Surveillance, Privacy and related topics: Difference between revisions

From EuroDIG Wiki
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 7: Line 7:


Proposals  7, 9, 10, 12, 13,15, 29, 44, 51, 62, 81, 85, 86, 87, 89, 95
Proposals  7, 9, 10, 12, 13,15, 29, 44, 51, 62, 81, 85, 86, 87, 89, 95
{| border="0" cellspacing="0"<colgroup width="85"></colgroup> <colgroup width="177"></colgroup> <colgroup width="145"></colgroup> <colgroup width="156"></colgroup> <colgroup width="196"></colgroup> <colgroup width="147"></colgroup> <colgroup width="176"></colgroup>
|-
| style="border: 1px solid #00000a;" align="LEFT" height="32"|'''<span style="font-family: Calibri; font-size: xx-small;">No</span>'''
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; font-size: xx-small;">Name</span>'''
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; font-size: xx-small;">Affil./Org.</span>'''
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; font-size: xx-small;">SH-group</span>'''
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; font-size: xx-small;">Topic and sub-issues</span>'''
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; font-size: xx-small;">Description</span>'''
| style="border: 1px solid #00000a;" align="LEFT"|'''<span style="font-family: Calibri; font-size: xx-small;">Remarks</span>'''
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="253"|<span style="font-family: Calibri; font-size: xx-small;">7</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Matthias C. Kettemann</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">University Frankfurt, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Privacy, data protection and surveillance<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri;">(Data is the new currency. Countries collect it, companies store it ... but how can we ensure that transboundary data flows are regulated in a human rights consistent way -- Panel on issues related to jurisdiction, privacy and data protection. We\'ll look at questions like: Which entities are responsible? Who has jurisdiction? Do we need a new concept of jurisdiction and responsibility?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="58"|<span style="font-family: Calibri; font-size: xx-small;">9</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Christoforos Pavlakis</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Bophana Audiovisual Resource Center</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Civil Society</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Privacy and security in Internet</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Big Data<br />Internet of Things<br />MOOCs and education reform</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="575"|<span style="font-family: Calibri; font-size: xx-small;">10</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Gry Hasselbalch Lapenta</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">The Thinktank Digital Youth, Denmark</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Youth</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Revisiting the privacy discourse targeted youth -- How do we nuance the discourse of privacy initiatives targeted youth? How do we build informed knowledge and awareness about privacy today?<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|Two recent surveys conducted by the thinktank Digital Youth in 2013 ([http://www.digitaleunge.dk/ www.digitaleunge.dk]), illustrate that social strategies to preserve their privacy is essential to their use of social media. However, they generally appear unaware and unconcerned about the flow of private data “behind the scenes”. They repeat stories they have heard about surveillance, “super computers” and “Snowden”, but privacy is for them connected with social contexts and close relations with family and friends. Their understanding of privacy reflects to a large extend privacy campaigns and educational initiatives about the representation and branding of oneself online. It is time to move beyond basic understandings of privacy to develop a more sophisticated understanding among youth of data flow and privacy.
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="157"|<span style="font-family: Calibri; font-size: xx-small;">12</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Jordi Iparraguirre</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">ISOC Catalonia, Spain</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Technical community</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Privacy and anonymity in the digital and "analogic" world: Right to anonimity on the Internet, privacy by default. Habeas (meta/data). Eduicating citizens.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Anonymity is key for free speech and, like any other tool, it may be used als ofor crime. As the good will of people has been abused, we do need a more clear scenario on it\'s use, and controlling goverments and law enforcement.<br />- Are backdoors legal for law enforcement? Then, Quis custodiet ipsos custodes? How?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="385"|<span style="color: #262626; font-family: Calibri; font-size: xx-small;">13</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Sorina Teleanu</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Chamber of Deputies, Parliament of Romania</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Govern. Org.</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Privacy and data protection for European citizens beyond European borders -- how to ensure that the privacy and data protection rights of European citizens are protected beyond European borders? What actions to be taken? By whom?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">There are relatively high standards in the field of privacy and data protection at the EU and Council of Europe level. But are they enough when it comes to protecting the European citizens rights to privacy and data protection beyond European borders? Are the existing bilateral agreements in this area (Safe Harbor,PNR,TFTP etc) ensuring an adequate level of protection for these rights? What to do at European and international level in order to ensure that these rights are better protected outside European borders, when it comes to both the private sector (transborder data flows between companies, data stored outside Europe etc.) and the public entities in third countries (requests for data of European citizens or secret collection of data related to the online activities of European citizens)?