Full Text Original - Free Journal
Transcription
Full Text Original - Free Journal
International Journal of Law and Management Government’s civil liability towards individuals’ privacy in cyberspace Ameneh Malmir Mohammad Malmir Article information: Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) To cite this document: Ameneh Malmir Mohammad Malmir , (2015),"Government’s civil liability towards individuals’ privacy in cyberspace", International Journal of Law and Management, Vol. 57 Iss 2 pp. 98 - 106 Permanent link to this document: http://dx.doi.org/10.1108/IJLMA-09-2013-0042 Downloaded on: 27 March 2015, At: 20:42 (PT) References: this document contains references to 27 other documents. To copy this document: permissions@emeraldinsight.com The fulltext of this document has been downloaded 24 times since 2015* Users who downloaded this article also downloaded: Ilene Goldberg, (2015),"The Affordable Care Act: triumphs and tribulations", International Journal of Law and Management, Vol. 57 Iss 2 pp. 87-97 http://dx.doi.org/10.1108/IJLMA-07-2013-0030 Access to this document was granted through an Emerald subscription provided by 609392 [] For Authors If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.com Emerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online products and additional customer resources and services. Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation. *Related content and download information correct at time of download. The current issue and full text archive of this journal is available on Emerald Insight at: www.emeraldinsight.com/1754-243X.htm IJLMA 57,2 Government’s civil liability towards individuals’ privacy in cyberspace 98 Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) Received 21 October 2013 Revised 21 October 2013 Accepted 23 December 2013 Ameneh Malmir Department of Management, Malayer Branch, Islamic Azad University, Malayer, Iran, and Mohammad Malmir Iranian Central Bar Association, Tehran, Islamic Republic of Iran Abstract Purpose – One of the main manifestations of the application of modern information and communication technologies which is considered by governments is the concept of e-government. Design/methodology/approach – Developing economic and social interactions requires the government to interfere in people’s private affairs; the issues that were formerly part of the private rights of citizens are now influenced by public rights and actions resulted by the government’s regulation. Findings – To provide their individual freedom and welfare, human beings consider it necessary to respect the privacy of each other; they do not want to be watched over or their personal information and secrets to be revealed. Originality/value – Many international laws have been legislated in this regard to respect individuals’ privacy and prohibit natural and legal persons from accessing the information; this must be observed by governments, too. Keywords Privacy, E-government, Civil liability of the government Paper type General review International Journal of Law and Management Vol. 57 No. 2, 2015 pp. 98-106 © Emerald Group Publishing Limited 1754-243X DOI 10.1108/IJLMA-09-2013-0042 1. Introduction Nowadays, the relationship between governments and citizens is in such a way that social management, in its general terms, is unavoidable in citizens’ social and individual life for progressing and performing social, economic, political, cultural, educational and communicational programs. Developing social and economic interactions requires governments to interfere in people’s private lives and in issues that were formerly considered as private rights of citizens, and they are now influenced by public rights and actions taken as the results of government’s dominance. To provide their individual freedom and welfare, human beings consider it necessary to respect the privacy of each other; they do not want to be watched over or their personal information and secrets to be revealed. Right to privacy is a right that prevents the government or any individual to intervene and violate individual’s privacy through both ethics and law. Privacy as a social value and legal right includes a wide range of rights related to individual independence which is known as “being alone and free from the attention of the public” and “not watched or disturbed by other people”. Regarding the relationship between individuals, privacy also determines the right to control the Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) information about people. Principles of privacy have a long history and have continued their growth and development in spite of the increasing threats of modern technologies. Government’s role is not merely to provide information and services; in addition to communicating with citizens and the private sector, it can also make strategic communications between organizations and public sectors. Such an interaction can improve collaboration between state agencies and can facilitate the implementation of state policies and guidelines (Ebrahim and Irani, 2005). 