Please enable JavaScript.
Coggle requires JavaScript to display documents.
PRIVACY AND SURVEILLANCE - Coggle Diagram
PRIVACY AND SURVEILLANCE
- Implications of Surveillance Technologies on Privacy:
- Spyware and Hacking Tools:
- Tools like the "Pegasus" software can turn smartphones into 24-hour surveillance devices. They are often used for illegitimate purposes, including clamping down on dissenting views, journalists, and human rights defenders.
- Urgent steps are needed to address the spread of spyware, with calls for a moratorium on hacking tools until adequate safeguards are in place¹.
- Encryption is crucial for privacy and human rights online.
- States should avoid weakening encryption by mandating backdoors or systematic scanning of people's devices¹.
- Surveillance of Public Spaces:
- Automated data collection, digitized identity systems, and biometric databases enable extensive surveillance.
- Governments often fail to inform the public about surveillance activities, and tools can be repurposed for unintended ends¹.
- Privacy in Relation to Personal Information:
- Definition: Privacy is a fundamental right that is essential to autonomy and the protection of human dignity. It serves as the foundation for many other human rights. Privacy allows us to create boundaries and manage who has access to our bodies, places, communications, and information.
- Importance: Privacy enables us to negotiate our identity and interactions with the world. It gives us space to be ourselves without judgment, think freely, and control who knows what about us.
- Challenges: In the digital age, privacy faces challenges due to technology, surveillance, and data collection¹.
-
- Impact of Internet Technologies on Privacy:
- The proliferation of data, social media, online shopping, and the Internet of Things (IoT) has dramatically increased the collection and storage of personal data.
- Concerns: The rise of technology poses risks to privacy. Companies, apps, and governments collect vast amounts of personal data, turning it into a valuable commodity¹⁴.
- Threats: Social media, online tracking, and data breaches can compromise privacy. Encryption methods are essential for protecting human rights online¹³.
- Roles of the Personal Data Protection Act 2010 (Malaysia):
- The Personal Data Protection Act 2010 (PDPA) in Malaysia aims to enhance public confidence, minimize data breaches, increase efficiency in handling personal data, and ensure prudence and integrity.
- Enhance public trust through enforcement.
-
- Improve governance of personal data.
- Ensure prudence and integrity in handling personal data⁹.
- Consent, purpose limitation, notice, accuracy, security, retention, and openness[^10^].