Friday, April 5, 2019

Living In A Surveillance Society Information Technology Essay

vitality In A management high hostel education Technology EssayTo say we are consciously or unconsciously sleep manner of walking into inspection familiarity is a question of fact beca practice session frankly speaking individualistics in nightspot go d maven most clay of instructfulness. The security attached to charge allows individuals embrace it and some epochs with the knowledge of risks that tot with existence watched meanwhile differents walk into a direction hostelry without any knowledge of such dangers.1.2 judge from past and present events reported in several oddballs, journals and articles closely the benefits and dangers that accompany a charge fraternity, I am of the opinion that thither is a need to analyse the concept of a surveillance nightclub to ascertain if the concerns of the Information Commissi singler are justified or not.1.3 This essay would surround dissimilar issues in comparison to a surveillance parliamentary procedure suc h as individual privacy, teaching protection, polices that provide for tuition protection, different forms of surveillance and surveillance technologies with a view to providing some clarity regarding the concerns of the commissi matchlessr on the concept of a surveillance rescript.2.0 Surveillance2.1 Definition of surveillanceSurveillance is viewed as having randomness somewhat ones movement and activities recorded by technologies on behalf of the organisations and governments that structured our federation.1Surveillance was in like manner specify as a customful routine, systematic and foc procedured attention paid to in the flesh(predicate)izedised details for the sake of mesh, entitlement, management, influence or protection.2In my opinion, to be under surveillance means that al around every(prenominal) aspect of an individuals life is been watched, monitored and controlled by other(a)s who con incliner themselves superior and thereby deny throng of their just to privacy and control of different aspects of their lives.Professor Ian J.Lloyd, referring to Alan Westins seminar work on Information Technology in a Democracy identified trine types of surveillance asphysical, psychological and information surveillance3Physical surveillance involves the watching and monitoring of acts of individuals in a monastic order and enkindle be carried out with or without the utilize of surveillance technologies. The use of spies, spooks and acts of security agencies spillage within the above and is utilise to limited individuals.Psychological surveillance involves the use of surveillance technologies to monitor the activities of individuals in a society by the use of interrogations.Furthermore, info surveillance involves the use of ones personal information to monitor their activities. Due to technology conformance by countries, informationveillance is the most prominent form of surveillance utilize which is supported by electronic devices .2.2 Living in a surveillance societyThe idea of a surveillance society springs from the fears of the government and people as regards the reoccurring little terrors to lives of individuals based on past events like terrorism, fraud, armed robbery and shop lifting. In conclusion solutions to these problems, certain mea certains and forms of surveillance were introduced to provide security, and whether these solutions are appropriate, remains a question as there king be more invasive answers which aftermath to an individuals right to privacy and anonymity being infringed. Focus should consider the attainment of social goals rather than living in the shadow of the consequence of a surveillance society.4The coupled Kingdom (UK)is an example of a country that is in full compliant with the idea of a surveillance society because almost every aspect of their lives starting from taking a walk on the streets, driving their cars, going away shopping in the supermarkets, going to the ho spital and even in their work place they are under surveillance and this is so because the UK is a highly scientificly developed country with access to lots of surveillance technologies used to monitor the activities in the life of their citizens and the UK has been described as the most surveyed country with more CCTV cameras only when the irony is that it still has loose equitys on privacy and info protection.In Britain there are about 4.2 million CCTV cameras, one for every fourteen people, meaning that an individuals activities closedownure be captured by over three hundred cameras a day. Reporters claim Britain has the biggest DNA selective information base with over a million straightforward peoples info on, with some being aware and others in the dark and with the advent of new and improved new surveillance technologies being introduced individuals will be subjected to even more surveillance than they are going through today.5A surveillance society is not a totally b ad concept as it has its advantages and disadvantages. Its advantages imply provision of security and protection of people from computer hackers, terrorists, threats to state-supported security, provides speed and enhances co-ordination6.Consequent upon the pros of a surveillance society, the greatest proscribe effect of a surveillance society is the threat to privacy of individuals, though we count to be more concerned with our fears and in