2. E-government E-government, as a term, includes using information technology, especially the Internet, in providing public services with greater ease, more customer-friendly, more economical, more differently and totally in a better way. In a broader definition, e-government can be defined as adoption of any type of information and communication technology by the government (Hughes, 2004, p. 259). Numerous definitions have been offered for e-government, but these definitions seem to be largely similar. Two definitions presented here: e-government is a way for governments to use new technologies and provide required facilities for convenient access to state information and services with higher quality; in addition, it also creates more opportunities for public participation in democratic processes. According to “Economic Cooperation and Development”, e-government-government is “the use of information and communication technologies, especially the Internet, as a tool for achieving more efficient government”. (OECD, 2003, p. 23). It is worth mentioning that e-government is not solely limited to the executive sector; it also includes legislative and judicial tasks in different levels ranging from central and local ones (e-government in its narrow sense is conveying e-government-commerce concepts from the private sector to the public sector). According to a UN report on knowledge-based societies, e-commerce includes using electronic documents instead of paper for doing commercial or state tasks. According to this definition, e-commerce is not just confined to trading and the private sector. Therefore, this concept refers to electronic services and electronic administrative systems in the public sector; electronic services means providing information, programs, strategies and public services which are done electronically and all day (Tat-Kei Ho, 2002). Changing governments into electronic ones was made much later than private sectors. Advances in information and communication technology provide many facilities, such as the opportunity to offer better services to customers in searching and controlling people’s lives. Protecting people’s private lives and their safety is an important aspect of e-government. 3. Privacy Defining privacy is widely associated with environmental and context conditions. Various definitions have been proposed for privacy in international documents and different laws. Privacy is marking the boundary line which allows the society to enter the private affairs of a person. Privacy is the realm of private life which a typical person does not allow himself to violate in any condition by understanding society needs. Individuals’ tendency to their own dignity is the most important objective of privacy. Privacy is the area which includes determined actions, behaviors and thoughts that the person has not Individuals’ privacy in cyberspace 99 IJLMA 57,2 Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) 100 revealed and is not willing to reveal. In fact, privacy is the secret treasure of a person’s behaviors, actions and inner thoughts. Private property, home, work, personal data, private communication, clothing and personal stuff are all examples of privacy. In addition, different privacies can be distinguished such as psychological privacy and communication privacy. However, this research focuses on the privacy of information. Privacy of information involves gathering, using and distributing personal information. The right to protect private information also includes the right to control the disclosure of and access to personal information. In other words, it is the right to the level of confidentiality and secrecy. Collecting sensitive information without the permission or knowledge of the person can be considered as a potential weapon in the hands of those in power. It is obvious that most people act differently in public; in such conditions, it is natural for an individual to act cautiously and in a limited way. People have the right to be protected by law and this protection also involves information privacy. Therefore, this value is not less than other fundamental values, as in the era of information culture, some privacy is required for security and prosperity of human beings. Others know privacy as the right to leave one on his own, the right to be free from unreasonable personal intrusions or the right to decide how much of his personal information can be given to whom. Some others know privacy as “the right to be alone” or “the right to itself” knows. With the above definitions, it is found that there is currently no agreement on a universal definition of privacy, although great efforts have been made to this end. There is also no agreement on the definition of the word “loneliness” and certainly no single definition can be achieved of what it means. Therefore, American lawyers offer a typical analysis of that: “Reasonable expectation of the right to privacy”; for example, those who wish to speak on the phone typically want to keep their conversation private, while those getting together in a public ceremony or café typically expect to be heard by others (Ansari, 2002). Iran’s e-commerce law monitors the protection of personal data and personal messages. Article 58 of the law decrees this issue: Storage, processing and distribution of