Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged privacy

Rss Feed Group items tagged

Weiye Loh

Privacy in Singapore - 9 views

http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN002553.pdf There is no general data protection or privacy law in Singapore. The government has been aggressive in using surveill...

Singapore Privacy Electronic Road Pricing Surveillance

Jody Poh

Online data privacy - 12 views

I think another question has to be brought up: Is the information meant to be public or private? If the information is public, then users should know they are risking identity theft by putting in...

privacy

Weiye Loh

IPhone and Android Apps Breach Privacy - WSJ.com - 0 views

  • Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off.
  • An examination of 101 popular smartphone "apps"—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent. Forty-seven apps transmitted the phone's location in some way. Five sent age, gender and other personal details to outsiders.
  • The findings reveal the intrusive effort by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them.
  • ...24 more annotations...
  • iPhone apps transmitted more data than the apps on phones using Google Inc.'s Android operating system. Because of the test's size, it's not known if the pattern holds among the hundreds of thousands of apps available.
  • TextPlus 4, a popular iPhone app for text messaging. It sent the phone's unique ID number to eight ad companies and the phone's zip code, along with the user's age and gender, to two of them.
  • Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss—players try to throw paper wads into a trash can—each sent the phone's ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies.
  • iPhone maker Apple Inc. says it reviews each app before offering it to users. Both Apple and Google say they protect users by requiring apps to obtain permission before revealing certain kinds of information, such as location.
  • The Journal found that these rules can be skirted. One iPhone app, Pumpkin Maker (a pumpkin-carving game), transmits location to an ad network without asking permission. Apple declines to comment on whether the app violated its rules.
  • With few exceptions, app users can't "opt out" of phone tracking, as is possible, in limited form, on regular computers. On computers it is also possible to block or delete "cookies," which are tiny tracking files. These techniques generally don't work on cellphone apps.
  • makers of TextPlus 4, Pandora and Grindr say the data they pass on to outside firms isn't linked to an individual's name. Personal details such as age and gender are volunteered by users, they say. The maker of Pumpkin Maker says he didn't know Apple required apps to seek user approval before transmitting location. The maker of Paper Toss didn't respond to requests for comment.
  • Many apps don't offer even a basic form of consumer protection: written privacy policies. Forty-five of the 101 apps didn't provide privacy policies on their websites or inside the apps at the time of testing. Neither Apple nor Google requires app privacy policies.
  • the most widely shared detail was the unique ID number assigned to every phone.
  • On iPhones, this number is the "UDID," or Unique Device Identifier. Android IDs go by other names. These IDs are set by phone makers, carriers or makers of the operating system, and typically can't be blocked or deleted. "The great thing about mobile is you can't clear a UDID like you can a cookie," says Meghan O'Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile apps. "That's how we track everything."
  • O'Holleran says Traffic Marketplace, a unit of Epic Media Group, monitors smartphone users whenever it can. "We watch what apps you download, how frequently you use them, how much time you spend on them, how deep into the app you go," she says. She says the data is aggregated and not linked to an individual.
  • Apple and Google ad networks let advertisers target groups of users. Both companies say they don't track individuals based on the way they use apps.
  • Apple limits what can be installed on an iPhone by requiring iPhone apps to be offered exclusively through its App Store. Apple reviews those apps for function, offensiveness and other criteria.
  • Apple says iPhone apps "cannot transmit data about a user without obtaining the user's prior permission and providing the user with access to information about how and where the data will be used." Many apps tested by the Journal appeared to violate that rule, by sending a user's location to ad networks, without informing users. Apple declines to discuss how it interprets or enforces the policy.