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="196"|<span style="font-family: Calibri; font-size: xx-small;">15</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Leonid Todorov</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Coordination Center for TLDs for Russia</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Technical community</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Internet Governance - a Changing Landscape</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Privacy: The Thick Red Line -- With recent disclosures and "revelations", the issue of privacy has been debated at all fora and on all levels. Can we hammer out a universal solution and make sure there is no Peeping Tom around? What kind of instrument could be crafted on the international level and how it could be made effective in preventing privacy breaches?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="141"|<span style="font-family: Calibri; font-size: xx-small;">21</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Matthias Flittner</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">KIT / research assistant</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Secure Cloud Computing for critical infrastructure providers</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Legal and liability aspects of cloud computing Requirements of critical infrastructure. Risks and threats of cloud computing for critical infrastructures. How to make the cloud transparent to the user.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="271"|<span style="font-family: Calibri; font-size: xx-small;">29</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Milton Mueller</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Global Internet Governance Academic Network (GigaNet)</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">State Surveillance on the Internet -- Internet technical standards and end user security</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Deep packet inspection (DPI) cooperation between ISPs and national security agencies.<br />Localization as a response to NSA surveillance.<br />Independent academic researchers and technical experts should explore how Internet governance processes have reacted to the Snowden revelations. The session should not debate whether the surveillance is good or bad, but describe the changes its explosure has provoked in several areas. Three areas of change need to be covered:<br />1. IETF moves to \"harden\" Internet technical standards. <br />2. DPI surveillance programs that involve cooperation between private Internet service providers and national security agencies <br />3. Proposed policies to localize or nationalize services, equipment or routing<br />GigaNet is able to provide experts in each of these areas.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="151"|<span style="font-family: Calibri; font-size: xx-small;">44</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Carlo Piltz<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">private<br /></span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">other<br /></span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">European Data Protection Reform<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">1. The one-stop-shop mechanism: PRO's and CON's for consumers and businesses?<br />2. International data flows<br />1. What will be the effects of the proposed one-stop-shop mechanism? What has to be changed? How will consumer complaints work in the future?<br />2. The EU Commission proposed changes to the Safe Harbour decision with the USA. Will Safe Harbour survive? What alternatives are foreseen in the proposed regulation?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="231"|<span style="font-family: Calibri; font-size: xx-small;">51</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Tatiana Tropina</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Max-Planck Institute for Foreign and International Criminal Law, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">The blurring borders between criminal law, security and intelligence - how to implement proper safeguards for human rights and data protection?<br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">As many discussions these days, this proposal is related to the recent revelations concerning mass surveillance and data gathering by intelligence services. Procedural measures implemented by criminal law (such as interception. collection of data) are related to crime are usually strictly regulated by safeguards, warrants, data protection rules. However, the issues of security in terms of prevention goes beyond criminal law and creates a "grey" area when security agencies can gather and monitor data without proper safeguards. This proposal suggests to discuss the issue of safeguards (human rights, data protection, etc) which have to be implemented in this "grey area" and the way of implementing them.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="261"|<span style="font-family: Calibri; font-size: xx-small;">62</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Annnette Mühlberg</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">ver.di and EURALO, support by ISOC chapter Belgrade, FIfF, Afilias, Open Rights Group</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Civil society and MS</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Surveillance: Democracy at stake!</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Surveillance by States and by Business creates monopolies of power which endanger democracy. Those new monopolies of information collection and automated evaluation endanger and undermine human rights. In order to preserve human rights and enhance their enforcement in the digital society, we need to strengthen the informational self-determination of citizens in all spheres of society, particularly leisure and consumption, health, social security, work, media, politics. Which regulatory approaches and frames are needed to ensure such "informational self-determination" of citizens and Internet users and can prevent concentration of power and eroding of democracy and rule of law? How can respective provisions be effectively enforced?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="58"|<span style="font-family: Calibri; font-size: xx-small;">81</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Lee Hibbard</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Council of Europe</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Europ. Org.