the process over look the possibility that being fully dependent on surveillance technologies for condom could end up being of more disability to us than good. Surveillance creates lack of trust and raises suspicion in the midst of citizens, citizens and the state, thereby h cardinalening the need for us to control and monitor our activities.2.3 Surveillance TechnologiesThere are different kinds of surveillance technologies that are used in our society today which can likewise be summarized under the different forms of surveillance. Some examples of surveillance technologies includes as follows(a) television system surveillance i.e. the use of Closed-circuit Televisions (CCTV)(b) Telecommunications surveillance(c) Biometrics(d) Shop Radio Frequency Identification (RFID) tags(e) inscription circuit cards(f) Internet cookies(g) Data Flows(h) Locating, Tracking Tagging Technologies(I) London Oyster Cards e.t.cVideo SurveillanceThis is considered the most popular kind of surveillance technology used in a surveillance society because the use of CCTV cameras en satisfactory the capturing of images of individuals who go about their activities with the aim of preventing umbrage. CCTV cameras are devices that fix actively been used in Britain to watch people and as such it has been predicted by experts that by the year 2009, 642 million pounds would fork up been spent on video surveillance software as against the 147million pounds spent in 2004 in a bid to trim the crime rate.7Telecommunications surveillanceThis invol ves the use of technical equipments such as orbicular Positioning System (GPS), tapping of phones by the police or security services and it involves the exchange of data and information which is enabled by large cuticle digital and computing systems such as the internet.Biometrics SurveillanceBiometrics is other very parkland surveillance technology being used today in most organizations, embassies and airports. This form of identification includes trunk trace e.g. fingerprints, iris scans, facial topography and hand scans which are all used on different passports and I.D card systems. Biometrics has been predicted to cause UK a healthy sum of 4.7 billion industry in 2009 which initially in the year 2003 cost 675 million and this is so because of the creation of more sophisticated surveillance technologies like languish cameras to iris identification, all with the belief that there will be accuracy in identification and crime will be reduced.8Radio Frequency Identification Tech nologies (RFID)It involves the use of radio frequency communications as a way to track goods as they move through the supply chain. RFID are embedded into products, pallets and cases thereby enabling the RFID readers read information from those tags9.Data flows SurveillanceThis is a very beautiful form of surveillance as it is gathered by surveillance technologies and it flows around computer networks and has been described by Clarke R as dataveillancewhich is the systematic use of personal data systems in the investigation or monitoring of the actions of one or more persons10.In most circumstances of data subjects live withs to giving their data, nevertheless what now happens in a berth whereby the data is transferred elsewhere and there is no idea as to where the data goes by either the existence or data sharing agencies. In such a case one tends to wonder if we can say we have confidence in the state as regards the safety of our data.With the use of these technologies you ca n suppose that in a surveillance society our lives can be monitored entirely as everything you do has one form of surveillance technology which can be used to track you. Some of these technologies include Global Positioning System(GPS) which can be use in tracking your precise location, loyalty cards which can be use to determine your capacity in shopping and as such marketers know how to site a guest based on his or her spending habits and even the internet can be monitored because every individual leaves trails when browsing the internet and this trails are called cookies which are left on a users work thereby recognizing when visits were made to that site thereby making the activities of user traceable11.There are also non-technological means of surveillance of surveillance which we practice as individuals in the society such as eavesdropping, watching, use of benignant spies and numerous others12. But these methods due to the advent of technology and modernity are gradual ly fading away because they are looked upon as ineffective compared to technological mediums. This is because surveillance technologies provide faster means of security, safety and certainty.We are left with the concern of how effective surveillance technologies are to our lives and to what extent can we say that they have made a positive impact on our lives than the negative ones.2.4 The Negative and Positive Impact of Surveillance on our society.A surveillance society has its negative and positive impacts on our lives as individuals in the society but the negatives impacts are greater than the positive ones. Surveillance society has a way of setting traps for individuals in a society and this trap includes(a)Thinking that surveillance is a product of new technologies and(b)Thinking of surveillance as a malign plot hatched by evil powers.13Ones an individuals looks at the concept of a surveillance society in this