personal data message indicating ethnic or racial origins, religious views, moral characters and the individuals’ data about physical, mental or sexual state of them without their explicit consent is illegal under any title. Furthermore, Article 59 of the Constitution stipulates that if the person agrees on revealing his information, the content of the message must also be consistent with the rules adopted by the Iran’s Parliament; then, having the following conditions, the message can be stored, processed or distributed in e-commerce: • Its objectives must be defined and clearly explained. • The size of the message must be only as small as required and must be appropriately used for the prescribed purposes. • Message must be accurate and up-to-date • The person who is the subject of the data must have access to computer files containing his personal messages to complete or remove his wrong and incomplete messages. • The person who is the subject of the message must be able to remove his complete computer files containing his personal data. Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) General rules for the protection of individual’s privacy are included in the most important human right documents, but no specific agreements have not been made yet in this field at the international level (Nouri and Nakhjavani, 2004, p. 52). Some resolutions have been considered in UN legislations regarding the consequences of new technology development and adoption on individuals’ privacy. Protection of individuals’ comfort and privacy regarding automated informing systems has been reflected in the European Convention at the regional level (Albrecht and Zaymon, 2001). Considering the protection of individuals’ privacy, the protection of secrecy of correspondence in international conventions must be mentioned. In this respect, international human rights declarations (adopted on 10 December 1948 in the UN General Assembly) stipulates in Article 12 that: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks. Islamic Declaration of Human Rights (OIC states) stipulates in Article 118 that: • Everyone has the right to live in peace and be secured about his family, religion and property. • Everyone has the right to be independent in his private affairs of life (such as home, family, property and communication) and spying or monitoring that damage his dignity is not permitted; he should be protected against any coercive interference in such affairs. • Housing must be respected in every case; no one must be allowed to enter illegitimately or without the permission of its residents. The house must not also be destroyed or confiscated and its inhabitants must not be displaced. International Covenant on Civil and Political Rights legislated the same thing in Article 17, which was passed in 1966: • No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honor and reputation. • Everyone has the right to the protection of the law against such interference or attacks. The Iranian Government accepted and joined to this commitment in 1975. Also, according to Article 9 of Iranian Civil Code, General Regulations that are passed between the Iranian Government and other governments are considered as law, and ultimately, it is necessary to carry out such international rules. In Iran’s constitution, protection of data and privacy are forecast in several laws. Some of them are mentioned here. According to Article 22 of the Constitution of the Islamic Republic of Iran: “the dignity, life, property, rights, residence and occupation of the individuals are not allowed to be violated except in cases prescribed by law”. Article 25 of the same law stipulates that willful inspection of letters, record and disclosure of telephone conversations, disclosure of telegraphic and telex communications, censorship and willful failure to transmit them and eavesdropping are forbidden in case Individuals’ privacy in cyberspace 101 IJLMA 57,2 Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) 102 except it is done by the order of law. This Article discusses respecting some aspects of privacy. Paragraph 3 of the law of duties and authorities of the Ministry of Communications and Information Technology, which was passed in Iran’s Parliament in 2003, also stipulates that: […] protection of any parcels and not recording or revealing them as well as not recording telecommunications and informing network transfers and the information about natural and legal persons is, according to law, part of the duties of Ministry of Communications and Information Technology. Iran’s legal sanctions and deterrent punishments enacted in 1996 predicted the executive guarantee of violations of regulations. But regarding civil liability, the government should refer to regulations of civil liability. 