</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Mass surveillance and the right to privacy : how can our human rights be enforced and reinforced?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="color: #262626; font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="251"|<span style="font-family: Calibri; font-size: xx-small;">85</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Christian Horchert</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">CCC e.V., Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Technical community</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Securing civil society -- How can we get rid of insecurities by design which leave us vulnerable to attacks of all types? And what does it actually mean, if we are not able to fix the technical problems in the future?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">The base of our society depends on complex, networked technical systems - be it for communication in general, be it related to economy, politics or much of our everyday’s life. From the perspective of civil society we can\'t distinguish between attacks from organized crime, intelligence agencies, armies or scriptkiddies, so we need at least to agree on the fact that we have an issue here, especially if the continue to let backdoors and insecurities on purpose stay the way they do right now. There is hope, but only if we agree what is necessary to protect infrastructure, i.e. by having better liabilities for soft- and hardware as well as data and a massive intervention to actually fix many of the current problems. In order to get this done there must be a technical as well as a legal effort.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="271"|<span style="font-family: Calibri; font-size: xx-small;">86</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Andreas Schumann </span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Genossenschaft zur Wahrung von Nutzerinteressen eG, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Business</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Use of personal data - balance of power between citizens, industry and government -- Personal data is the currency of the digital age. We suggest to discuss, what new applications, communities, mechanism ensure a fair balance of interests between all those involved.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Enlightened dialogue marketers and address wholesalers, economy and government understand that their business cannot go on as it has in the past: social and political pressure is growing to help consumers more easily exercise their right to determine how their personal data is used. Web 2.0 and social media demonstrate how users play a role in determining the nature of business relationships. What new mechanisms and applications for controlling personal data, one that brings together the interests of the advertising industry, businesses and government needing to advertise, with those of customers, consumers and citizens. How can the real “me” decides which data may be stored and who is permitted to use it; in turn, companies obtain non-discriminatory access to valid data.</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="161"|<span style="font-family: Calibri; font-size: xx-small;">87</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Lorena Jaume-Palasi</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Ludwig Maximilians Univ. // Collaboratory, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Academia</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Anonymity -- Is there a difference between anonymity online and anonymity offline? What are the new phenomena, characteristics, risks and cutting points of anonymity offline and online?</span>
| style="border: 1px solid #00000a;" align="LEFT"|The once current [http://www.dict.cc/englisch-deutsch/dichotomy.html dichotomy] online / offline is incrementally eroding. Face recognition software and new gadgets (such as cameras, google glasses, etc.) in the public sphere constitute new challenges for anonymity. Democracies grant anonymity in some contexts to foster freedom of expression and choice. There are also cultural and social norms/expectations with respect to the need and validity of anonymity. Are we facing a new paradigm?
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="281"|<span style="font-family: Calibri; font-size: xx-small;">89</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Jiannis Koudounas</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Internet & Society Collaboratory, Germany</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">others</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">Territorial rights, content ownership (and Big Data) in the Digital Age</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">1) Territorial rights (distribution, copyright) and content ownership in the Digital Age. 2) Big Data related (cultural and business) opportunities/risks for digital publishing and reading. <br />1) Territorial rights. How should the delivery/distribution of content be organized so that consumers can legally get what, when and where they want it?<br />2) Ownership of digital content. In the digital age, you no longer really seem to own the content you have "bought". Ownership is rather access to the "purchased" digital content. Yet access and availability are subject to territorial rights and complicated content provider licensing restrictions. <br />3) How publishers and cultural scientists can benefit from Big Data. "Hacking the book": tools to make texts (artificially) intelligent. Private vs. social reading. Who should own user generated content, such as annotations/comments in books?</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|-
| style="border: 1px solid #00000a;" align="RIGHT" height="30"|<span style="font-family: Calibri; font-size: xx-small;">95</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">Desiree Miloshevic / Jim Killock</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;">GDP / Openrights group, UK</span>
| style="border: 1px solid #00000a;" align="CENTER"|<span style="font-family: Calibri; font-size: xx-small;">Civil society</span>
| style="border: 1px solid #00000a;" align="LEFT" bgcolor="#FF0000"|<span style="font-family: Calibri; font-size: xx-small;">UK censorship (filtering especially, also copyright)</span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
| style="border: 1px solid #00000a;" align="LEFT"|<span style="font-family: Calibri; font-size: xx-small;"><br /></span>
|}

