Skip to main content

2016 | OriginalPaper | Buchkapitel

Forget About Being Forgotten

From the Right to Oblivion to the Right of Reply

verfasst von : Yod-Samuel Martin, Jose M. del Alamo

Erschienen in: Data Protection on the Move

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

User concerns about the dissemination and impact of their digital identity have led to the spread of privacy-enhancing and reputation-management technologies. The former allow data subjects to decide the personal information they want to disclose in the limited scope of a particular transaction. The latter help them adjust the visibility of the information disclosed and tune how other people perceive it. However, as the sources of personal information are growing without their control, and both original and deceptive data coexist, it is increasingly difficult for data subjects to govern the impact of their personal information and for the information consumers to grasp its trustworthiness so as to separate the wheat from the chaff. This paper analyses the aforementioned risks and presents a protocol, an architecture, and a business approach supporting both data subjects in replying to the information linked to them and consumers in gaining opportune access to these replies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
As pointed by Jennifer Stoddart (Canada’s Privacy Commissioner) in Office of the Privacy Commissioner of Canada, “Protect Your Personal Information Because the Internet Never Forgets, Privacy Commissioner of Canada Says—January 27, 2011.”
 
2
Some famous, traditional examples include Stacy Snyder’s and Andrew Feldmar’s cases, gathered in Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age, chap. 1 Failing to Forget the “Drunken Pirate.”
 
3
Quinn, “Facebook Costing 16-34s Jobs in Tough Economic Climate.”
 
4
Wisniewski, Lipford, and Wilson, “Fighting for My Space.”
 
5
Besmer and Lipford, “Moving beyond Untagging: Photo Privacy in a Tagged World.”
 
6
Bornoe and Barkhuus, “Privacy Management in a Connected World: Students’ Perception of Facebook Privacy Settings.”
 
7
Tokunaga, “Social Networking Site or Social Surveillance Site? Understanding the Use of Interpersonal Electronic Surveillance in Romantic Relationships.”
 
8
Humphreys, Gill, and Krishnamurthy, “How Much Is Too Much? Privacy Issues on Twitter.”
 
9
Pesce et al., “Privacy Attacks in Social Media Using Photo Tagging Networks.”
 
10
E.g.: abouteveryone.com, Topix, or the so-called “confessions board” sites which specifically target college students such as JuicyCampus, CollegeACB, LittleGossip, etc. For a review of the evolution of these sites and a discussion from the perspective of US defamation laws, see Schorr, “Malicious Content on the Internet: Narrowing Immunity Under the Communications Decency Act.”
 
11
“Identity porn” is related, but slightly different, to the better-known concept of “revenge porn”. Both refer to non-consensual dissemination of pornographic material depicting the data subject, but the latter emphasizes a specific motivation of a discloser who had been previously involved in a sexual relationship with the data subject; while the former focuses on scenarios where these contents published are also linked to the data subject’s profile and identity attributes (whoever the disclosers and whichever their motivations might be). See Stroud, “The Dark Side of the Online Self: A Pragmatist Critique of the Growing Plague of Revenge Porn.”
 
12
Examples of existing of defunct sites that either foster or are frequently used for these practices include Is Anyone Up?, UGotPosted, Is Anybody Down?, Pink Meth, Texxxan.com, and MyEx.com.
 
13
E.g.: Zoominfo, Pipl, 123people, Yasni, AnyWho, peekyou.
 
14
Brennecke, Mandl, and Womser-Hacker, “The Development and Application of an Evaluation Methodology for Person Search Engines.”
 
15
Werbin, “Auto-Biography: On the Immanent Commodification of Personal Information.”
 
16
Mantelero, “The EU Proposal for a General Data Protection Regulation and the Roots of the ‘Right to be Forgotten.’”
 
17
For a comprehensive review of the Right to be Forgotten, see Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age.
 
18
Squicciarini, Shehab, and Paci, “Collective Privacy Management in Social Networks.”
 
19
Squicciarini, Shehab, and Wede, “Privacy Policies for Shared Content in Social Network Sites.”
 
20
Kenny and Korba, “Applying Digital Rights Management Systems to Privacy Rights Management.”
 
21
Castelluccia and Kaafar, “Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet.”
 
22
Sarrouh et al., “Defamation-Free Networks through User-Centered Data Control.”
 
23
Kelbert and Pretschner, “Towards a Policy Enforcement Infrastructure for Distributed Usage Control.”
 
24
Pearson and Casassa-Mont, “Sticky Policies: An Approach for Managing Privacy across Multiple Parties.”
 
25
Diehl and Furon, “© Watermark: Closing the Analog Hole.”
 
26
Shein, “Ephemeral Data.”
 
27
Druschel, Backes, and Tirtea, “The Right to be Forgotten—between Expectations and Practice—ENISA.”
 
28
Markou, “The ‘Right to be Forgotten’: Ten Reasons Why It Should Be Forgotten.”
 
29
Thompson and Fertik, Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier.
 
30
Ilešič, JUDGMENT OF THE COURT (Grand Chamber) In Case C‑131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 February 2012, received at the Court on 9 March 2012, in the proceedings Google Spain SL, Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González, (2014).
 