  • Google doesn't review the apps, which can be downloaded from many vendors. Google says app makers "bear the responsibility for how they handle user information." Google requires Android apps to notify users, before they download the app, of the data sources the app intends to access. Possible sources include the phone's camera, memory, contact list, and more than 100 others. If users don't like what a particular app wants to access, they can choose not to install the app, Google says.
  • Neither Apple nor Google requires apps to ask permission to access some forms of the device ID, or to send it to outsiders. When smartphone users let an app see their location, apps generally don't disclose if they will pass the location to ad companies.
  • Lack of standard practices means different companies treat the same information differently. For example, Apple says that, internally, it treats the iPhone's UDID as "personally identifiable information." That's because, Apple says, it can be combined with other personal details about people—such as names or email addresses—that Apple has via the App Store or its iTunes music services. By contrast, Google and most app makers don't consider device IDs to be identifying information.
  • A growing industry is assembling this data into profiles of cellphone users. Mobclix, the ad exchange, matches more than 25 ad networks with some 15,000 apps seeking advertisers. The Palo Alto, Calif., company collects phone IDs, encodes them (to obscure the number), and assigns them to interest categories based on what apps people download and how much time they spend using an app, among other factors. By tracking a phone's location, Mobclix also makes a "best guess" of where a person lives, says Mr. Gurbuxani, the Mobclix executive. Mobclix then matches that location with spending and demographic data from Nielsen Co.
  • Mobclix can place a user in one of 150 "segments" it offers to advertisers, from "green enthusiasts" to "soccer moms." For example, "die hard gamers" are 15-to-25-year-old males with more than 20 apps on their phones who use an app for more than 20 minutes at a time. Mobclix says its system is powerful, but that its categories are broad enough to not identify individuals. "It's about how you track people better," Mr. Gurbuxani says.
  • four app makers posted privacy policies after being contacted by the Journal, including Rovio Mobile Ltd., the Finnish company behind the popular game Angry Birds (in which birds battle egg-snatching pigs). A spokesman says Rovio had been working on the policy, and the Journal inquiry made it a good time to unveil it.
  • Free and paid versions of Angry Birds were tested on an iPhone. The apps sent the phone's UDID and location to the Chillingo unit of Electronic Arts Inc., which markets the games. Chillingo says it doesn't use the information for advertising and doesn't share it with outsiders.
  • Some developers feel pressure to release more data about people. Max Binshtok, creator of the DailyHoroscope Android app, says ad-network executives encouraged him to transmit users' locations. Mr. Binshtok says he declined because of privacy concerns. But ads targeted by location bring in two to five times as much money as untargeted ads, Mr. Binshtok says. "We are losing a lot of revenue."
  • Apple targets ads to phone users based largely on what it knows about them through its App Store and iTunes music service. The targeting criteria can include the types of songs, videos and apps a person downloads, according to an Apple ad presentation reviewed by the Journal. The presentation named 103 targeting categories, including: karaoke, Christian/gospel music, anime, business news, health apps, games and horror movies. People familiar with iAd say Apple doesn't track what users do inside apps and offers advertisers broad categories of people, not specific individuals. Apple has signaled that it has ideas for targeting people more closely. In a patent application filed this past May, Apple outlined a system for placing and pricing ads based on a person's "web history or search history" and "the contents of a media library." For example, home-improvement advertisers might pay more to reach a person who downloaded do-it-yourself TV shows, the document says.
  • The patent application also lists another possible way to target people with ads: the contents of a friend's media library. How would Apple learn who a cellphone user's friends are, and what kinds of media they prefer? The patent says Apple could tap "known connections on one or more social-networking websites" or "publicly available information or private databases describing purchasing decisions, brand preferences," and other data. In September, Apple introduced a social-networking service within iTunes, called Ping, that lets users share music preferences with friends. Apple declined to comment.
Weiye Loh