Revision as of 18:40, 4 February 2014

Back to: Session working groups

This is a possible cluster of topic proposals.


Surveillance and privacy

Proposals 7, 9, 10, 12, 13,15, 29, 44, 51, 62, 81, 85, 86, 87, 89, 95


No Name Affil./Org. SH-group Topic and sub-issues Description Remarks
7 Matthias C. Kettemann University Frankfurt, Germany Academia Privacy, data protection and surveillance
(Data is the new currency. Countries collect it, companies store it ... but how can we ensure that transboundary data flows are regulated in a human rights consistent way -- Panel on issues related to jurisdiction, privacy and data protection. We\'ll look at questions like: Which entities are responsible? Who has jurisdiction? Do we need a new concept of jurisdiction and responsibility?
9 Christoforos Pavlakis Bophana Audiovisual Resource Center Civil Society Privacy and security in Internet Big Data
Internet of Things
MOOCs and education reform

10 Gry Hasselbalch Lapenta The Thinktank Digital Youth, Denmark Youth Revisiting the privacy discourse targeted youth -- How do we nuance the discourse of privacy initiatives targeted youth? How do we build informed knowledge and awareness about privacy today?
Two recent surveys conducted by the thinktank Digital Youth in 2013 (www.digitaleunge.dk), illustrate that social strategies to preserve their privacy is essential to their use of social media. However, they generally appear unaware and unconcerned about the flow of private data “behind the scenes”. They repeat stories they have heard about surveillance, “super computers” and “Snowden”, but privacy is for them connected with social contexts and close relations with family and friends. Their understanding of privacy reflects to a large extend privacy campaigns and educational initiatives about the representation and branding of oneself online. It is time to move beyond basic understandings of privacy to develop a more sophisticated understanding among youth of data flow and privacy.
12 Jordi Iparraguirre ISOC Catalonia, Spain Technical community Privacy and anonymity in the digital and "analogic" world: Right to anonimity on the Internet, privacy by default. Habeas (meta/data). Eduicating citizens. Anonymity is key for free speech and, like any other tool, it may be used als ofor crime. As the good will of people has been abused, we do need a more clear scenario on it\'s use, and controlling goverments and law enforcement.
- Are backdoors legal for law enforcement? Then, Quis custodiet ipsos custodes? How?

13 Sorina Teleanu Chamber of Deputies, Parliament of Romania Govern. Org. Privacy and data protection for European citizens beyond European borders -- how to ensure that the privacy and data protection rights of European citizens are protected beyond European borders? What actions to be taken? By whom? There are relatively high standards in the field of privacy and data protection at the EU and Council of Europe level. But are they enough when it comes to protecting the European citizens rights to privacy and data protection beyond European borders? Are the existing bilateral agreements in this area (Safe Harbor,PNR,TFTP etc) ensuring an adequate level of protection for these rights? What to do at European and international level in order to ensure that these rights are better protected outside European borders, when it comes to both the private sector (transborder data flows between companies, data stored outside Europe etc.) and the public entities in third countries (requests for data of European citizens or secret collection of data related to the online activities of European citizens)?
15 Leonid Todorov Coordination Center for TLDs for Russia Technical community Internet Governance - a Changing Landscape Privacy: The Thick Red Line -- With recent disclosures and "revelations", the issue of privacy has been debated at all fora and on all levels. Can we hammer out a universal solution and make sure there is no Peeping Tom around? What kind of instrument could be crafted on the international level and how it could be made effective in preventing privacy breaches?
21 Matthias Flittner KIT / research assistant Academia Secure Cloud Computing for critical infrastructure providers Legal and liability aspects of cloud computing Requirements of critical infrastructure. Risks and threats of cloud computing for critical infrastructures. How to make the cloud transparent to the user.
29 Milton Mueller Global Internet Governance Academic Network (GigaNet) Academia State Surveillance on the Internet -- Internet technical standards and end user security Deep packet inspection (DPI) cooperation between ISPs and national security agencies.
Localization as a response to NSA surveillance.
Independent academic researchers and technical experts should explore how Internet governance processes have reacted to the Snowden revelations. The session should not debate whether the surveillance is good or bad, but describe the changes its explosure has provoked in several areas. Three areas of change need to be covered:
1. IETF moves to \"harden\" Internet technical standards.
2. DPI surveillance programs that involve cooperation between private Internet service providers and national security agencies
3. Proposed policies to localize or nationalize services, equipment or routing
GigaNet is able to provide experts in each of these areas.

44 Carlo Piltz
private
other
European Data Protection Reform
1. The one-stop-shop mechanism: PRO's and CON's for consumers and businesses?
2. International data flows
1. What will be the effects of the proposed one-stop-shop mechanism? What has to be changed? How will consumer complaints work in the future?
2. The EU Commission proposed changes to the Safe Harbour decision with the USA. Will Safe Harbour survive? What alternatives are foreseen in the proposed regulation?

