cial networking sites (EU 52%) and 73% of
them use websites to share pictures, videos,
movies (EU 44%). They are the most likely to
agree that disclosing personal information is
not a big issue for them (43%, EU 33%), that
they do not mind disclosing personal infor-
mation in return for free services online such
as a free email address (48%, EU 29%), and
that they feel obliged to disclose personal in-
formation on the Internet (41%, EU 28%).
They are also most likely to disclose various
types of personal information on social net-
working sites, and to disclose personal infor-
mation on social networking sites ‘for fun’
(26%, EU 22%); they usually do not read pri-
vacy statements on the Internet (31%, EU
25%), but they feel sufficiently informed about
the conditions for data collection and the fur-
ther uses of their data when joining a social
networking site or registering for a service
online (64%, EU 54%); they are likely to have
changed their personal profile from the default
settings on a social networking site or sharing
site (62%, EU 51%); and they tend to hold the
social networking or sharing sites responsible
for the safe handling of data. They are also
more likely to feel that they have control over
the information disclosed on social networking
or sharing sites (84%, EU 78%) and over the
information on online shopping websites
(80%, EU 68%).
Equally, the care-free digitals are the least
likely to mention the risk that their information
14
Gross, Ralph and Acquisti, Alessandro, Information Revelation and
Privacy in Online Social Networks (The Facebook Case)’, in Proceed-
ings of ACM Workshop on Privacy in the Electronic Society, 2005, avail-
able at: http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-
gross-acquisti.pdf.
15
Youn, Seounmi, Determinants of Online Privacy Concern and Its Influ-
ence on Privacy Protection Behaviors Among Young Adolescents, The
Journal of Consumer Affairs, 2009, available at:
http://onlinelibrary.wiley.com/doi/10.1111/j.1745-6606.2009.01146.x/full.
16
Data taken from Special Eurobarometer 359, Attitudes on Data Pro-
tection and Electronic Identity in the European Union, European Com-
mission, 2011, available at:
http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf.
© by Tech and Law Center – www.techandlaw.net 4
may be used to send them unwanted com-
mercial offers (24%, EU 28%); to say that the
websites will not honour the privacy state-
ments (20%, EU 24%); to protect their identi-
ty, either in daily life or on the Internet; or to
be concerned that the information about them
held by companies may be used for a differ-
ent purpose from that for which it was collect-
ed (63%, EU 70%).
2. Privacy in the third millennium
The above-mentioned European Commission
report reveals that digital natives care little
about the possible consequences of posting
their own or others' data on Internet; neither
do they care where such data is really stored.
The exponential growth in cloud computing
systems is a clear demonstration of the fact
that saving money and ease-of-use are more
important than the choice to ensure greater
control of one's own personal data.
Amongst the possible reasons for this lack of
sensitivity and respect for privacy, two stand
out: the first is the speed with which Internet
has developed. Managing such a rapid pro-
cess involving the transformation of Internet
has made it impossible to put in place a sys-
tem of technical and legal rules capable of
properly protecting users' privacy17
. The se-
cond reason is the fact that Internet, possibly
due to the very speed with which it has devel-
oped, is a technology which is run almost ex-
clusively by the private sector. National gov-
ernments began showing interest in Internet
too late. Vint Cerf remarks that18
:
“The Internet has introduced an enor-
mously accessible and egalitarian platform
for creating, sharing and obtaining infor-
mation on a global scale. As a result, we
have new ways to allow people to exercise
their human and civil rights. In this context,
engineers have not only a tremendous ob-
ligation to empower users, but also an ob-
ligation to ensure the safety of users
online”.
17
Only after 2009 was the concept of Privacy by Design introduced.
Cavoukian, Ann, Privacy by Design, The 7 Foundational Principles,
Available at
http://www.ipc.on.ca/images/resources/7foundationalprinciples.pdf.
18
Cerf, Vint, Internet Access Is Not a Human Right, New York Times,
January 4 2012,
http://www.nytimes.com/2012/01/05/opinion/Internet-access-is-not-a-
human-right.html.
In addition to the great importance that Cerf
correctly attributes to engineers, the fact that
the IT world is now in the hands of a limited
number of companies is just as significant; the
majority of these companies are headquar-
tered in Silicon Valley. As we will see in the
next paragraph, the concentration of so many
companies within such a limited geographical
area, also explains why it is difficult for the
public sector, including the courts, even at an
international level, to understand and thus to
"regulate" the Internet.
In this context, the future of privacy will cer-
tainly depend on the role given to two values
which are of key importance for every demo-
cratic system, but which may potentially clash
with the right to privacy: individuals' freedom
of expression and safety.
Before the advent of Internet, the freedom of
expression, though recognised virtually as an
inalienable right of every person, was highly
restrained and consequently filtered by the
existing media. The press, television and ra-
dio are tools which only allow communication
for those who control them19
. As Italians, we
all know just how strategic it is to have this
type of control20
.
Internet has made it possible for anybody to
open a blog or a profile on a social network
without any territorial or economic restrictions;
the consequences can sometimes be harmful
for the quality of such information21
; however,
there is no doubt that freedom of expression
is absolutely defended. Rosen notes:
“The sociologist Thomas Mathiesen has
contrasted Michel Foucault’s Panopticon –
a surveillance house in which the few
watched the many – with what he called
the “Synopticon” created by modern televi-
sion, in which the many watch the few. But
in the age of the Internet, we are experi-
encing something that might be called the
“Omnipticon” in which the many are watch-
19
Rosen, Jeffrey, The Naked Crowd Reclaiming Security and Freedom
in an Anxious Age, Florida State Law University, 2004, available at
http://www.law.fsu.edu/faculty/2003-2004workshops/rosen.pdf
20
European Court of Human Right, Application no. 38433/09 - Centro
Europa 7 S.R.L. v. Italy, Written Comments of the Open Society Justice
Initiative, available at:
http://www.soros.org/initiatives/justice/litigation/europa7/written-
comments-20100311.pdf.
21
Morozov, Eugeny, The Net Delusion. The Dark Side of Internet Free-
dom, Public Affairs, New York, 2011, p. 253.
© by Tech and Law Center – www.techandlaw.net 5
ing the many, even though no one knows
precisely who is watching or being watched
at any given time”.
In addition, it should be borne in mind that un-
like television, Internet "does not forget". For
this reason there is now the need to provide
for the right to be forgotten. Using convincing
arguments in his book “Delete,” Schönberger
proposes to re-establish the ordinary balance
between memory and forgetfulness: in which
the former is once more the exception and the
latter the rule22
. Eric Schmidt (CEO of Google
Inc.) objects to this approach, commenting “if
you have something that you don't want any-
one to know, maybe you shouldn't be doing it
in the first place” 23
.