Social Media Research And Privacy: Where Do You Stand? | Social Media Explorer - 0 views

  • One of the common themes from all of these posts was the issue of privacy, especially as it relates to social media research. Some felt it was a dead issue: we have no illusions of privacy – Facebook gives us umpteen privacy settings and we just don’t care. Others feel it will be a hot issue – that there is still another shoe yet to drop, in other words. Certainly, as a researcher, I feel like I have a pretty good moral compass about this sort of thing, and my assumption is that my industry peers also have no desire to “cross the line.” That line, however, turns out to be a slippery sucker. Surely accessing a private message board community that discusses mental health issues should be sacrosanct, yet a company like Nielsen managed to cross exactly that line last fall.
  • information is gold, of course. When you complain about a product, a skilled social media researcher can segment and profile you: are you a parent of young children? An empty-nester? Unemployed? Plop – in you go into the appropriate bucket. Many of you, the readers of Social Media Explorer, are marketers. This information is beneficial to you – but is there a line you won’t cross? At what point do you say, you know – I don’t want to know this. Or do you? One thing is for sure – if you ask for it, social media researchers somewhere will provide it. What do you think? Is there a line? How do you recognize it? Your comments and spirited debate are welcome.
Weiye Loh

Government to Create New Internet With No Right to Privacy? | The Utopianist - Think Bi... - 0 views

  • Popular Science explains the rationale: China and other regimes around the world inherently have an upper hand when it comes to cyber defense because their lack of civil liberty protections lets the government freely monitor online activity. Things like “deep packet inspection” (which gained notoriety during Iranian election protests back in 2009) that let governments monitor citizens traffic also let them monitor for unusual activity … The U.S. Internet, by virtue of its adherence civil liberties, is more like the wild west. Everyone does everything online anonymously, and while that’s great for liberties, it’s also dangerous when cyber criminals/foreign hackers are roaming the cyber countryside
  • The .secure zone would essentially mimic the way the internet is regulated in more oppressive regimes, creating a space where banks, government contractors and the government can do business without fear of being hacked. Keith Alexander, who has the totally not made-up title of Cyber Command Chief, and several lawmakers are pushing for the new infrastructure, saying it’s absolutely necessary for national security. While the vulnerability of our infrastructure is a major concern, we’d wager a lot of Americans might have a problem with a section of the internet where your right to privacy is nonexistent.
  •  
    How do you stop hackers from attacking your network? Build an entirely new infrastructure. That's the idea behind the new .secure network, which will work just like any other network except for one thing: once you enter, you waive your right to privacy. 
Meenatchi

Top Internet Threats: Censorship to Warrantless Surveillance - 4 views

Article Summary: http://www.wired.com/threatlevel/2009/03/wireds-top-inte/ The article talks about several Internet threats comprising government surveillance and the loss of users' privacy throu...

Surveillance privacy DPI behavioral advertising

started by Meenatchi on 08 Sep 09 no follow-up yet
Jody Poh

Web tools help protect human rights activists - 7 views

1) I think it depends what is being censored. I think things like opinions should not be censored because it is violating the natural rights of a human. However, one can argue that online censors...

"Online censorship" "digital rights" 'Internet privacy tools"

Weiye Loh

FreedomBox Foundation - 0 views

  • Freedom Box is the name we give to a personal server running a free software operating system, with free applications designed to create and preserve personal privacy. Freedom Box software is particularly tailored to run in "plug servers," which are compact computers that are no larger than power adapters for electronic appliances. Located in people's homes or offices such inexpensive servers can provide privacy in normal life, and safe communications for people seeking to preserve their freedom in oppressive regimes.
  • Because social networking and digital communications technologies are now critical to people fighting to make freedom in their societies or simply trying to preserve their privacy where the Web and other parts of the Net are intensively surveilled by profit-seekers and government agencies. Because smartphones, mobile tablets, and other common forms of consumer electronics are being built as "platforms" to control their users and monitor their activity. Freedom Box exists to counter these unfree "platform" technologies that threaten political freedom. Freedom Box exists to provide people with privacy-respecting technology alternatives in normal times, and to offer ways to collaborate safely and securely with others in building social networks of protest, demonstration, and mobilization for political change in the not-so-normal times. Freedom Box software is built to run on hardware that already exists, and will soon become much more widely available and much more inexpensive. "Plug servers" and other compact devices are going to become ubiquitous in the next few years, serving as "media centers," "communications centers," "wireless routers," and many other familiar and not-so-familiar roles in office and home. Freedom Box software images will turn all sorts of such devices into privacy appliances. Taken together, these appliances will afford people around the world options for communicating, publishing, and collaborating that will resist state intervention or disruption. People owning these appliances will be able to restore anonymity in the Net, despite efforts of despotic regimes to keep track of who reads what and who communicates with whom. For a list of specific Freedom Box capabilities, check out our Goals page.
Weiye Loh

Facebook kicks off 20,000 underage users a day - Yahoo! News - 0 views

  • A recent Pew study found that nearly half of all U.S. 12-year-olds use social networking sites -- and privacy concerns in regard to Facebook's younger members have been growing of late. This month, Sen. Al Franken, a Minnesota Democrat, wrote to Facebook CEO Mark Zuckerberg (pictured) to argue for reforms in the site's privacy measures. "Under Facebook's policy, 13 million users under the age of 18 may be allowed to share their personal information just like adult users," Franken wrote. "These younger users are the most vulnerable to predators on Facebook and the rest of the Internet and it should be impossible for them to inadvertently share their phone numbers and home addresses with anyone."
  • But Franken's figures don't factor in the unknown number of Facebook users under 13. Other sites that are popular with kids handle the issue in differing ways. MySpace also requires users to be at least 13, but like Facebook, it has no practical way to verify that information. Disney.com allows children 12 and under to surf the site, and collects some personal information from them before they're eligible to participate in competitions, for example. Yahoo! doesn't allow kids 12 and under to register without the consent of a parent. Like Disney, it collects some limited idenifying information for participation in competitions and similar interactive features.
Weiye Loh

