| |
| |
Foreword | |
| |
| |
Executive Summary | |
| |
| |
Introduction | |
| |
| |
How has the Internet changed the nature of threats to privacy? What are the main throats in the digital age? | |
| |
| |
New types or personal information | |
| |
| |
Collection and location of personal information | |
| |
| |
New capacities for private actors to analyse personal information | |
| |
| |
New capacities for governments to analyse personal information | |
| |
| |
New opportunities for commercial use of personal data | |
| |
| |
Global Overview of Challenges and Opportunities for Privacy Protection on the Internet | |
| |
| |
Key issues | |
| |
| |
Challenges and opportunities for maintaining control over personal data online | |
| |
| |
Initiatives to protect privacy and anonymity online | |
| |
| |
The roles and responsibilities of service providers and intermediaries | |
| |
| |
Specific challenges posed by different applications, communications platforms and business models | |
| |
| |
Cloud computing | |
| |
| |
Search engines | |
| |
| |
Social networks | |
| |
| |
Mobile phones, smartphones and the mobile Internet | |
| |
| |
Unique citizen Identifiers and eGovernment initiatives | |
| |
| |
Threats posed by different mechanisms of surveillance and data collection | |
| |
| |
User identification - unique identifiers, cookies and other forms of user identification | |
| |
| |
Adware, spyware and malware conduct covert data logging and surveillance | |
| |
| |
Deep packet Inspection (DPI) | |
| |
| |
Pervasive geo-location technology: an emerging threat to Internet privacy | |
| |
| |
Data processing and facial recognition | |
| |
| |
Internet surveillance technology | |
| |
| |
The Global Legal and Regulatory Environment for Protection of Privacy | |
| |
| |
international protection for privacy and personal data | |
| |
| |
Privacy | |
| |
| |
Data protection | |
| |
| |
National protection for privacy | |
| |
| |
China | |
| |
| |
India | |
| |
| |
Egypt | |
| |
| |
France | |
| |
| |
Argentina | |
| |
| |
Mexico | |
| |
| |
United States of America | |
| |
| |
Nigeria | |
| |
| |
South Africa | |
| |
| |
Corporate initiatives | |
| |
| |
Conclusions - Intersections between Privacy and Freedom of Expression | |
| |
| |
The impact of poor protection for privacy on freedom of expression | |
| |
| |
Tensions between freedom of expression and privacy | |
| |
| |
The public interest | |
| |
| |
Privacy vs. data protection | |
| |
| |
Scope of protection and jurisdiction | |
| |
| |
Court Information | |
| |
| |
Policy Recommendations | |
| |
| |
Legal and regulatory measures | |
| |
| |
Constitutional measures | |
| |
| |
Civil law protection | |
| |
| |
Criminal law protection | |
| |
| |
Data protection systems | |
| |
| |
Corporate policy and practice | |
| |
| |
Awareness raising | |
| |
| |
Useful Resources | |
| |
| |
General | |
| |
| |
Africa | |
| |
| |
Arab states | |
| |
| |
Asia and the Pacific | |
| |
| |
Latin America and the Caribbean | |
| |
| |
Europe and North America | |
| |
| |
Gender | |
| |
| |
Bibliography | |
| |
| |
Interviews | |
| |
| |
Abbreviations and Acronyms | |
| |
| |
List of Figures and Boxes | |