Beyond the conflict between freedom of ex-
pression and right to be forgotten, the infor-
mation digitalisation process has given rise to
other unforeseeable phenomena: first, Julian
Assange and the “Wikileaks” case have
demonstrated that it is increasingly difficult to
keep information which is essential for nation-
al security secret; secondly, the enormous
flow of information circulating on the Internet
is very appealing to the world's governments
who see the opportunity to ensure the security
of their State through increasingly sophisticat-
ed forms of dataveillance24
.
The argument used to legitimise this form of
monitoring is very similar to the one used to
protect freedom of speech: the US has de-
clared in one of its campaigns on security that
“if you’ve got nothing to hide, you’ve got noth-
ing to fear” 25
. In his long essay designed to
refute the “nothing to hide” argument, Solove
maintains that indiscriminate collection of a
citizen’s personal and sensitive data by a
State authority, may seriously harm the citizen
in the event of loss and concurrent dispersal
of data or, above all, in case of incorrect eval-
uation of such data. He also observes that the
future will not be an Orwellian Big Brother, but
22
Mayer-Schoenberger, Viktor, Delete. The Virtue of Forgetting in the
Digital Age, Princeton University Press, 2010.
23
Jennings, Richi, Google CEO: if you want privacy, do you have some-
thing to hide?, in ComputerWorld, December 11, 2009 available at:
http://blogs.computerworld.com/15234/google_ceo_if_you_want_privacy
_do_you_have_something_to_hide.
24
Clarke, Roger, Information Technology and Dataveillance, 1991,
available at:
http://www.rogerclarke.com/DV/CACM88.html.
25
Solove, Daniel, Nothing to Hide: The False Tradeoff between Privacy
and Security, Yale University Press, 2011, p. 21.
will more closely resemble the future de-
scribed by Kafka in his Metamorphosis, as we
will increasingly come to rely on information
over which we lose control and which may be
used against us at the opportune time.
This is the privacy paradox of the third millen-
nium: on the one hand, public authorities
should regulate Internet more efficiently, pay-
ing particular attention to digital natives’ priva-
cy. On the other hand, it is feared that these
public authorities may conduct unlawful moni-
toring, supposedly with a view to protecting
citizens' national security.
3. Regulating global privacy
The fact that a handful of California-based
companies control around 2.3 billion users
(1.7 billion Google, 835 million, Facebook,
600 million Twitter26
) does not facilitate the
process of harmonising European and Cana-
dian privacy legislation with the American
one. Larry Page’s polite refusal to comply with
the request made by the Article 29 Working
Party to postpone amendments to Google's
privacy policy in Europe is a clear example of
the difficulties encountered by States to regain
their traditional regulatory and coercive pow-
ers.
In this case too, amongst the possible rea-
sons for this difficulty, two stand out.
The first is that Europe, (to which Canada can
be associated on grounds of cultural affinity)
and United States have two very distinct con-
cepts of privacy. For insight into the reasons
underlying this difference in approach, one
needs to consider that the data protection
laws adopted by the German Land of Hessen
in 197027
, followed by Sweden in 197328
, the
Federal Republic of Germany in 197729
and
France in 197830
, as well as the European Di-
26
Stats available at:
http://www.Internetworldstats.com/facebook.htm and
http://twopcharts.com/twitter500million.php, last update March 31, 2012.
27
Datenschutzgesetz (Data Protection Act) of 1970, available (in Ger-
man) at:
http://www.datenschutz.rlp.de/downloads/hist/ldsg_hessen_1970.pdf .
28
The Data Act, 1973 available at: http://archive.bild.net/dataprSw.htm.
29
Bundesdatenschutzgesetz (BDSG) [Federal Data Protection Act) of
1977, available in English at:
http://www.iuscomp.org/gla/statutes/BDSG.htm.
30
Loi n° 78-17 du 6 janvier 1978 relative à l'informatique, aux fichiers et
aux libertés, available (in French) at:
http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=LEGITEXT00000
6068624&dateTexte=20101103 .
© by Tech and Law Center – www.techandlaw.net 6
rectives 95/46/EC, 2002/19-20-21/EC,
2006/24/EC and 2009/140/EC, are all based
on the same groundwork: the European Con-
vention on Human Rights (ECHR).
Although Article 8 of the ECHR entrenches
the principle that “everyone has the right to
respect for his private and family life, his
home and his correspondence”, unlike the
Fourth Amendment of the U.S. Constitution,
the second paragraph of the cited article
seems to accept with far greater “resignation”
possible interference by public authorities in
the exercise of this right, to the extent “neces-
sary in a democratic society in the interests of
national security, public safety or the econom-
ic well-being of the country, for the prevention
of disorder or crime, for the protection of
health or morals, or for the protection of the
rights and freedoms of others”31
.
According to Whitman, the conflict between
the Fourth Amendment set forth in the Bill of
Rights, and Article 8 of the ECHR bears wit-
ness to the very different approaches to pri-
vacy that have developed on the opposite
sides of the Atlantic as a result of profoundly
divergent ideologies, with the emphasis being
placed on freedom in the U.S. and on human
dignity in Europe32
.
These distinct ideologies arose as a by-
product of the history of each continent. In
Europe, where for centuries dignity had been
the preserve of the aristocracy, the craving to
extend its benefits to all became the driving
force behind the social struggles of the past
two centuries, whilst on the other side of the
Atlantic, it was the libertarian push for free-
dom that led to the American revolution and
laid the groundwork for the U.S. legal system.
European data protection laws tend to safe-
guard personal privacy against what is per-
ceived as its greatest threat, and that is to
say, above all, the media and the dangers
posed by the information society with the
31
This is clearly illustrated in the case Leander v. Sweden (European
Court of Human Rights, decision dated March 26, 1987, 9 EHRR 433,
paragraph 59) in which it was held that a person who was denied securi-
ty clearance for a job at a Naval Museum on the basis of information
contained in secret police files that were not made available to him, did
indeed sustain prejudice to his rights pursuant to Article 8(1) of the
ECHR, but was not entitled to any remedy since his rights had been
violated in pursuit of a legitimate aim under Article 8(2) of the ECHR, and
that is to say, the protection of national security.
32
J. WHITMAN, The two western cultures of privacy: Dignity v. Liberty, in
The Yale Law Journal, vol. 113, no. 6, at page 1151.
emergence of new technologies. In the U.S.
on the other hand, privacy laws are designed
to protect the inviolability of private premises
against what Americans perceive as most
menacing to their personal affairs, i.e. gov-
ernment intrusion.
More trusting in tate power than their U.S.
counterparts, Europeans have fewer qualms
about surrendering some of their personal
freedom to the government, although they
are highly intolerant of any intrusion by the
media, old or new. Americans, on the other
hand, take the Jeffersonian33
view of freedom
of the press as a basic constitutional value,
but they have no taste for European bureau-
cracy that can interefere also with the names
parents may give their new-born children.
Europeans are at a loss to comprehend the
leeway enjoyed by U.S. banks to conduct