4. Government’s civic responsibility toward the citizens E-government brings with it the possibility of searching into private lives of citizens living in a community. Using the Internet and e-mails leads to easier access to individuals’ records and backgrounds compared to a conventional telephone communication. Internet information and e-government mails can be stored for a long time and can be accessed easily. Thus, police and intelligence agencies can easily search some keywords in all e-mails, while the traditional way for listening to phone calls or mailing lists was very time-consuming. Technically, each level of police resources could take more people under examination and monitoring. For example, the Central Bureau of Investigation (CBI) has developed programs to permeate the networks and can collect required information and investigate e-mails of suspects. As a law which was passed in 2000, British police can ask the owners of Internet companies to install some systems for overhearing networks and investigating e-mails and control the transferred data in network through that. Other states such as Singapore have brought to pass such laws (Hughes, 2004). Computer security has also recently declined. Hackers have managed to find ways to influence government computers. Systems of electronic use of credit cards are insufficient; it is necessary to implement digital signatures and other safeguarding actions before ubiquitous use of electronic bank accounts and paying debts. Another issue related to privacy and security of personal life is the ownership and the use of information, especially through extensive rent of information technology (IT). According to Bellamy and Taylor, more than 30 per cent of Whitehall’s IT has been rented. Such an action remains a limited number of companies with a strong strategic position for the government of Information Age (A’rabi, 2002). Moreover, some cases have been observed of controlling and using of personal information of British citizens by computer companies which own the information. Although the main issue was information ownership and privacy, discussions about the nature and quality applied control over commercial value of information about customers have not so far been released for public awareness, neither have they been resolved. Public information can be used to detect certain types of goods through data mining techniques as well as combining them with innovative marketing. If the information related to the birth of children was accessed by private sectors, it could be used for direct sales of goods (Pourezzat, 2001). If there was no information security, private institutions involved in medical care could sell their information to insurance companies and they would use it Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) to calculate insurance risks. Although governments can use their available information for commercial purposes, the fact is that the government better protects people’s private information compared with the private sector. To exclude the private sector from access and use of government information, strict ethical standards and restricting laws are still required. In total, according to The Economist (24 June 2000), e-government is faced with a major problem: Individuals’ privacy in cyberspace The fact is that the more efficient the government, the more information it would have about its citizens. The power increase (exponential progression) has led to government’s ability in being aware of private lives and civil liberties. Citizens’ satisfaction and constant vigilance is the price that electronic citizen pays for his satisfaction. 103 Currently some conventions for using information, laws regarding the private lives of individuals and the like have been proposed by governments, but private lives’ aspects and security of e-government more than anything else are a matter of concern (Hughes, 2004). Today the privacy of people is exposed to risks that have not ever existed before IT; this is like having no risk of electric shock before the advent of electricity. We must be careful now that the development of technology does not ruin the privacy of people. Who is responsible toward these risks and what solutions should reduce this insecurity feeling are the questions that are raised regarding this issue (Khaki, 2002). In recent decades in Europe, most concern was about the government’s role in creation and use of databases containing citizens’ information. Although securing information by the governments was not a new matter, computerized documents immensely increased the possibility of tracking them by individuals. The thick folders were replaced by databases and a copy of the file could be reproduced without requiring specific space. As a result, governments had more chance to use them compared with the past, as it was not formerly cost-effective or there was no budget for that. Thus, there was a growing desire for governments to store much more information about people to retrieve them when needed. They included everything from fingerprints, addresses, relatives and jobs to social and political activities. Another problem of IT is that for people to maintain their privacy, they are forced not to do many things that they previously did. According to Human Rights, this causes restriction in civil liberties and autonomy of people and spoils their independence, which is not accepted at all. However, these laws often differ from Islamic culture to Western culture (Faqihi, 2001). Nevertheless, it should not be overlooked that electronic databases have many important