Index on Censorship » Blog Archive » Code breakers - 0 views

  • Journalism is demonstrably valuable to society. It tells us what is new, important and interesting in public life, it holds authority to account, it promotes informed debate, it entertains and enlightens. For sure, it comes with complications. It is rushed and imperfect, it sometimes upsets people and in pursuit of its objectives it occasionally does unpleasant or even illegal things. But by and large we accept these less welcome aspects of journalism as part of the package, and we do so because journalism as a whole is in the public interest. It does good, or to put it another way, we would be much poorer without it.
  • journalists themselves are slow to draw the distinction because theirs is traditionally an open industry, without barriers and categories, and also because they don’t tend to think of what they do in terms of doing good and being valuable.
  • privacy invaders do everything they can to blur the line. It is in their interest to be considered journalists, after all. They can shelter under the same umbrella and enjoy the same privileges as journalists. They can talk about freedom of expression, freedom of the press and serving the public interest; they can appeal to tradition and history and they can sound warnings about current and future censorship. This helps them to protect what they do.
  • ...3 more annotations...
  • the code of practice of the Press Complaints Commission (PCC), which at least in principle binds journalists working for member organisations and which includes clauses on such matters as accuracy, privacy and the use of subterfuge. The code makes clear, for example, that it is not acceptable to employ a clandestine recording device on a ‘fishing expedition’ — in other words, when you don’t have good grounds to expect you will gain a particular kind of evidence of a particular kind of wrongdoing.
  • journalism has to be about truth
  • The public interest is central because it is a sort of get-out-of-jail card for journalists, though it is actually recognised only grudgingly in law. An ethical journalist can justify telling a lie, or covertly recording a conversation, or trespassing if this act is done in the pursuit of the public interest, and even if he or she is found guilty of an offence, others will usually understand this as valid and will give their support. The public interest can literally keep a journalist out of jail, and it is not merely in the eye of the beholder. The Press Complaints Commission, for example, defines it as follows: The public interest includes, but is not confined to: i) Detecting or exposing crime or serious impropriety ii) Protecting public health and safety iii) Preventing the public from being misled by an action or statement of an individual or organisation
  •  
    We tend to speak of journalists, of their role, their rights, their responsibilities and very often their lack of restraint and how it should be addressed. But this is misleading, and prevents us from seeing some of the complexities and possibilities, because the word 'journalist', in this context, covers two very different groups of people. One group is the actual journalists, as traditionally understood, and the other is those people whose principal professional activity is invading other people's privacy for the purpose of publication.
Weiye Loh

Supreme Court ruling: No 'personal privacy' for corporations - 0 views

  • The court made short work of AT&T's argument in a dispute with the Federal Communications Commission. The telecommunications company had contended that because "person" is sometimes defined in federal law to mean a corporation as well as an individual, the company was entitled to a FOIA exemption that relates to "personal privacy."
  •  
    Corporations have no right to "personal privacy" when it comes to government records requested under the Freedom of Information Act, a unanimous Supreme Court ruled Tuesday.
Weiye Loh

Keen On… Michael Fertik: Why Data is the New Oil and Why We, the Consumer, Ar... - 0 views

  •  
    In today's Web 3.0 personal data rich economy, reputation is replacing cash, Fertik believes. And he is confident that his company, Reputation.com, is well placed to become the new rating index of this digital ecosystem. But Fertik isn't ecstatic about the way in which new online products, such as facial recognition technology, are exploiting the privacy of online consumers. Arguing that "data is the new oil," Fertik believes that the only people not benefitting from today's social economy are consumers themselves. Rather than government legislation, however, the solution, Fertik told me, are more start-up entrepreneurs like himself providing paid products that empower consumers in our Web 3.0 world of pervasive personalized data. This is the second and final part of my interview with Fertik. Yesterday, he explained to me why people will pay for privacy.
Weiye Loh

Turning Privacy "Threats" Into Opportunities - Esther Dyson - Project Syndicate - 0 views