credit checks on their customers, and find it
difficult to countenance the cordial straight-
forwardness with which their American
friends inquire about how much they earn.
For Americans, mandatory identity cards are
unacceptable, quite like the nonchalant nudity
in which certain European celebrities indulge
(clothes being the last frontier of the “home”).
The second reason is that the remedies put
forward to harmonise privacy in Europe and
the United States have so far not obtained
any particularly effective result. As Zimmer
correctly observes, the 2000 Safe Harbor
Agreement between Europe and the United
States 34
is a clear example:
“While U.S. based companies are forced to
provide more privacy protections than U.S.
law demands, the Safe Harbor provisions
are weaker than the full European Directive
on Data Protection.”
The new European privacy regulations35
offer
interesting food for thought, including the in-
33
“Our liberty cannot be guarded but by the freedom of the press, nor
that be limited without danger of losing it” Thomas Jefferson, letter to
John Jay, 1786.
34
2000/520/EC: Commission Decision of 26 July 2000 pursuant to Di-
rective 95/46/EC of the European Parliament and of the Council on the
adequacy of the protection provided by the safe harbour privacy princi-
ples and related frequently asked questions issued by the US Depart-
ment of CommerceEuropean Commission’s decision of 26 July 2000,
no. 2000/520/EC, available at: http://eur-
lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:H
TML.
35
Regulation of the European Parliament and of The Council on the Pro-
tection of Individuals with regard to the Processing of Personal Data and
on the Free Movement of Such Data (General Data Protection Regula-
© by Tech and Law Center – www.techandlaw.net 7
troduction of a single piece of legislation for
the entire European Union (as opposed to dif-
ferent laws for each individual State) as well
as a clearer, more coherent definition of “main
establishment”. However, there is no shortage
of controversy: for example, the United States’
attitude is diametrically opposed to the Euro-
pean Union’s one on cookies. Users in the
United States are entitled to refuse the use of
cookies for marketing purposes, but they are
not entitled to give prior consent. In any case,
if and when the regulation becomes effective,
much will have changed, considering the
speed with which Internet evolves.
4. Conclusions
The combination created both by the speed of
Internet evolution and by the absence of the
"State" has ushered in an expansion in the
global exchange of information process,
which has surely fostered liberty of expression
to the detriment of privacy and other funda-
mental rights.
I am not convinced that the right balance can
be found solely by entrusting private compa-
nies with the task of managing this wealth of
information; by the same token, I am not con-
vinced that it is possible to obtain this result
through robust regulatory activity by the State
which could inevitably risk having a direct or
indirect impact on the freedom of expression
which Internet allows.
Instead, I am of the opinion that it is funda-
mental, in a society which is evolving so fast,
to pay the utmost attention to the new genera-
tions who are about to adopt Internet by
providing an appropriate answer to the follow-
ing questions: What will the balance of inter-
ests be which must be achieved between pri-
vacy vs transaparency, secrecy vs security,
reputation vs freedom of expression in a world
of Internet which is increasingly regulated by
Moore’s Law, rather than by State legislation?
I would not be so presumptuous as to claim to
have the answer to such broad questions,
questions which may have a dramatic impact
on the world of Internet as we know it today. It
is however beyond dispute that, ever since
tion), 2012/0011 (COD), available at: http://ec.europa.eu/justice/data-
protection/document/review2012/com_2012_11_en.pdf.
Warren and Brandeis36
, the concept of privacy
has been remodelled several times due to the
relentless development of the information so-
ciety.
In this context, we have to bear in mind the
guidelines provided by the Vice President of
the European Commission Responsible for
the Digital Agenda Online, Neelie Kroes, on
the importance of promoting international
agreements and providing incentives for self-
regulatory mechanisms. Even if these guide-
lines run the risk of providing weaker legal
protection, they may certainly foster greater
efficacy in the application of global privacy
rules for digital natives and digital immi-
grants37
.
36
Warren, Samuel and Brandeis, Louis, The Right to Privacy, in Harvard
Law Review. Vol. IV, December 15, 1890, No. 5, available at:
http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_br
and_warr2.html.
37
Kroes, Neelie, Privacy: Reinforcing Trust and Confidence Online
Tracking Protection & Browsers, Workshop Brussels, 22 June 2011,
available at:
http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/
461.
© by Tech and Law Center – www.techandlaw.net 8
References
Bennett, Sue, Maton, Karl and Kervin, Lisa, The “Digital Natives” Report: A Critical Review of the
Evidence’, British Journal of Educational Technology, 2008.
Boyd, Danah Michele, Taken Out of Context: American Teen Sociality in Networked Publics. Doc-
toral Dissertation, University of California, Berkeley, 2008.
Gasser, Urs, Palfrey, John, Born Digital - Understanding the First Generation of Digital Natives,
Perseus Publishing, 2008.
Gasser, Urs, Maclay, Colin M. and Palfrey, John G., Working Towards a Deeper Understanding of
Digital Safety for Children and Young People in Developing Nations (June 21, 2010). Berkman Cen-
ter Research Publication No. 2010-7; Harvard Public Law Working Paper No. 10-36.
Gross, Ralph and Acquisti, Alessandro, Information Revelation and Privacy in Online Social Net-
works (The Facebook Case), in Proceedings of ACM Workshop on Privacy in the Electronic Socie-
ty, 2005.
Helsper, Ellen Johanna and Eynon, Rebecca, Digital natives: where is the evidence?, in British Ed-
ucational Research Journal, 2010, Vol. 36, 503.
Morozov, Eugeny, The Net Delusion. The Dark Side of Internet Freedom, in Public Affairs, New
York, 2011, p. 253.
Prensky Marc, Digital Natives, Digital Immigrants, From On the Horizon, in MCB University Press,
Vol. 9 No. 5, 2001.
Rosen, Jeffrey, The Naked Crowd Reclaiming Security and Freedom in an Anxious Age, Florida
State Law University, 2004.
Santo, R., James, C., Davis, K., Lee Katz, S., Burch, L., & Joseph, B., Meeting of Minds: Cross
Generational Dialogue on the Ethics of Digital Life. A report in collaboration of Global Kids, Com-
mon Sense Media & GoodPlay Project at Harvard University, 2009.
Shah, Nishant and Abraham, Sunil, Digital Natives With A Cause?, Centre for Internet and Society,
2009.
Mayer-Schoenberger, Viktor, Delete: The Virtue of Forgetting in the Digital Age, Princeton Universi-
ty Press, 2009.
Solove, Daniel, Nothing to Hide: The False Tradeoff between Privacy and Security, Yale University
Press, 2011, p. 21.
Warren, Samuel and Brandeis, Louis, The Right to Privacy, in Harvard Law Review. Vol. IV, De-
cember 15, 1890, No. 5.
White, S. David and Le Cornu, Alison, ‘Visitors and Residents: A New Typology for Online En-
gagement’, in First Monday, Vol. 16 No 9, 2011.
Whitman, James, The two western cultures of privacy: Dignity vs Liberty, in The Yale Law Journal,
2004.
Youn, Seounmi, Determinants of Online Privacy Concern and Its Influence on Privacy Protection
Behaviors Among Young Adolescents, in The Journal of Consumer Affairs, 2009.
Zur, Ofer and Zur, Azzia, Psychology of the Web & Internet Addiction, in Zur Institute, 2011.

