Andelka M Phillips
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9781474422598
- eISBN:
- 9781474476485
- Item type:
- chapter
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781474422598.003.0004
- Subject:
- Law, Legal Profession and Ethics
This chapter provides a broad overview of privacy, data protection and security issues raised by DTC services. This includes discussion of the EU’s General Data Protection Regulation (GDPR), the UK’s ...
More
This chapter provides a broad overview of privacy, data protection and security issues raised by DTC services. This includes discussion of the EU’s General Data Protection Regulation (GDPR), the UK’s Data Protection Legislation, and a brief discussion of US and Canadian Privacy Law. It also covers secondary use of genetic databases, the Future of Privacy Forum’s Privacy Best Practices for Consumer Genetic Testing Services, and Indigenous Peoples and Data Sovereignty.Less
This chapter provides a broad overview of privacy, data protection and security issues raised by DTC services. This includes discussion of the EU’s General Data Protection Regulation (GDPR), the UK’s Data Protection Legislation, and a brief discussion of US and Canadian Privacy Law. It also covers secondary use of genetic databases, the Future of Privacy Forum’s Privacy Best Practices for Consumer Genetic Testing Services, and Indigenous Peoples and Data Sovereignty.
Rob Kitchin
- Published in print:
- 2021
- Published Online:
- September 2021
- ISBN:
- 9781529215144
- eISBN:
- 9781529215168
- Item type:
- book
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781529215144.001.0001
- Subject:
- Sociology, Science, Technology and Environment
How can we begin to grasp the scope and scale of our new data-rich world, and can we truly comprehend what is at stake? This book explores the intricacies of data creation and charts how data-driven ...
More
How can we begin to grasp the scope and scale of our new data-rich world, and can we truly comprehend what is at stake? This book explores the intricacies of data creation and charts how data-driven technologies have become essential to how society, government and the economy work. Creatively blending scholarly analysis, biography and fiction, the book demonstrates how data are shaped by social and political forces, and the extent to which they influence our daily lives. The book begins with an overview of the sociality of data. Data-driven endeavours are as much a result of human values, desires, and social relations as they are scientific principles and technologies. The data revolution has been transforming work and the economy, the nature of consumption, the management and governance of society, how we communicate and interact with media and each other, and forms of play and leisure. Indeed, our lives are saturated with digital devices and services that generate, process, and share vast quantities of data. The book reveals the many, complex, contested ways in which data are produced and circulated, as well as the consequences of living in a data-driven world. The book concludes with an exploration as to what kind of data future we want to create and strategies for realizing our visions. It highlights the need to enact 'a digital ethics of care', and to claim and assert 'data sovereignty'. Ultimately, the book reveals our data world to be one of potential danger, but also of hope.Less
How can we begin to grasp the scope and scale of our new data-rich world, and can we truly comprehend what is at stake? This book explores the intricacies of data creation and charts how data-driven technologies have become essential to how society, government and the economy work. Creatively blending scholarly analysis, biography and fiction, the book demonstrates how data are shaped by social and political forces, and the extent to which they influence our daily lives. The book begins with an overview of the sociality of data. Data-driven endeavours are as much a result of human values, desires, and social relations as they are scientific principles and technologies. The data revolution has been transforming work and the economy, the nature of consumption, the management and governance of society, how we communicate and interact with media and each other, and forms of play and leisure. Indeed, our lives are saturated with digital devices and services that generate, process, and share vast quantities of data. The book reveals the many, complex, contested ways in which data are produced and circulated, as well as the consequences of living in a data-driven world. The book concludes with an exploration as to what kind of data future we want to create and strategies for realizing our visions. It highlights the need to enact 'a digital ethics of care', and to claim and assert 'data sovereignty'. Ultimately, the book reveals our data world to be one of potential danger, but also of hope.
Rob Kitchin
- Published in print:
- 2021
- Published Online:
- September 2021
- ISBN:
- 9781529215144
- eISBN:
- 9781529215168
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781529215144.003.0027
- Subject:
- Sociology, Science, Technology and Environment
This chapter explores what kind of data future we want to create and strategies for realizing our visions. It highlights the need to enact 'a digital ethics of care', and to claim and assert 'data ...
More
This chapter explores what kind of data future we want to create and strategies for realizing our visions. It highlights the need to enact 'a digital ethics of care', and to claim and assert 'data sovereignty'. An ethics of digital care is practising reciprocal and nonreciprocal care with respect to digital life, including data practices: that we care for ourselves and others in ways that we expect to be treated, and are supportive and promote wellbeing and not exploitative. This means acting in moral ways with respect to the generation and use of data. Accompanying an ethics of digital care should be digital rights and entitlements. Data sovereignty is the idea that we should have some authority and control over data that relates to us and that other individuals, companies, and states should recognize the legitimacy of that sovereignty. In other words, we should have a say in what data are generated about us and have an ownership stake in those data that dictates how they are treated and shared, and for what purpose they can be used.Less
This chapter explores what kind of data future we want to create and strategies for realizing our visions. It highlights the need to enact 'a digital ethics of care', and to claim and assert 'data sovereignty'. An ethics of digital care is practising reciprocal and nonreciprocal care with respect to digital life, including data practices: that we care for ourselves and others in ways that we expect to be treated, and are supportive and promote wellbeing and not exploitative. This means acting in moral ways with respect to the generation and use of data. Accompanying an ethics of digital care should be digital rights and entitlements. Data sovereignty is the idea that we should have some authority and control over data that relates to us and that other individuals, companies, and states should recognize the legitimacy of that sovereignty. In other words, we should have a say in what data are generated about us and have an ownership stake in those data that dictates how they are treated and shared, and for what purpose they can be used.