light then it is easy for one to fall into the trap of a surveillanc e society and the dangers that it poses to how lives.Apart from a sense of security, safety, minimum amount of risks, swift flow of goods, people and information which we as individuals believe are the positive effects of surveillance on our lives, what other way can we unfeignedly say that a surveillance society has improved our lives or limited the risks and dangers we go through every day because irrespective of all the different forms of surveillance both technological and non-technological, It has not kept us out of harms way. The presence of CCTV cameras in the UK has not reduced the aim of crime as terrorist still make means of operating and planning attacks. More so, individual personal data are still being used against them and all thanks to surveillance.Surveillance creates room for suspicion and lack of trust in the society because why should employers feel there is a need to monitor the affairs of their employees by bugging their cell phones, lay tracking devices in their company vehicles, storage of employees personal data, making them undertake certain medical tests and state personal questions about their lives which could be used against them in the future.Surveillance exposes individuals in a society to harm as we may not know who is watching us and what purpose our data is being used for because in the UK and the world at large, we still do not have updated data protection laws that would undecomposed our database from unauthorized access or leakage and therefore leaving us in harms way if our personal data was to fall into the hands of the wrong person because those watching us could pose a threat to us, instead of providing us with security.Surveillance encourages social inconsistency relating to race and ethnicity as some seasons our personal data is used to determine the level of benefits we get in the society.Surveillance encourages deceit, dishonesty and function creep in the sense that the data controllers tell the people that t hey need their data for a particular purpose and end up using such data for another purpose. Also surveillance technologies help marketers to manipulate customers data in the sense that the use of Loyalty Cards which is common in the UK helps producers to monitor the resources of a customer by their shopping habits and as such they come up with ways to direct marketing to that customer in order to make profits and this is wrong.Another negative effect of a surveillance society which I consider to be the most crucial is the infringement of ones right to privacy and the total divergence of an individuals anonymity in the society. hiding is a extreme right of every individual in a society but you find that in a surveillance society, it is not possible for one to exemplar that right because everywhere you go, you cant be anonymous because cameras are watching in the streets and as such the whole idea of privacy and anonymity has been defeated.The above effects of surveillance are mo re negative than positive and much more has to be done to grant us more confidence that our society is safe.3.0 The practiced to mysteriousness In Relation to a Surveillance Society3.1 What is Privacy?The concept of Privacy in relation to a surveillance society is of paramount importance because an individuals privacy in society is a constitutional right which should not be infringed.One cannot talk about a surveillance society without the issue of privacy. Privacy and surveillance cannot co-exist together without one being a hindrance to the other. A surveillance society cannot function without crossing the path of privacy while privacy cannot be secured in a surveillance society, which poses a dilemma to individuals because we are left with two options which are(a)Choose Surveillance and cede your privacy and(b)Choose your Privacy and live with the possibility of being exposed to danger and risks at any timeWith these options, whatever choice will make us prone to loosing somet hing important to our lives.3.2 Definitions of PrivacyPrivacy was defined by Judge Cooley in the year 1888 as The right to be left alone 14. Privacy has also been defined by some writers asThe right of the individual to be protected against usurpation into his personal life or affairs or those of his family, by direct physical means or by publication of information15Privacy is very important to individuals in the sense that it is the only form of dignity and pride individuals have. Therefore laws need to protect this right, otherwise people in a surveillance society will become puppets who have no control as to how their personal data and information is used and manipulated by the Puppet masters.Article 8 of the natural Human Rights and Freedoms (Convention), 1985 provides which was ratified by the Council of europium provides that (1) Everyone has the right to respect for his private and family life, his home and his correspondence.