Weitere ähnliche Inhalte

Was ist angesagt?

Strategies for Digital Natives
Strategies for Digital NativesStrategies for Digital Natives
Strategies for Digital Natives
hblowers
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentation
newdigitaldivide
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
Louise Spiteri
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
Louise Spiteri
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
smuench
 

Was ist angesagt? (19)

A1 Youngsters victimization prevention: how to prevent online grooming and un...
A1 Youngsters victimization prevention: how to prevent online grooming and un...A1 Youngsters victimization prevention: how to prevent online grooming and un...
A1 Youngsters victimization prevention: how to prevent online grooming and un...
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Divide
 
Strategies for Digital Natives
Strategies for Digital NativesStrategies for Digital Natives
Strategies for Digital Natives
 
Disruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital StrategiesDisruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital Strategies
 
Child grooming
Child groomingChild grooming
Child grooming
 
The ramifications of digital divide
The ramifications of digital divideThe ramifications of digital divide
The ramifications of digital divide
 
Digital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsDigital Natives, Digital Immigrants
Digital Natives, Digital Immigrants
 
New Digital Divide Presentation
New Digital Divide PresentationNew Digital Divide Presentation
New Digital Divide Presentation
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyond
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Digital Divide Introduction
Digital Divide IntroductionDigital Divide Introduction
Digital Divide Introduction
 

Andere mochten auch

Report format
Report formatReport format
Report format
zirram
 
Writing a Report (Tips and Sample of Reports)
Writing a Report (Tips and Sample of Reports)Writing a Report (Tips and Sample of Reports)
Writing a Report (Tips and Sample of Reports)
Po Po Tun
 

Andere mochten auch (11)

Freedom From Porn Webinar Notes
Freedom From Porn Webinar NotesFreedom From Porn Webinar Notes
Freedom From Porn Webinar Notes
 
AIGA “Moving Pixels”
AIGA “Moving Pixels” AIGA “Moving Pixels”
AIGA “Moving Pixels”
 
Premarital sex and the Third Precept
Premarital sex and the Third PreceptPremarital sex and the Third Precept
Premarital sex and the Third Precept
 
Premarital sex
Premarital sexPremarital sex
Premarital sex
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of Society
 
Drug abuse speech
Drug abuse speechDrug abuse speech
Drug abuse speech
 
How to write a report
How to write a reportHow to write a report
How to write a report
 
Report format
Report formatReport format
Report format
 
Writing a Report (Tips and Sample of Reports)
Writing a Report (Tips and Sample of Reports)Writing a Report (Tips and Sample of Reports)
Writing a Report (Tips and Sample of Reports)
 
Drug Abuse and Addiction
Drug Abuse and AddictionDrug Abuse and Addiction
Drug Abuse and Addiction
 
Report Writing - Introduction section
Report Writing - Introduction sectionReport Writing - Introduction section
Report Writing - Introduction section
 

Ähnlich wie Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)

Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
Thomas Müller
 
AIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINALAIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINAL
James Bibby
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
Kelly Ratkovic
 
Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP Report
Vasily Ryzhonkov
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 

Ähnlich wie Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago) (17)

Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Privacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital WorldPrivacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital World
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
AIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINALAIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINAL
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Digital Life in 2025
Digital Life in 2025Digital Life in 2025
Digital Life in 2025
 
Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP Report
 
DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
ACRL
ACRLACRL
ACRL
 
Essays About Internet
Essays About InternetEssays About Internet
Essays About Internet
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
A4 melinda(1)
A4 melinda(1)A4 melinda(1)
A4 melinda(1)
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
More information, less knowledge
More information, less knowledgeMore information, less knowledge
More information, less knowledge
 

Mehr von Tech and Law Center

Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloAndrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Tech and Law Center
 
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture
Tech and Law Center
 
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts
Tech and Law Center
 
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Tech and Law Center
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
Tech and Law Center
 

Mehr von Tech and Law Center (15)

One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingOne step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policing
 
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution
 
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloAndrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
 
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture
 
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts
 
Smart intelligence
Smart intelligenceSmart intelligence
Smart intelligence
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
 
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
 
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
 
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionSECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian version
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)