31
Fujikawa, “Google Suffers New Privacy Setback in Japan.”
 
32
Court of Justice of the European Union, Opinion of Advocate General Jääskinen delivered on 25 June 2013 Case C-131/12 Google Spain SL Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González (2013).
 
33
Tiffen, “Finkelstein Report: Volume of Media Vitriol in Inverse Proportion to Amount of Evidence.”
 
34
Cornwall, “It Was the First Strike of Bloggers Ever: An Examination of Article 10 of the European Convention on Human Rights as Italian Bloggers Take a Stand against the Alfano Decree.”
 
35
Werkers, Lievens, and Valcke, “A Critical Analysis of the Right of Reply in Online Media.”
 
36
Balog, Azzopardi, and de Rijke, “Resolving Person Names in Web People Search.”
 
37
Long and Shi, “Web Person Name Disambiguation by Relevance Weighting of Extended Feature Sets.”
 
38
Köpcke and Rahm, “Frameworks for Entity Matching: A Comparison.”
 
39
Jonas, “Threat and Fraud Intelligence, Las Vegas Style.”
 
40
Li, Wang, and Chen, “Identity Matching Using Personal and Social Identity Features.”
 
41
Berendsen et al., “Result Disambiguation in Web People Search.”
 
42
Jones et al., “WebFinger.”
 
43
Slatkin, “Bootstrapping WebFinger Decentralized Discovery with WebFist.”
 
44
Hansen and Hallam-Baker, “DomainKeys Identified Mail (DKIM) Service Overview.”
 
45
Ligouras, “Protecting the Social Graph: Client–side Mitigation of Cross–Site Content Forgery Attacks,” 27–29.
 
47
Greasemonkey for Mozilla Firefox (http://​www.​greasespot.​net/​) or Tampermonkey for Google Chrome, Opera Next and Safari (https://​tampermonkey.​net/​).
 
48
O’Connor, “Managing a Hotel’s Image on TripAdvisor.”
 
50
Weinberg, “An Introduction to Social Media Marketing.”
 
51
During the first year of the application of the EU data-protection rules to Google search results, only 41.5 % of the removal requests were honored. See Laursen, “Google’s Year of Forgetting [News].”
 