(2)There shall be no interference by a public a uthority with the exercise of this right just such as in accordance with the law and is requisite in a democratic society in the interest of national security, public safety of frugal well-being of the country, for the prevention of disorder or crime, for the protection of health morals or for the protection of the rights of freedoms of others.16This conventionalism as of that year was not a support law and its provisions could only be confirmed in European Courts and because UK was a signatory for the Council of Europe, the Convention applied to the UK but in 1998 the Human Rights symbolizes (HRA) was enacted in the UK and were incorporated into the UK law and a more recent Law was enacted in 2000 in charter (7) of the Fundamental rights of the European Union which provided for right to privacy in respect to modern day communication.173.3 Issues of Privacy in Relation to a surveillance societyA surveillance society is a huge rural area of contention in relation to privacy in the sense that it affects every aspect of an individuals life.Eric Barendt ,Described the fight between surveillance and privacy as (Political) he said prominent figures mostly politicians, celebrities, members of the royal family are arduous to protect their lives from media scrutiny meanwhile on the other hand the press which is surveillance in this case is fighting to retain their liberty of publication18He was also of the view that privacy is a fundamental human right that should not beInfringed on either by the government, business, individual or the media19As individuals in a surveillance society we need to have the right to preserve our privacy but if our actions keep on being monitored by technological or non-technological means of surveillance, it will leave a trail which can be traced back to us. Also, the fact that our personal data is constantly being transferred from one data base to another and processed by different processors makes access to our personal informatio n easy.In the case of R v Brown20, Lord Hoffman in his judgement statedPrivacy which is the right to keep oneself to our self, to tell other people that certain things are none of their business is under technological threat due to the different and various types of surveillance e.g. surveillance cameras, telephone bugs, which are used by individuals in the society today.21Also in the case of Leander v Sweden22, Mr Torsten Leander was denied employment as a result of his personal information which was held in a register and was revealed to his employer without knowledge of the kind of information that was kept about him and for what purpose it will be used and this constituted a breach of his right to privacy provided for in Article 8 (1) Fundamental Human Rights and Freedoms (Convention).In the case of Campbell v Mirror Group Newspapers23, taking pictures of Miss Campbell outside the Nacortics Anonymous, breached her right to privacy when her photos were published. She appealed on the grounds of breach of confidence by the media and which is one of her fundamental human right and against the provisions of the Data protection Act (1998). The court of appeal was against the verdict of the case but on appeal the House of Lords passed judgement in her favour which also gave maturate to other opinions concerning the extent to which ones privacy can be said to have been breached.In the case of Craxi v Italy, it was established that there was indeed an infringement of Article 8 of the European convention on human rights, though Mr. Craxi was guilty of committing certain offences, it was held thatthe state failed to provide safe custody of the transcripts of telephone conversation which Were presented as evidence before the court and to subsequently carry out an effective Investigation as to how those private communications were released into public domain24Privacy is gradually becoming lost in our society irrespective of the different Laws that have been establishe d in our society, we cant honestly say that they protect our personal information from the dangers of a surveillance society such as globalization, the internet and the continuous invention of new technologies by virtue of new discoveries.4.0 REGULATIONSA society cannot exist without laws and supervisory authorities that would dictate the actions and behaviours of individuals. In a surveillance society, there is a great need for laws and bodies to be established in other to wangle and supervise the way our personal data is being used because without people watching those who process our data, there is a risk of danger to us as our information could be manipulated and used against us if it were to fall into wrong hands. Blackmail by criminals and discrimination to our person could result where medical data about an individual who has HIV or other deadly diseases was to leak, as the person could be subject to social discrimination and stigmatisation.As a result of this, different co untries have supervisory authorities who possess some powers to fix that our privacy is protected in a surveillance society. Article 28 (1) and (2) of the data protection directive provides for the establishment of these supervisory authorities and their powers. In the UK we have the information commissioner meanwhile other member countries except Germany have a single supervisory authority who supervise the affairs of their personal data.25Different Laws have been enacted and put in place in our society today so as to make sure that our personal information is protected but these laws have their strengths and weaknesses and cannot be relied on completely by individuals in a surveillance society. Most of this law are guided by some basic principles such as(a)Personal data must be processed fairly and lawfully.