  • 1. © by Tech and Law Center – www.techandlaw.net 1 Privacy of the Digital Natives Francesca Bosco1 and Giuseppe Vaciago2 May, 2012 Abstract Even if the term “digital native” have been debated for years by several esteemed scholars, this ar- ticle aims to seek the digital natives’ attitude towards data protection and safety. It is fundamental, in a society which is evolving so fast, not to focus solely on the present, but to endeavour to improve the future by paying the utmost attention to the new generations. What balance of interests must we achieve between privacy vs transparency, secrecy vs security, reputation vs freedom of expression in a world of Internet which is increasingly regulated by Moore’s Law, rather than by State legisla- tion? The purpose is to analyze the current tension between privacy and other fundamental rights from a predominantly legal standpoint, pointing out that the solutions adopted by legislation and case law are not sufficient and that maybe it is also necessary to reconsider this value from an ethi- cal viewpoint. Table of Content 1. Digital natives’ and Digital Immigrant........................................................................................ 2 2. Privacy in the third millennium................................................................................................... 4 3. Regulating global privacy ........................................................................................................... 5 4. Conclusions.................................................................................................................................. 7 1 Francesca Bosco obtained her law degree from Università degli Studi di Torino, with a focus on International Law and was a practicing attorney for two years before joining UNICRI in 2006 as a member of the Emerging Crimes Unit. Her role in this organization is to be responsible for the cybercrime preven- tion projects, and in conjunction with key strategic partners, has developed new methodologies and strategies for researching and countering computer re- lated crimes. She began collaborating information on different cybercrime-related projects such as the Hackers Profiling Project (HPP), SCADA (Supervisory Control and Data Acquisition) Security and a multi-level training program for ICT and security professionals, lawyers, and law enforcement agencies. Ms. Bosco also participated as a speaker in various conferences and training seminars on the topic of child online pornography and contributed to the develop- ment ITU Child Online Protection (COP) guidelines.More recently Ms. Bosco is researching and developing technical assistance and capacity building pro- grams to counter the involvement of organized crime in cybercrime and a methodology with which to ascertain the social and financial ramifications of cy- bercrime and online abuse.She is member of the TLC Executive Committee. 2 Giuseppe Vaciago has been a lawyer and a member of the Milan Bar since 2002 and for the last 10 years his primary focus has been IT Law with a focus on cyber crime. He has assisted many national and international IT companies. Academically, he received his PHD on Digital Forensics from Università di Milano and he is a lecturer at Insubria University (Varese and Como) where he holds a course on IT law. He recently attended Fordham Law School and Stanford Law School as a ‘Visiting Scholar’ to expand his studies in his own particular research area. Giuseppe Vaciago is the author of many publications on cybercrime, including both scientific journals and textbooks, which have been adopted by the University where he teaches. He has also delivered many lec- tures and presentations in both Italy and abroad.He is member of the TLC Executive Committee.
  • 2. © by Tech and Law Center – www.techandlaw.net 2 1. Digital natives’ and Digital Immigrant The terms “digital native” and “digital immi- grant” were coined in 2001 by Marc Prensky3 , but they are slowly becoming ubiquitous amongst scholars and activists working in the youth-technology sector, especially in emerg- ing Information Societies. “Digital native” is generally used to differentiate the generation that was born after 1980 – who has an un- precedented (and often inexplicable) relation- ship with information technology4 . The distinc- tion between digital natives and digital immi- grants is controversial, not least because the digital universe currently inhabited by digital natives was in fact conceived and created by digital immigrants. Generational differences are seen as the cause of wide shifts in our ability to engage with technologies and the concept of the digi- tal native has gained popularity in certain are- as of policy and practice. But generation is only one of the predictors of advanced inter- action with the Internet. Breadth of use, expe- rience, gender and educational levels are also important, indeed in some cases more im- portant than generational differences, in ex- plaining the extent to which people can be de- fined as a digital native. Helsper and Eynon’s study suggests that it is possible for adults to become digital natives, especially in the area of learning, by acquiring skills and experience in interacting with information and communi- cation technologies5 . Ten years after Prensky’s definition, White and Le Cornu proposed the terms ‘Visitors’ and ‘Residents’6 as a replacement for Pren- 3 Prensky Marc, Digital Natives, Digital Immigrants, From On the Hori- zon, MCB University Press, Vol. 9 No. 5, 2001 available at: http://www.marcprensky.com/writing/Prensky%20- %20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf. 4 There are many critical voices caution against presuming that all those born after the advent of the Internet are Digital Natives. Shah, Nishant and Abraham, Sunil, Digital Natives With A Cause?, Centre for Internet and Society, 2009, available at: http://cis-india.org/digital- natives/blog/uploads/dnrep1); Bennett, Sue, Maton, Karl and Kervin, Lisa, The “Digital Natives” Report: A Critical Review of the Evidence’, British Journal of Educational Technology, 2008, available at http://kimhuett.wiki.westga.edu/file/view/The-digital-natives-debate-A- critical-review-of-the-evidence.pdf). 5 Helsper, Ellen Johanna and Eynon, Rebecca, Digital natives: where is the evidence?, British Educational Research Journal, 2010, Vol. 36, 503. 6 White, S. David and Le Cornu, Alison, ‘Visitors and Residents: A New Typology for Online Engagement’, First Monday, Vol 16 No 9, 2011, available at: http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/317 1/3049. sky’s much‐criticised digital natives and digital immigrants. The new approach wanted to rep- resent people behaving in different ways when using technology, depending on their motivation and context, without categorising them according to age or background. The proposed typology should be understood as a continuum and not a binary opposition. Indi- viduals may be able to place themselves at a particular point along this continuum rather than in one of two boxes. Zur said that “By age 20, kids will have spent 20,000 hours online –the same amount of time a professional piano player would have spent practicing”7 . According to Born Digital8 , “Many Digital Natives incorrectly perceive that their conversations online are far more private than they are. In other words, there is a new incentive to post information about yourself online (social norms suggest that more information about yourself will attract more friends), but less of a check on your behaviour (an innate sense of privacy, or someone telling you “don’t you dare go out dressed like that”). The result is that at no time in human history has information about a young person been more freely and publicly accessible to so many others”. Our privacy is becoming “liquid”: we publish and use, in a networked environment, ex- tremely valuable data, of which we quickly lose availability. These data after some time can become harmful. While personal identity offline is characterized by a unitary base that makes it immune to selective cuts, the digital identity is by definition exposed to the inevita- ble fragmentation and contingency of traces, paths and preferences that characterize surf- ing on the web: within the multiplicity and fragmentation, the common denominator of our own digital life is the crucial position occu- pied by the user’s personal and sensitive da- ta. Another issue that comes to mind when dis- cussing youth and media is the issue of online 7 Zur, Ofer and Zur, Azzia Psychology of the Web & Internet Addiction, Zur Institute, 2011, available at http://www.zurinstitute.com/Internetaddiction.html. 8 Gasser, Urs, Palfrey, John, Born Digital - Understanding the First Gen- eration of Digital Natives, Perseus Publishing, 2008.