  • ost disclosure statements are not designed to be read; they are designed to be clicked on. But some companies actually want their customers to read and understand the statements. They don’t want customers who might sue, and, just in case, they want to be able to prove that the customers did understand the risks. So the leaders in disclosure statements right now tend to be financial and health-care companies – and also space-travel and extreme-sports vendors. They sincerely want to let their customers know what they are getting into, because a regretful customer is a vengeful one. That means making disclosure statements readable. I would suggest turning them into a quiz. The user would not simply click a single button, but would have to select the right button for each question. For example: What are my chances of dying in space? A) 5% B) 30% C) 1-4% (the correct answer, based on experience so far; current spacecraft are believed to be safer.) Now imagine: Who can see my data? A) I can. B) XYZ Corporation. C) XYZ Corporation’s marketing partners. (Click here to see the list.) D) XYZ Corporation’s affiliates and anyone it chooses. As the customer picks answers, she gets a good idea of what is going on. In fact, if you're a marketer, why not dispense with a single right answer and let the consumer specify what she wants to have happen with her data (and corresponding privileges/access rights if necessary)? That’s much more useful than vague policy statements. Suddenly, the disclosure statement becomes a consumer application that adds value to the vendor-consumer relationship.
  • And show the data themselves rather than a description.
  • this is all very easy if you are the site with which the user communicates directly; it is more difficult if you are in the background, a third party collecting information surreptitiously. But that practice should be stopped, anyway.
  • ...4 more annotations...
  • just as they have with Facebook, users will become more familiar with the idea of setting their own privacy preferences and managing their own data. Smart vendors will learn from Facebook; the rest will lose out to competitors. Visualizing the user's information and providing an intelligible interface is an opportunity for competitive advantage.
  • I see this happening already with a number of companies, including some with which I am involved. For example, in its research surveys, 23andMe asks people questions such as how often they have headaches or whether they have ever been exposed to pesticides, and lets them see (in percentages) how other 23andMe users answer the question. This kind of information is fascinating to most people. TripIt lets you compare and match your own travel plans with those of friends. Earndit lets you compete with others to exercise more and win points and prizes.
  • Consumers increasingly expect to be able to see themselves both as individuals and in context. They will feel more comfortable about sharing data if they feel confident that they know what is shared and what is not. The online world will feel like a well-lighted place with shops, newsstands, and the like, where you can see other people and they can see you. Right now, it more often feels like lurking in a spooky alley with a surveillance camera overlooking the scene.
  • Of course, there will be “useful” data that an individual might not want to share – say, how much alcohol they buy, which diseases they have, or certain of their online searches. They will know how to keep such information discreet, just as they might close the curtains to get undressed in their hotel room after enjoying the view from the balcony. Yes, living online takes a little more thought than living offline. But it is not quite as complex once Internet-based services provide the right tools – and once awareness and control of one’s own data become a habit.
  •  
    companies see consumer data as something that they can use to target ads or offers, or perhaps that they can sell to third parties, but not as something that consumers themselves might want. Of course, this is not an entirely new idea, but most pundits on both sides - privacy advocates and marketers - don't realize that rather than protecting consumers or hiding from them, companies should be bringing them into the game. I believe that successful companies will turn personal data into an asset by giving it back to their customers in an enhanced form. I am not sure exactly how this will happen, but current players will either join this revolution or lose out.
Weiye Loh

Real-name Weibo, for the good of all - China Media Project - 0 views

  • According to my own research, real-name registration for the internet is done by many countries around the world. But first it requires a basis in the law. In the mobile phone sector now we’re only at about 58 percent real-name registered, and about 40 percent of the market remains unregistered. This is a process, and it has to be explained. The trials with real-name registration on the Weibo are for the sake of the orderly and healthy development of the internet — in order to protect the privacy and secrecy of individuals, corporations and the nation.
  •  
    real-name registration on China's social media platforms, a policy formally taking effect on March 16, was meant to ensure "the privacy and secrecy of individuals, corporations and the nation."
Jiamin Lin

