March 21, 2015
The Economist in the aptly titled A looming threat continues the growing body of reportage and analysis of the impact of drone technology As is expected with the Economist it is a thoughtful piece which goes beyond the usual coverage of drones, which often focus on the gee whiz factor, and looks at the increasing public policy conundrums and the obvious privacy issues associated with expanding numbers of drones and their Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 20, 2015
The BBC reports in The private investigator who spies using drones about a private investigator who uses drones for surveillance and general investigation. It is a good practical example of how drone technology is moving into mainstream commercial use, in this case by private investigators. The technology moves on and the law struggles to catch up. Though on the latter point many US states are Read the rest of this entry »
Posted in Privacy
|
3 Comments »
March 18, 2015
In Bennett v Lenovo (Canada) Inc (the statement of claim found here) the plaintiff, Daniel Bennett, last week commenced a proceeding under the Canadian Class Proceedings Act 1992 against Lenovo for breach of contract, a breach of the Consumer Protection Act 2002 and intrusion upon seclusion. The last cause of action, intrusion upon seclusion, is a privacy tort. The nub of the claim is Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 17, 2015
The Pew Research Center is a pre eminent research body. Its publications often generate headlines. They are invariably a spotlight onto issues of concern to contemporary society. Consistent with that approach the Pew Research Center has published its findings on Americans’ changed behaviours arising out of the revelations by Edward Snowden on privacy intrusive behaviour by Government. The 37 page report, American’s Privacy Strategies Post-Snowden, reveals the nuanced response by many and that there is no one homogenous view on all the privacy related issues. But it is telling to note Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 16, 2015
Privacy regulators throughout the world have highlighted the potential privacy problems associated with apps. Often their security infrastructure is poor, their privacy policies tend to the inadequate and often the means by which data is transmitted is quite insecure. But applications are hugely popular and often very useful. The problem is Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 15, 2015
The UK Information Commissioner’s Office (“ICO”), like the US Federal Trade Commission, have been quite active in taking action against those who breach privacy related laws for which each office is responsible. This has led to a good body of precedent, to Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 12, 2015
The Privacy Commissioner has marked the first anniversary of the significant tranche of amendments to the Privacy Act 1988, passed in December 2012, coming into force. Whether the centrepiece of the amendments the substitution of Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 8, 2015
An ongoing issue of controversy is what happens when a white hat hacker or cyber expert finds a hole in an organisation’s cyber security and tries to highlight the problem to the organisation. All too often the advice is ignored. Sometimes the hacker will expose the breach by hacking into the system and proving what he or she is complaining about. That has resulted in a criminal complaint even if the motive of the breach was pure. Such as when Public Transport Victoria showed very little appreciation when a Melbourne schoolboy hacked into its site and exposed the weaknesses in its systems. The PTV reportedly made a complaint about the hacker to the police as reported in
Hacked site reports boy to police. It is a very short sighted approach which usually guarantees poor publicity and reputational damage. It also does little to highlight the breaches in the privacy legislation, a separate issue to the complaint about a data security breach.
Read the rest of this entry »
Posted in Privacy
|
1 Comment »
The National Telecommunications & Information Administration has followed up on the US President’s memorandum regarding the commercial use of drones with the commencement of the discussion process with NTIA Seeks Comment on Process for Developing Best Practices for Commercial and Private Use of Unmanned Aircraft Systems. The framework for discussion includes dealing with the privacy issues. It is a welcome Read the rest of this entry »
Posted in Privacy
|
1 Comment »
March 2, 2015
The Privacy Commissioner has released 3 international money determinations Read the rest of this entry »
Posted in Commonwealth Privacy Commissioner, Privacy
|
1 Comment »