  • 3. © by Tech and Law Center – www.techandlaw.net 3 safety9 . The public spaces in which young people interact have expanded. Much of the social life of young people takes place in a converged space that links the online and the offline. These new public spaces are often held in private hands, by corporations like Fa- cebook, Google, MySpace, and many others. In the process of dismantling the boundaries between the public and the private10 , often youngsters put themselves in grave danger, not only in their immediate present but also in their unsuspecting futures. Youth tend to fo- cus more on the potential benefits of infor- mation disclosure than they do on potential harms11 . Despite having knowledge and in- formation, digital natives tend to forget their online safety and privacy rights – a phenome- non that Mayer- Schoenberger calls ‘the art of forgetting in the age of ubiquitous compu- ting’12 . It is ascertained that young people share too much information about themselves online. The Internet’s capacity to archive identities in a way that permanently records everything ever expressed online often leads to embar- rassing stories and personal information being laid bare to public scrutiny. As Palfrey, Gasser and Boyd stated, “we fret over an erosion of the reasonable expectation of privacy in the online environment”13 . The general public welcomes even ordinary changes in the privacy policy and terms of service at large social network sites such as Facebook. But then real behaviour is different. Gross and Acquisti further examined how in- dividuals disclose information and protect pri- vacy on Facebook, finding that most users share personal information openly and few 9 Gasser, Urs, Maclay, Colin M. and Palfrey, John G., Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations (June 21, 2010). Berkman Center Research Publication No. 2010-7; Harvard Public Law Working Paper No. 10-36. Available at http://ssrn.com/abstract=1628276. 10 Boyd, Dana Michele, Taken Out of Context: American Teen Sociality in Networked Publics. Doctoral Dissertation, University of California, Berkeley, Available at: http://www.danah.org/papers/TakenOutOfContext.pdf. 11 Santo, R., James, C., Davis, K., Lee Katz, S., Burch, L., & Joseph, B., Meeting of Minds: CrossGenerational Dialogue on the Ethics of Digital Life. A report in collaboration of Global Kids, Common Sense Media & GoodPlay Project at Harvard University, 2009. 12 Mayer-Schoenberger, Viktor, Delete: The Virtue of Forgetting in the Digital Age, Princeton University Press, 2009. 13 Palfrey, John G., Gasser, Urs and Boyd, Danah, Response to FCC Notice of Inquiry 09-94: Empowering Parents and Protecting Children in an Evolving Media Landscape, Berkman Center Research Publication No. 2010-02; Harvard Public Law Working Paper No. 10-19. Available at: http://ssrn.com/abstract=1559208. modify their default privacy settings for in- creased protection14 . Many young people do care about privacy and their personal reputations15 . But often, they lack sufficient skills and tools to keep pri- vate from others data they wish to protect. From the Eurobarometer16 , it is possible to evince that around 94% of those aged 15-24 use Internet (EU 66%). 84% of them use so- cial networking sites (EU 52%) and 73% of them use websites to share pictures, videos, movies (EU 44%). They are the most likely to agree that disclosing personal information is not a big issue for them (43%, EU 33%), that they do not mind disclosing personal infor- mation in return for free services online such as a free email address (48%, EU 29%), and that they feel obliged to disclose personal in- formation on the Internet (41%, EU 28%). They are also most likely to disclose various types of personal information on social net- working sites, and to disclose personal infor- mation on social networking sites ‘for fun’ (26%, EU 22%); they usually do not read pri- vacy statements on the Internet (31%, EU 25%), but they feel sufficiently informed about the conditions for data collection and the fur- ther uses of their data when joining a social networking site or registering for a service online (64%, EU 54%); they are likely to have changed their personal profile from the default settings on a social networking site or sharing site (62%, EU 51%); and they tend to hold the social networking or sharing sites responsible for the safe handling of data. They are also more likely to feel that they have control over the information disclosed on social networking or sharing sites (84%, EU 78%) and over the information on online shopping websites (80%, EU 68%). Equally, the care-free digitals are the least likely to mention the risk that their information 14 Gross, Ralph and Acquisti, Alessandro, Information Revelation and Privacy in Online Social Networks (The Facebook Case)’, in Proceed- ings of ACM Workshop on Privacy in the Electronic Society, 2005, avail- able at: http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook- gross-acquisti.pdf. 15 Youn, Seounmi, Determinants of Online Privacy Concern and Its Influ- ence on Privacy Protection Behaviors Among Young Adolescents, The Journal of Consumer Affairs, 2009, available at: http://onlinelibrary.wiley.com/doi/10.1111/j.1745-6606.2009.01146.x/full. 16 Data taken from Special Eurobarometer 359, Attitudes on Data Pro- tection and Electronic Identity in the European Union, European Com- mission, 2011, available at: http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf.
  • 4. © by Tech and Law Center – www.techandlaw.net 4 may be used to send them unwanted com- mercial offers (24%, EU 28%); to say that the websites will not honour the privacy state- ments (20%, EU 24%); to protect their identi- ty, either in daily life or on the Internet; or to be concerned that the information about them held by companies may be used for a differ- ent purpose from that for which it was collect- ed (63%, EU 70%). 2. Privacy in the third millennium The above-mentioned European Commission report reveals that digital natives care little about the possible consequences of posting their own or others' data on Internet; neither do they care where such data is really stored. The exponential growth in cloud computing systems is a clear demonstration of the fact that saving money and ease-of-use are more important than the choice to ensure greater control of one's own personal data. Amongst the possible reasons for this lack of sensitivity and respect for privacy, two stand out: the first is the speed with which Internet has developed. Managing such a rapid pro- cess involving the transformation of Internet has made it impossible to put in place a sys- tem of technical and legal rules capable of properly protecting users' privacy17 . The se- cond reason is the fact that Internet, possibly due to the very speed with which it has devel- oped, is a technology which is run almost ex- clusively by the private sector. National gov- ernments began showing interest in Internet too late. Vint Cerf remarks that18 : “The Internet has introduced an enor- mously accessible and egalitarian platform for creating, sharing and obtaining infor- mation on a global scale. As a result, we have new ways to allow people to exercise their human and civil rights. In this context, engineers have not only a tremendous ob- ligation to empower users, but also an ob- ligation to ensure the safety of users online”. 