Firms allowed to share private data - 0 views

  •  
    Companies who request for their customer's private information may in turn distribute these confidential particulars to others. As such, cases of fraud and identity theft have surfaced, with fraudsters using these distributed identities to apply for loans or credit cards. Unlike other countries, no privacy law to safeguard an individual's data against unauthorized commercial use has been put in place. As a result, fraudsters are able to ride on this loophole. Ethical Question: Is it right for companies to request for their customer's private information for certain reasons? Is it even fair that they distribute these information to third parties, perhaps as a way to make money? Problem: I think the main problem is that there isn't a law in Singapore that safeguards an individual's data against unauthorized commercial use. Even though the Model Data Protection Code scheme tries to do the above, it is after all, still a voluntary scheme. Companies can opt to adopt the scheme, but whether they choose to apply it regularly, is another issue. As long as a privacy law is not in place, this issue will continue to recur in Singapore.
Meenatchi

Online Defamation - 0 views

  •  
    Interesting Case In summary, the article discusses the court ruling of an online defamation case that took place in Korea. It involves Kim, the victim, who experienced the spread of false articles and defamatory comments that blamed him for his ex-girlfriend's suicide. The final verdict held Internet portals liable for the damages caused by the articles they displayed on their website. This is despite the articles having been provided by external media outlets. The Supreme Court ordered four of the major portals involved in the case to pay a combined 30 million ($22,500) as compensation to Kim. Ethical Question I feel there are a few ethical issues that are at play in this case. One would be if it is ethical to publish sensitive information about an individual without his/her permission on the Internet. This is of more importance when the credibility of the information is dubious. Another ethical question would be if Internet Service Providers can be held responsible for information they did not create. Is it fair to charge them on the basis that they have failed to regulate the content displayed on their sites? Problem The problem with the first ethical question is that it creates a question of individual privacy rights against the freedom of speech for another. Publishing sensitive information that might not even be true about an individual infringes his/her privacy rights. However, it is the right of the publisher to have the freedom of speech to state what he/she thinks. The issue with the second ethical question is that the Internet Service Providers merely provide a platform for people to express their views. They should not be held liable for comments posted by individuals using the website. However, the opposing view would expect the ISPs to be responsible for the content they allow to be displayed on their site. They have to regulate the content to ensure that sensitive or controversial information that would cause irrevocable damage to others
mingli chng

Ethics: SteveOuting.com - 0 views

shared by mingli chng on 19 Aug 09 - Cached
  •  
    Summary: The article highlights a story that shows how the internet erodes privacy and helps to spread online rumours. Question: With the revolutionay increase in blogs and other tools that make anyone a "creator of information", who guards the gates and prevent violations in privacy and other issues? Problem: The rise of New Media and the ethics of gossip and rumours.
juliet huang

Online privacy concerns arise as website lists personal data - 5 views

The link : http://www.channelnewsasia.com/stories/singaporelocalnews/view/448207/1/.html Case Summary: Red Nano is a people-search engine which allows others to find you in the public int...

rednano online identity

started by juliet huang on 19 Aug 09 no follow-up yet
Wing Yan Wong

Users Poke Facebook With Lawsuit Over Privacy Policies - 3 views

http://www.technewsworld.com/story/67888.html This article discusses the violation of privacy laws as well as misinformation with regards to users' personal information. It was reported that Face...

privacy personal information

started by Wing Yan Wong on 28 Aug 09 no follow-up yet
Weiye Loh

Twitter unmasks anonymous British user in landmark legal battle | Technology | The Guar... - 0 views

  • Giggs brought the lawsuit at the high court in London and the move to use California courts is likely to be seen as a landmark moment in the internet privacy battle.Ahmed Khan, the south Tyneside councillor accused of being the author of the pseudonymous Twitter accounts, described the council's move as "Orwellian". Khan received an email from Twitter earlier this month informing him that the site had handed over his personal information. He denies being the author of the allegedly defamatory material.
  • Khan said the information Twitter handed over was "just a great long list of numbers". The subpeona ordered Twitter to hand over 30 pieces of information relating to several Twitter accounts, including @fatcouncillor and @ahmedkhan01."I don't fully understand it but it all relates to my Twitter account and it not only breaches my human rights, but it potentially breaches the human rights of anyone who has ever sent me a message on Twitter.
  • He added: "I was never even told they were taking this case to court in California. The first I heard was when Twitter contacted me. I had just 14 days to defend the case and I was expected to fly 6,000 miles and hire my own lawyer – all at my expense."Even if they unmask this blogger, what does the council hope to achieve ? The person or persons concerned is simply likely to declare bankruptcy and the council won't recover any money it has spent."
1 - 20 of 95 Next › Last »
Showing 20 items per page