(b)Personal data should not be use for any purpose other than the purpose it wasobtained for.(c)Personal data must be accurate and kept up to date.(d)An individual must be in formed of when personal data about them is collected.(e)The purpose for which personal data was obtained should be stated.(f)The consent of the individual must be obtained before obtaining their personalinformation(g)Individuals must be told how their data will be protected from misuse.(I)Individuals should be told how they can access their data and should be able to verifyits accuracy and request changes where necessary26.The above represent the basic fair information principles (FIP) that regulate the control of our personal data in a surveillance society. These principles exist side by side with some laws in controlling the use of our data. Some of these laws include(1)European Data Protection directive 95/46/EC.(2)Data Protection Act 1998.(3)Regulation of investigatory powers Act 2000.(4)Anti-Terrorism Crime and Security Act 2001.(5)The Council of Europe Convention.(6)OECD 1980 Laws.(7)Telecommunications Directive (97/66/EC).(8) Electronic communications Act 2000.4.1 Data Prote ction Act (1998)The need of data protections laws put forward out of the growing use of computers in the 1970s and the threat to personal privacy that rapid utilization of data posed and as a result data was made easily accessible from many different points. Computer technology makes it possible for data to be transferred from one data base to another by data controllers and processors such as employers, companies, government agencies and so on and data subjects most of the time are not aware of the purpose for which their personal data is being used.27Schedule 1 of the Act provides for the principles of data protection, schedule 2 provides for all personal data and schedule 3 provides only for sensitive personal data.The Act defined personal data in section 1 as data which relate to a living individual who can be identified from those data or from those data which are under procession of or is likely to come into the possession of the data controller28.It also provides in section 2 for sensitive personal data which is personal data consisting of information as to racial or ethnic origin, sexual life, mental health, religious beliefs29The Act is a regulatory law that is recognised by the UK and as such section 630of the Act provides for the Office of the Information Commissioner and the motor lodge and their powers as supervisory authorities with regards to our personal data and this Act applies to the United Kingdom (UK) and any other (EEA) state by virtue of section 5 of this act31The Act also provides data subjects with some rights in order to protect their personal data such asRight to access of our personal dataRight to be informed of our personal data and the purpose for which they are usedRight of rectification and erasure of data when it appears incorrect e.t.cSchedule 1 of the Data protection Act (1998) provided for eight principles which data controllers and processors are to apply when handling our personal data which is in conformity with the fa ir information principles mentioned above.4.2ORGANIZATION OF ECONOMIC COOPERATION AND DEVELOPMENT ( OECD 1980) LAWSThe OECD guidelines were adopted in 1980 on the protection of privacy and trans-border data flows of personal data. It comprised of 24 countries throughout the world and including the U.S and it was enacted to harmonize national privacy legislation and uphold human rights and prevent interruptions in international flows of data.The OECD 1980 guidelines include(1)Collection limitation There should be limits to the collection of personal data and it should be obtained by lawful means with the consent of the data subject where necessary(2)Data quality principle states that personal data should be relevant for the purposes in which they are used and should be accurate and up to date.(3)Purpose specification The purpose for which the data was collected must be specified(4)Security safeguards principle for example loss, unauthorized access, destruction and so on should be obs erved.(5)Openness Principle(6)Individual participation principle(7)Accountability principle A data controller should be accountable for complying with measures which give effect to the principles stated above(8) Use limitation principle Personal data should not be disclosed, made available or used for purposes other than those specified except with the consent of the data subject or the law.324.3 Anti-terrorism, Crime and Security Act (2001)This law was established to reduce the level of terrorism and crime and to provide for the retention of communications data and for many other connected purposes. This law is issued by the secretary of the state who from time to time can revise a code of coif in relation to the retention of communications providers of communications data obtained by and held by them in other to safeguard national security and prevent crime by virtue of section102 (1),(2) and (3) of the Act.33Judging from our analysis of a few laws, reports have shown that these privacy laws are not efficient enough to safeguard our privacy and personal data in a surveillance society. Other measures of regulation include(1)Self regulation by the use of codes to regulates their conduct34(2)Privacy enhancing technologies (PET)35(3) Individual s

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.