benefits; higher efficiency, better and more equitable distribution of social benefits and better and more effective surveillance in preventing crimes are among the most important benefits of that. For violating the privacy of individuals, governments typically highlight these benefits. But, ultimately, they failed to satisfy public opinion toward violating this right and the very issue forced the USA to legislate that public agencies that do not have any clear function and are not sufficiently justified are not allowed to establish a centralized and comprehensive database of individuals to target their privacies. Some other countries have taken steps and have created institutions that support individuals’ privacy. Given the sufficient authority, these institutions are able to regulate and control governments’ actions and private sectors that deal with these types of information. But, it seems that many critics of these laws and institutions have failed to meet people’s expectations (Danayifard, 2003). IJLMA 57,2 Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) 104 As a result of technical developments, easier applications and cost reduction, the private sector had a crucial role in creating databases that contain information about people and this information had a great value. Thus, individuals’ information was collected in private institutions such as companies that determine individuals’ financial validity, firms which regulate insurance and those that send postal parcels. This integration brought added value that many other companies are willing to pay a lot of money for having this information, as they were able to advertise their products without spending a lot of money by just sending them to the e-mail addresses collected by a company. Today, the accumulation of these addresses has been very valuable and great interest has been found in it. If ethical systems are not defined for them, it is possible to seriously harm individuals’ mental and inner peace and lead society to experiencing new challenges. The mentioned advantages and disadvantages of IT make it difficult to easily decide about these issues and formulate a systematic evaluation. It seems that discussing this issue is one of the most important issues in the various cultures of the world; particularly, Iran’s community with having special features requires a special argument that fits various aspects of its religious and Islamic culture. Another point to be mentioned here is that it should not be neglected that Western principles and patterns are not efficient and applicable to Iran’s community; cultural features of the society should be taken into account in developing moral values and ethical visions (Deziani, 1997). Discussing ethics in IT is not limited to the issue of privacy; it also includes other important topics that must be covered under different titles and articles. It is hoped that those researchers interested in these kinds of discussions help members of the Board of Education (Jalali Farahani, 2005). Article 1 of 1976 on civil liability stipulates that, anyone who intentionally, without legal justification or because of recklessness, damages an individual’s life, health, property, freedom, dignity or business reputation or something alike which causes someone’s material or spiritual damage is liable for damages caused by his actions. The third chapter of the e-commerce law (Articles 58 to 78) concerns the protection of personal data. The laws regarding the agencies that provide online services stipulate as follows: • Paragraph 15 states that the disclosure of private affairs and violating the privacy of their personal information is prohibited; paragraph 16 also declares that publicizing the information that contains encryption keys of information banks, special software, mail boxes or breaking technique is also prohibited. • Paragraph 17-19 states that any unauthorized intrusion into centers holding private and confidential information and any attempt to break the lock of such systems has been banned. • According to paragraph 7-20, any effort to hear and examine data packets which are transferred through the network that belongs to others has been banned. • In accordance with the provisions of the same paragraph, the punishment for offenders is to note them for the first time, revoke the provisional license for one week for the second time, revoke the provisional license for six months if done for the third time and the fourth time will lead to revoke of license permanently. Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) 5. Conclusion Currently, some conventions have been offered by governments on the use of information and private lives of individuals and the like, but aspects of private lives and security of e-government are mostly a matter of concern. Another problem of IT is that for people to maintain their privacy, they are forced not to do many things that they previously did. According to Human Rights, this causes restriction in civil liberties and autonomy of people and spoils their independence, which is not accepted at all. Considering the protection of individuals’ privacy, the protection of the secrecy of telecommunications in international conventions must be referred to. In this regard, many international laws have been legislated to respect the privacy of individuals and prevent natural and legal persons from violating this privacy, and governments are also subjected to obey them. Such rules also exist in Iran and some other countries, but in some countries such as England, the USA, Singapore and others, some laws have been legislated for the government’s access to individuals’ privacy that limit individuals’ freedom in some regards. Finally, in all national and international laws, no proper executive guarantee has been considered for governments; as governments have some authority, power and control over people, legislating some international and uniform principles that predict government’s responsibility and enjoy strong enforcement seems necessary. References Albrecht, H.-J. and Zaymvn, M. (2001), Workshop of Investigating Criminal Justice Developments in the Modern Era, Pardis Qom Campus, Tehran University, Tehran. Ansari, B. (2002), Information Privacy Principles, Legal and Parliamentary Affairs Monthly, No. 3. A’rabi, S.M. (2000), “The study of Iranian government accountability: a comparative perspective”, Public Management Journal of Knowledge Management, No. 55, pp. 119-155. Danayifard, H. (2003), “Accountability in public organizations: can IT increase accountability?”, Development Management Quarterly, No. 16 pp. 71-90. Deziani, M.H. (1997), “Criminal aspects of computer use and computer crimes, informatics newsletter”, Council of Informatics, Management and Planning Organization, Vol. 9 No. 58, p. 91. Ebrahim, Z. and Irani, Z. (2005), “E-government adoption: architecture and barriers”, Business Process Management Journal, Vol. 11 No. 5, pp. 589-611. Faqihi, A. (2001), “Systems of accountability in the public sector”, Management Studies Quarterly, Vol. 29 No. 30, pp. 53-68. Hughes, O. (2004), New Public Management, Translated by Alvani, M. and Tehran, D.H., Golshan Publications. Jalali Farahani, A.H. (2005), “Electronic money laundering”, Law and Rights Quarterly, No. 4, pp. 109-130. Khaki, Q.R. (2002), “The strategies of virtualization the government: the main challenges facing the fourth development plan”, Journal of Management Development, No. 58, pp. 21-36. Nouri, M. and Nakhjavani, R. (2004), “Data protection law”, Cooperated by presidential committee of Rights Studies, Library of Ganje danesh. OECD (2003), E-Government Imperative: Main Findings, OECD. Pourezzat, A.A. (2002), “Public management and social justice”, Public Management Journal of Knowledge Management, No. 55, pp. 83-117. Tat-Kei Ho, A. (2002), “Reinventing local governments and the E-government Initiative”, Public Administration Review, Vol. 62 No. 4. Individuals’ privacy in cyberspace 105 IJLMA 57,2 Downloaded by Universitas Muhammadiyah Malang At 20:42 27 March 2015 (PT) 106 Further reading Alvani, S.M. and Yaqubi, N. (2003), “Public management and e-government”, Management Culture Journal, Vol. 1 No. 3, pp. 5-17. Ansari, B. (2002), “Civil liability of public media”, Journal of Ministry of Research. Ayres, J.M. (2004). “Framing collective action against neoliberalism: the case of the ‘anti-globalization’”, Movement Journal of World-Systems Research, Vol. 10 No. 1, pp. 11-34. Cohen, A. (2004), “Electronic surveillance”, Translated by Javidzade, H.R. and Mireh’ee, S.H., Islamic Jurisprudence Quarterly, No. 2. pp. 193-207. Fazli, M. (2005), “Criminal liability of Internet service providers”, Master’s thesis of criminal justice and criminology, Qom Center for Higher Education. Gholamzade, M.R. (2001), “Investigating the effects of information technology on organizational structur”, Master’s thesis of Public Management (ISM Information Systems), Tehran University, Qom Center for Higher Education. Khazani, M., Ardabili, M.A. and Najafi Abrandabadi, A.H. (1994), Report of the Fifteenth Congress of the International Criminal Law (International Criminal Law Association), Rio de Janeiro, Journal of Legal Studies, Faculty of Law, Shahid Beheshti University, 1995. Message Communication (2001), Presenting Takfa Design: Design, Development, Application of Information and Communication Technology, Tehran, Ministry of Post, Telegraph and Telephone. Monavarian, A. (2003), “Industrial management of post-industrial and post-postmodern era”, Process of Management and Development Quarterly, No. 59, p. 12. OECD (2004), Learning to Bridge the Digital Divide, OECD. Technology Law Newsletter (2004a), “Electronic commerce act”, Office of the Presidential Technology Cooperation, Vol. 2 No. 1. pp. 16-22. Technology Law Newsletter (2004b), “IT legal environment in Iran”, Presidential Technology Cooperation Office, Vol. 2 No. 9. pp. 38-41. Zibber, U. (1993), “Computer crimes and other offenses relating to information technology”, Translated by Deziani, M.H. PC reports journal, Informatics Society of Iran, No. 122. Corresponding author Ameneh Malmir can be contacted at: amenehmalmir@yahoo.com For instructions on how to order reprints of this article, please visit our website: www.emeraldgrouppublishing.com/licensing/reprints.htm Or contact us for further details: permissions@emeraldinsight.com