17 Only after 2009 was the concept of Privacy by Design introduced. Cavoukian, Ann, Privacy by Design, The 7 Foundational Principles, Available at http://www.ipc.on.ca/images/resources/7foundationalprinciples.pdf. 18 Cerf, Vint, Internet Access Is Not a Human Right, New York Times, January 4 2012, http://www.nytimes.com/2012/01/05/opinion/Internet-access-is-not-a- human-right.html. In addition to the great importance that Cerf correctly attributes to engineers, the fact that the IT world is now in the hands of a limited number of companies is just as significant; the majority of these companies are headquar- tered in Silicon Valley. As we will see in the next paragraph, the concentration of so many companies within such a limited geographical area, also explains why it is difficult for the public sector, including the courts, even at an international level, to understand and thus to "regulate" the Internet. In this context, the future of privacy will cer- tainly depend on the role given to two values which are of key importance for every demo- cratic system, but which may potentially clash with the right to privacy: individuals' freedom of expression and safety. Before the advent of Internet, the freedom of expression, though recognised virtually as an inalienable right of every person, was highly restrained and consequently filtered by the existing media. The press, television and ra- dio are tools which only allow communication for those who control them19 . As Italians, we all know just how strategic it is to have this type of control20 . Internet has made it possible for anybody to open a blog or a profile on a social network without any territorial or economic restrictions; the consequences can sometimes be harmful for the quality of such information21 ; however, there is no doubt that freedom of expression is absolutely defended. Rosen notes: “The sociologist Thomas Mathiesen has contrasted Michel Foucault’s Panopticon – a surveillance house in which the few watched the many – with what he called the “Synopticon” created by modern televi- sion, in which the many watch the few. But in the age of the Internet, we are experi- encing something that might be called the “Omnipticon” in which the many are watch- 19 Rosen, Jeffrey, The Naked Crowd Reclaiming Security and Freedom in an Anxious Age, Florida State Law University, 2004, available at http://www.law.fsu.edu/faculty/2003-2004workshops/rosen.pdf 20 European Court of Human Right, Application no. 38433/09 - Centro Europa 7 S.R.L. v. Italy, Written Comments of the Open Society Justice Initiative, available at: http://www.soros.org/initiatives/justice/litigation/europa7/written- comments-20100311.pdf. 21 Morozov, Eugeny, The Net Delusion. The Dark Side of Internet Free- dom, Public Affairs, New York, 2011, p. 253.
  • 5. © by Tech and Law Center – www.techandlaw.net 5 ing the many, even though no one knows precisely who is watching or being watched at any given time”. In addition, it should be borne in mind that un- like television, Internet "does not forget". For this reason there is now the need to provide for the right to be forgotten. Using convincing arguments in his book “Delete,” Schönberger proposes to re-establish the ordinary balance between memory and forgetfulness: in which the former is once more the exception and the latter the rule22 . Eric Schmidt (CEO of Google Inc.) objects to this approach, commenting “if you have something that you don't want any- one to know, maybe you shouldn't be doing it in the first place” 23 . Beyond the conflict between freedom of ex- pression and right to be forgotten, the infor- mation digitalisation process has given rise to other unforeseeable phenomena: first, Julian Assange and the “Wikileaks” case have demonstrated that it is increasingly difficult to keep information which is essential for nation- al security secret; secondly, the enormous flow of information circulating on the Internet is very appealing to the world's governments who see the opportunity to ensure the security of their State through increasingly sophisticat- ed forms of dataveillance24 . The argument used to legitimise this form of monitoring is very similar to the one used to protect freedom of speech: the US has de- clared in one of its campaigns on security that “if you’ve got nothing to hide, you’ve got noth- ing to fear” 25 . In his long essay designed to refute the “nothing to hide” argument, Solove maintains that indiscriminate collection of a citizen’s personal and sensitive data by a State authority, may seriously harm the citizen in the event of loss and concurrent dispersal of data or, above all, in case of incorrect eval- uation of such data. He also observes that the future will not be an Orwellian Big Brother, but 22 Mayer-Schoenberger, Viktor, Delete. The Virtue of Forgetting in the Digital Age, Princeton University Press, 2010. 23 Jennings, Richi, Google CEO: if you want privacy, do you have some- thing to hide?, in ComputerWorld, December 11, 2009 available at: http://blogs.computerworld.com/15234/google_ceo_if_you_want_privacy _do_you_have_something_to_hide. 24 Clarke, Roger, Information Technology and Dataveillance, 1991, available at: http://www.rogerclarke.com/DV/CACM88.html. 25 Solove, Daniel, Nothing to Hide: The False Tradeoff between Privacy and Security, Yale University Press, 2011, p. 21. will more closely resemble the future de- scribed by Kafka in his Metamorphosis, as we will increasingly come to rely on information over which we lose control and which may be used against us at the opportune time. This is the privacy paradox of the third millen- nium: on the one hand, public authorities should regulate Internet more efficiently, pay- ing particular attention to digital natives’ priva- cy. On the other hand, it is feared that these public authorities may conduct unlawful moni- toring, supposedly with a view to protecting citizens' national security. 3. Regulating global privacy The fact that a handful of California-based companies control around 2.3 billion users (1.7 billion Google, 835 million, Facebook, 600 million Twitter26 ) does not facilitate the process of harmonising European and Cana- dian privacy legislation with the American one. Larry Page’s polite refusal to comply with the request made by the Article 29 Working Party to postpone amendments to Google's privacy policy in Europe is a clear example of the difficulties encountered by States to regain their traditional regulatory and coercive pow- ers. In this case too, amongst the possible rea- sons for this difficulty, two stand out. The first is that Europe, (to which Canada can be associated on grounds of cultural affinity) and United States have two very distinct con- cepts of privacy. For insight into the reasons underlying this difference in approach, one needs to consider that the data protection laws adopted by the German Land of Hessen in 197027 , followed by Sweden in 197328 , the Federal Republic of Germany in 197729 and France in 197830 , as well as the European Di- 26 Stats available at: http://www.Internetworldstats.com/facebook.htm and http://twopcharts.com/twitter500million.php, last update March 31, 2012. 27 Datenschutzgesetz (Data Protection Act) of 1970, available (in Ger- man) at: http://www.datenschutz.rlp.de/downloads/hist/ldsg_hessen_1970.pdf . 28 The Data Act, 1973 available at: http://archive.bild.net/dataprSw.htm. 29 Bundesdatenschutzgesetz (BDSG) [Federal Data Protection Act) of 1977, available in English at: http://www.iuscomp.org/gla/statutes/BDSG.htm. 30 Loi n° 78-17 du 6 janvier 1978 relative à l'informatique, aux fichiers et aux libertés, available (in French) at: http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=LEGITEXT00000 6068624&dateTexte=20101103 .
  • 6. © by Tech and Law Center – www.techandlaw.net 6 rectives 95/46/EC, 2002/19-20-21/EC, 2006/24/EC and 2009/140/EC, are all based on the same groundwork: the European Con- vention on Human Rights (ECHR). Although Article 8 of the ECHR entrenches the principle that “everyone has the right to respect for his private and family life, his home and his correspondence”, unlike the Fourth Amendment of the U.S. Constitution, the second paragraph of the cited article seems to accept with far greater “resignation” possible interference by public authorities in the exercise of this right, to the extent “neces- sary in a democratic society in the interests of national security, public safety or the econom- ic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others”31 . According to Whitman, the conflict between the Fourth Amendment set forth in the Bill of Rights, and Article 8 of the ECHR bears wit- ness to the very different approaches to pri- vacy that have developed on the opposite sides of the Atlantic as a result of profoundly divergent ideologies, with the emphasis being placed on freedom in the U.S. and on human dignity in Europe32 . These distinct ideologies arose as a by- product of the history of each continent. In Europe, where for centuries dignity had been the preserve of the aristocracy, the craving to extend its benefits to all became the driving force behind the social struggles of the past two centuries, whilst on the other side of the Atlantic, it was the libertarian push for free- dom that led to the American revolution and laid the groundwork for the U.S. legal system. European data protection laws tend to safe- guard personal privacy against what is per- ceived as its greatest threat, and that is to say, above all, the media and the dangers posed by the information society with the 31 This is clearly illustrated in the case Leander v. Sweden (European Court of Human Rights, decision dated March 26, 1987, 9 EHRR 433, paragraph 59) in which it was held that a person who was denied securi- ty clearance for a job at a Naval Museum on the basis of information contained in secret police files that were not made available to him, did indeed sustain prejudice to his rights pursuant to Article 8(1) of the ECHR, but was not entitled to any remedy since his rights had been violated in pursuit of a legitimate aim under Article 8(2) of the ECHR, and that is to say, the protection of national security. 