Nayan B. Ruparelia
- Published in print:
- 2016
- Published Online:
- September 2016
- ISBN:
- 9780262529099
- eISBN:
- 9780262334129
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262529099.003.0005
- Subject:
- Computer Science, Programming Languages
Security is considered from a holistic perspective: the user of cloud services, the provider, the applications hosted in the cloud and the devices used to access the cloud services. This analysis is ...
More
Security is considered from a holistic perspective: the user of cloud services, the provider, the applications hosted in the cloud and the devices used to access the cloud services. This analysis is made using the Parkerian Hexad (Confidentiality, Control, Integrity, Authenticity, Availability and Utility) and the CIA Triad (Confidentiality, Integrity and Availability). Enforcing such security regimes is then discussed using security containers and monitoring.Data integrity is considered in terms of encryption, checksums and data loss prevention. Also, data privacy is discussed with regard to Personally Identifiable Data (PID).Legal and compliance issues, especially with regard to the jurisdiction of laws in an international cloud environment, is considered. Finally, a glossary of common security terms is provided.Less
Security is considered from a holistic perspective: the user of cloud services, the provider, the applications hosted in the cloud and the devices used to access the cloud services. This analysis is made using the Parkerian Hexad (Confidentiality, Control, Integrity, Authenticity, Availability and Utility) and the CIA Triad (Confidentiality, Integrity and Availability). Enforcing such security regimes is then discussed using security containers and monitoring.Data integrity is considered in terms of encryption, checksums and data loss prevention. Also, data privacy is discussed with regard to Personally Identifiable Data (PID).Legal and compliance issues, especially with regard to the jurisdiction of laws in an international cloud environment, is considered. Finally, a glossary of common security terms is provided.
Kieron O’Hara
- Published in print:
- 2021
- Published Online:
- July 2021
- ISBN:
- 9780197523681
- eISBN:
- 9780197523711
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197523681.003.0017
- Subject:
- Political Science, International Relations and Politics
This chapter examines the flow of data across borders, in order to support the digital economy. Governments are increasingly treating data as a national asset, which will give economic advantages to ...
More
This chapter examines the flow of data across borders, in order to support the digital economy. Governments are increasingly treating data as a national asset, which will give economic advantages to foreign companies, while compromising the privacy of citizens. India and other nations in the developing world are concerned that they will be reduced to providing data as raw material and will be forced to import high-value services from tech companies in the United States and China, rather than developing their own digital economies. Initiatives using World Trade Organization agreements to coordinate global trade in data, supported by China and the United States, are examined, but they have not persuaded sceptics, leading to accusations of neo-colonialism. India is leading the holdouts, which may influence the Internet’s future. The ideologies underlying the Four Internets are compared with respect to their views of flows of data.Less
This chapter examines the flow of data across borders, in order to support the digital economy. Governments are increasingly treating data as a national asset, which will give economic advantages to foreign companies, while compromising the privacy of citizens. India and other nations in the developing world are concerned that they will be reduced to providing data as raw material and will be forced to import high-value services from tech companies in the United States and China, rather than developing their own digital economies. Initiatives using World Trade Organization agreements to coordinate global trade in data, supported by China and the United States, are examined, but they have not persuaded sceptics, leading to accusations of neo-colonialism. India is leading the holdouts, which may influence the Internet’s future. The ideologies underlying the Four Internets are compared with respect to their views of flows of data.
Charles Weiss
- Published in print:
- 2021
- Published Online:
- October 2021
- ISBN:
- 9780190946265
- eISBN:
- 9780197571941
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190946265.003.0010
- Subject:
- Physics, History of Physics
This chapter traces the challenges to the Internet’s founding values of freedom of information, communication, and innovation back to its first years. The issues of security, privacy, and ...
More
This chapter traces the challenges to the Internet’s founding values of freedom of information, communication, and innovation back to its first years. The issues of security, privacy, and misinformation raised by the Information and Communications Revolution have roots in early decisions, taken either as conscious choices or as products of the pioneers’ libertarian spirit, and later reinforced by democratic governments’ determination to keep the Internet free of censorship and open to innovation. Despite early hopes that controlling information flows would be technically impossible, measures by authoritarian governments have become more sophisticated and effective, especially in China. At the same time, democracies agree on basic principles but disagree over privacy and data localization. These tensions were resolved pragmatically: an independent NGO operates the Internet, advised by both governments and a freewheeling forum. The spread of Chinese 5G technology is likely to challenge U.S. dominance of Internet operation, governance, and embodied values.Less
This chapter traces the challenges to the Internet’s founding values of freedom of information, communication, and innovation back to its first years. The issues of security, privacy, and misinformation raised by the Information and Communications Revolution have roots in early decisions, taken either as conscious choices or as products of the pioneers’ libertarian spirit, and later reinforced by democratic governments’ determination to keep the Internet free of censorship and open to innovation. Despite early hopes that controlling information flows would be technically impossible, measures by authoritarian governments have become more sophisticated and effective, especially in China. At the same time, democracies agree on basic principles but disagree over privacy and data localization. These tensions were resolved pragmatically: an independent NGO operates the Internet, advised by both governments and a freewheeling forum. The spread of Chinese 5G technology is likely to challenge U.S. dominance of Internet operation, governance, and embodied values.