51 Tatiana Tropina Max-Planck Institute for Foreign and International Criminal Law, Germany Academia The blurring borders between criminal law, security and intelligence - how to implement proper safeguards for human rights and data protection?
As many discussions these days, this proposal is related to the recent revelations concerning mass surveillance and data gathering by intelligence services. Procedural measures implemented by criminal law (such as interception. collection of data) are related to crime are usually strictly regulated by safeguards, warrants, data protection rules. However, the issues of security in terms of prevention goes beyond criminal law and creates a "grey" area when security agencies can gather and monitor data without proper safeguards. This proposal suggests to discuss the issue of safeguards (human rights, data protection, etc) which have to be implemented in this "grey area" and the way of implementing them.
62 Annnette Mühlberg ver.di and EURALO, support by ISOC chapter Belgrade, FIfF, Afilias, Open Rights Group Civil society and MS Surveillance: Democracy at stake! Surveillance by States and by Business creates monopolies of power which endanger democracy. Those new monopolies of information collection and automated evaluation endanger and undermine human rights. In order to preserve human rights and enhance their enforcement in the digital society, we need to strengthen the informational self-determination of citizens in all spheres of society, particularly leisure and consumption, health, social security, work, media, politics. Which regulatory approaches and frames are needed to ensure such "informational self-determination" of citizens and Internet users and can prevent concentration of power and eroding of democracy and rule of law? How can respective provisions be effectively enforced?
81 Lee Hibbard Council of Europe Europ. Org. Mass surveillance and the right to privacy : how can our human rights be enforced and reinforced?

85 Christian Horchert CCC e.V., Germany Technical community Securing civil society -- How can we get rid of insecurities by design which leave us vulnerable to attacks of all types? And what does it actually mean, if we are not able to fix the technical problems in the future? The base of our society depends on complex, networked technical systems - be it for communication in general, be it related to economy, politics or much of our everyday’s life. From the perspective of civil society we can\'t distinguish between attacks from organized crime, intelligence agencies, armies or scriptkiddies, so we need at least to agree on the fact that we have an issue here, especially if the continue to let backdoors and insecurities on purpose stay the way they do right now. There is hope, but only if we agree what is necessary to protect infrastructure, i.e. by having better liabilities for soft- and hardware as well as data and a massive intervention to actually fix many of the current problems. In order to get this done there must be a technical as well as a legal effort.
86 Andreas Schumann Genossenschaft zur Wahrung von Nutzerinteressen eG, Germany Business Use of personal data - balance of power between citizens, industry and government -- Personal data is the currency of the digital age. We suggest to discuss, what new applications, communities, mechanism ensure a fair balance of interests between all those involved. Enlightened dialogue marketers and address wholesalers, economy and government understand that their business cannot go on as it has in the past: social and political pressure is growing to help consumers more easily exercise their right to determine how their personal data is used. Web 2.0 and social media demonstrate how users play a role in determining the nature of business relationships. What new mechanisms and applications for controlling personal data, one that brings together the interests of the advertising industry, businesses and government needing to advertise, with those of customers, consumers and citizens. How can the real “me” decides which data may be stored and who is permitted to use it; in turn, companies obtain non-discriminatory access to valid data.
87 Lorena Jaume-Palasi Ludwig Maximilians Univ. // Collaboratory, Germany Academia Anonymity -- Is there a difference between anonymity online and anonymity offline? What are the new phenomena, characteristics, risks and cutting points of anonymity offline and online? The once current dichotomy online / offline is incrementally eroding. Face recognition software and new gadgets (such as cameras, google glasses, etc.) in the public sphere constitute new challenges for anonymity. Democracies grant anonymity in some contexts to foster freedom of expression and choice. There are also cultural and social norms/expectations with respect to the need and validity of anonymity. Are we facing a new paradigm?
89 Jiannis Koudounas Internet & Society Collaboratory, Germany others Territorial rights, content ownership (and Big Data) in the Digital Age 1) Territorial rights (distribution, copyright) and content ownership in the Digital Age. 2) Big Data related (cultural and business) opportunities/risks for digital publishing and reading.
1) Territorial rights. How should the delivery/distribution of content be organized so that consumers can legally get what, when and where they want it?
2) Ownership of digital content. In the digital age, you no longer really seem to own the content you have "bought". Ownership is rather access to the "purchased" digital content. Yet access and availability are subject to territorial rights and complicated content provider licensing restrictions.
3) How publishers and cultural scientists can benefit from Big Data. "Hacking the book": tools to make texts (artificially) intelligent. Private vs. social reading. Who should own user generated content, such as annotations/comments in books?

95 Desiree Miloshevic / Jim Killock GDP / Openrights group, UK Civil society UK censorship (filtering especially, also copyright)