32 J. WHITMAN, The two western cultures of privacy: Dignity v. Liberty, in The Yale Law Journal, vol. 113, no. 6, at page 1151. emergence of new technologies. In the U.S. on the other hand, privacy laws are designed to protect the inviolability of private premises against what Americans perceive as most menacing to their personal affairs, i.e. gov- ernment intrusion. More trusting in tate power than their U.S. counterparts, Europeans have fewer qualms about surrendering some of their personal freedom to the government, although they are highly intolerant of any intrusion by the media, old or new. Americans, on the other hand, take the Jeffersonian33 view of freedom of the press as a basic constitutional value, but they have no taste for European bureau- cracy that can interefere also with the names parents may give their new-born children. Europeans are at a loss to comprehend the leeway enjoyed by U.S. banks to conduct credit checks on their customers, and find it difficult to countenance the cordial straight- forwardness with which their American friends inquire about how much they earn. For Americans, mandatory identity cards are unacceptable, quite like the nonchalant nudity in which certain European celebrities indulge (clothes being the last frontier of the “home”). The second reason is that the remedies put forward to harmonise privacy in Europe and the United States have so far not obtained any particularly effective result. As Zimmer correctly observes, the 2000 Safe Harbor Agreement between Europe and the United States 34 is a clear example: “While U.S. based companies are forced to provide more privacy protections than U.S. law demands, the Safe Harbor provisions are weaker than the full European Directive on Data Protection.” The new European privacy regulations35 offer interesting food for thought, including the in- 33 “Our liberty cannot be guarded but by the freedom of the press, nor that be limited without danger of losing it” Thomas Jefferson, letter to John Jay, 1786. 34 2000/520/EC: Commission Decision of 26 July 2000 pursuant to Di- rective 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy princi- ples and related frequently asked questions issued by the US Depart- ment of CommerceEuropean Commission’s decision of 26 July 2000, no. 2000/520/EC, available at: http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:H TML. 35 Regulation of the European Parliament and of The Council on the Pro- tection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regula-
  • 7. © by Tech and Law Center – www.techandlaw.net 7 troduction of a single piece of legislation for the entire European Union (as opposed to dif- ferent laws for each individual State) as well as a clearer, more coherent definition of “main establishment”. However, there is no shortage of controversy: for example, the United States’ attitude is diametrically opposed to the Euro- pean Union’s one on cookies. Users in the United States are entitled to refuse the use of cookies for marketing purposes, but they are not entitled to give prior consent. In any case, if and when the regulation becomes effective, much will have changed, considering the speed with which Internet evolves. 4. Conclusions The combination created both by the speed of Internet evolution and by the absence of the "State" has ushered in an expansion in the global exchange of information process, which has surely fostered liberty of expression to the detriment of privacy and other funda- mental rights. I am not convinced that the right balance can be found solely by entrusting private compa- nies with the task of managing this wealth of information; by the same token, I am not con- vinced that it is possible to obtain this result through robust regulatory activity by the State which could inevitably risk having a direct or indirect impact on the freedom of expression which Internet allows. Instead, I am of the opinion that it is funda- mental, in a society which is evolving so fast, to pay the utmost attention to the new genera- tions who are about to adopt Internet by providing an appropriate answer to the follow- ing questions: What will the balance of inter- ests be which must be achieved between pri- vacy vs transaparency, secrecy vs security, reputation vs freedom of expression in a world of Internet which is increasingly regulated by Moore’s Law, rather than by State legislation? I would not be so presumptuous as to claim to have the answer to such broad questions, questions which may have a dramatic impact on the world of Internet as we know it today. It is however beyond dispute that, ever since tion), 2012/0011 (COD), available at: http://ec.europa.eu/justice/data- protection/document/review2012/com_2012_11_en.pdf. Warren and Brandeis36 , the concept of privacy has been remodelled several times due to the relentless development of the information so- ciety. In this context, we have to bear in mind the guidelines provided by the Vice President of the European Commission Responsible for the Digital Agenda Online, Neelie Kroes, on the importance of promoting international agreements and providing incentives for self- regulatory mechanisms. Even if these guide- lines run the risk of providing weaker legal protection, they may certainly foster greater efficacy in the application of global privacy rules for digital natives and digital immi- grants37 . 36 Warren, Samuel and Brandeis, Louis, The Right to Privacy, in Harvard Law Review. Vol. IV, December 15, 1890, No. 5, available at: http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_br and_warr2.html. 37 Kroes, Neelie, Privacy: Reinforcing Trust and Confidence Online Tracking Protection & Browsers, Workshop Brussels, 22 June 2011, available at: http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/ 461.
  • 8. © by Tech and Law Center – www.techandlaw.net 8 References Bennett, Sue, Maton, Karl and Kervin, Lisa, The “Digital Natives” Report: A Critical Review of the Evidence’, British Journal of Educational Technology, 2008. Boyd, Danah Michele, Taken Out of Context: American Teen Sociality in Networked Publics. Doc- toral Dissertation, University of California, Berkeley, 2008. Gasser, Urs, Palfrey, John, Born Digital - Understanding the First Generation of Digital Natives, Perseus Publishing, 2008. Gasser, Urs, Maclay, Colin M. and Palfrey, John G., Working Towards a Deeper Understanding of Digital Safety for Children and Young People in Developing Nations (June 21, 2010). Berkman Cen- ter Research Publication No. 2010-7; Harvard Public Law Working Paper No. 10-36. Gross, Ralph and Acquisti, Alessandro, Information Revelation and Privacy in Online Social Net- works (The Facebook Case), in Proceedings of ACM Workshop on Privacy in the Electronic Socie- ty, 2005. Helsper, Ellen Johanna and Eynon, Rebecca, Digital natives: where is the evidence?, in British Ed- ucational Research Journal, 2010, Vol. 36, 503. Morozov, Eugeny, The Net Delusion. The Dark Side of Internet Freedom, in Public Affairs, New York, 2011, p. 253. Prensky Marc, Digital Natives, Digital Immigrants, From On the Horizon, in MCB University Press, Vol. 9 No. 5, 2001. Rosen, Jeffrey, The Naked Crowd Reclaiming Security and Freedom in an Anxious Age, Florida State Law University, 2004. Santo, R., James, C., Davis, K., Lee Katz, S., Burch, L., & Joseph, B., Meeting of Minds: Cross Generational Dialogue on the Ethics of Digital Life. A report in collaboration of Global Kids, Com- mon Sense Media & GoodPlay Project at Harvard University, 2009. Shah, Nishant and Abraham, Sunil, Digital Natives With A Cause?, Centre for Internet and Society, 2009. Mayer-Schoenberger, Viktor, Delete: The Virtue of Forgetting in the Digital Age, Princeton Universi- ty Press, 2009. Solove, Daniel, Nothing to Hide: The False Tradeoff between Privacy and Security, Yale University Press, 2011, p. 21. Warren, Samuel and Brandeis, Louis, The Right to Privacy, in Harvard Law Review. Vol. IV, De- cember 15, 1890, No. 5. White, S. David and Le Cornu, Alison, ‘Visitors and Residents: A New Typology for Online En- gagement’, in First Monday, Vol. 16 No 9, 2011. Whitman, James, The two western cultures of privacy: Dignity vs Liberty, in The Yale Law Journal, 2004. Youn, Seounmi, Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents, in The Journal of Consumer Affairs, 2009. Zur, Ofer and Zur, Azzia, Psychology of the Web & Internet Addiction, in Zur Institute, 2011.