52
Ibid.
 
53
Ortlieb, “The Anthropologist’s View on Privacy.”
 
54
Ibid.
 
56
Hansen et al., “Privacy-Enhancing Identity Management.”
 
57
Talukder and Ahamed, “Preventing Multi-Query Attack in Location-Based Services.”
 
Literatur
Zurück zum Zitat Balog, Krisztian, Leif Azzopardi, and Maarten de Rijke. 2009. Resolving person names in web people search. In Weaving Services and People on the World Wide Webeaving Services and People on the World Wide Web, ed. Irwin King and Ricardo Baeza-Yates, 301–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. doi:10.1007/978-3-642-00570-1. Balog, Krisztian, Leif Azzopardi, and Maarten de Rijke. 2009. Resolving person names in web people search. In Weaving Services and People on the World Wide Webeaving Services and People on the World Wide Web, ed. Irwin King and Ricardo Baeza-Yates, 301–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. doi:10.​1007/​978-3-642-00570-1.
Zurück zum Zitat Berendsen, Richard, Bogomil Kovachev, Maarten Weerkamp Nastou, Evangelia-Paraskevi de Rijke, and Wouter. 2012. Result disambiguation in web people search. In Advances in Information Retrieval, ed. Ricardo Baeza-Yates, Arjen P. de Vries, Hugo Zaragoza, B. Barla Cambazoglu, Vanessa Murdock, Ronny Lempel, and Fabrizio Silvestri, 7224:146–57. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. doi:10.1007/978-3-642-28997-2. Berendsen, Richard, Bogomil Kovachev, Maarten Weerkamp Nastou, Evangelia-Paraskevi de Rijke, and Wouter. 2012. Result disambiguation in web people search. In Advances in Information Retrieval, ed. Ricardo Baeza-Yates, Arjen P. de Vries, Hugo Zaragoza, B. Barla Cambazoglu, Vanessa Murdock, Ronny Lempel, and Fabrizio Silvestri, 7224:146–57. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. doi:10.​1007/​978-3-642-28997-2.
Zurück zum Zitat Besmer, Andrew, and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 28th International Conference on Human Factors in Computing Systems—CHI ’10, 1563–1572. doi:10.1145/1753326.1753560. Besmer, Andrew, and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 28th International Conference on Human Factors in Computing Systems—CHI ’10, 1563–1572. doi:10.​1145/​1753326.​1753560.
Zurück zum Zitat Brennecke, Roland, Thomas Mandl, and Christa Womser-Hacker. 2011. The development and application of an evaluation methodology for person search engines. In EuroHCIR 2011 European Workshop on Human–Computer Interaction and Information Retrieval, CEUR Workshop Proceedings, 42–45, 2011. http://ceur-ws.org/Vol-763/. Brennecke, Roland, Thomas Mandl, and Christa Womser-Hacker. 2011. The development and application of an evaluation methodology for person search engines. In EuroHCIR 2011 European Workshop on Human–Computer Interaction and Information Retrieval, CEUR Workshop Proceedings, 42–45, 2011. http://​ceur-ws.​org/​Vol-763/​.
Zurück zum Zitat Castelluccia, Claude, and Mohamed Ali Kaafar. 2009. Owner-centric networking (OCN): Toward a data pollution-free internet. In 2009 Ninth Annual International Symposium on Applications and the Internet, 169–72. IEEE. doi:10.1109/SAINT.2009.34. Castelluccia, Claude, and Mohamed Ali Kaafar. 2009. Owner-centric networking (OCN): Toward a data pollution-free internet. In 2009 Ninth Annual International Symposium on Applications and the Internet, 169–72. IEEE. doi:10.​1109/​SAINT.​2009.​34.
Zurück zum Zitat Court of Justice of the European Union. 2013. Opinion of Advocate general Jääskinen delivered on 25 June 2013 Case C-131/12 Google Spain SL Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González. Court of Justice of the European Union. 2013. Opinion of Advocate general Jääskinen delivered on 25 June 2013 Case C-131/12 Google Spain SL Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González.
Zurück zum Zitat Diehl, E., and T. Furon. 2014. © Watermark: Closing the analog hole. In 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE., 52–53. IEEE. Accessed 24 Oct 2014. doi:10.1109/ICCE.2003.1218801. Diehl, E., and T. Furon. 2014. © Watermark: Closing the analog hole. In 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE., 52–53. IEEE. Accessed 24 Oct 2014. doi:10.​1109/​ICCE.​2003.​1218801.
Zurück zum Zitat Hansen, Marit, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, and Michael Waidner. 2004. Privacy-enhancing identity management. Information security technical report 9(1): 35–44. doi:10.1016/S1363-4127(04)00014-7.CrossRef Hansen, Marit, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, and Michael Waidner. 2004. Privacy-enhancing identity management. Information security technical report 9(1): 35–44. doi:10.​1016/​S1363-4127(04)00014-7.CrossRef
Zurück zum Zitat Ilešič, M. 2014. JUDGMENT OF THE COURT (Grand Chamber) In Case C–131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 Feb 2012, received at the Court on 9 Mar 2012, in the proceedings Google Spa, (2014). Ilešič, M. 2014. JUDGMENT OF THE COURT (Grand Chamber) In Case C–131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 Feb 2012, received at the Court on 9 Mar 2012, in the proceedings Google Spa, (2014).
Zurück zum Zitat Kelbert, Florian, and Alexander Pretschner. 2012. Towards a policy enforcement infrastructure for distributed usage control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies - SACMAT ’12, 119. New York, USA: ACM Press, 2012. doi:10.1145/2295136.2295159. Kelbert, Florian, and Alexander Pretschner. 2012. Towards a policy enforcement infrastructure for distributed usage control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies - SACMAT ’12, 119. New York, USA: ACM Press, 2012. doi:10.​1145/​2295136.​2295159.
Zurück zum Zitat Li, Jiexun, G. Alan Wang, and Hsinchun Chen. 2010. Identity Matching using personal and social identity features. Information Systems Frontiers 13(1): 101–13. doi:10.1007/s10796-010-9270-0. Li, Jiexun, G. Alan Wang, and Hsinchun Chen. 2010. Identity Matching using personal and social identity features. Information Systems Frontiers 13(1): 101–13. doi:10.​1007/​s10796-010-9270-0.
Zurück zum Zitat Markou, Christiana. 2015. The ‘Right to Be Forgotten’: Ten reasons why it should be forgotten. In Reforming European Data Protection Law SE—8, ed. Serge Gutwirth, Ronald Leenes, and Paul de Hert, 20: 203–26. Law, Governance and Technology Series. Springer, Netherlands, 2015. doi:10.1007/978-94-017-9385-8_8. Markou, Christiana. 2015. The ‘Right to Be Forgotten’: Ten reasons why it should be forgotten. In Reforming European Data Protection Law SE—8, ed. Serge Gutwirth, Ronald Leenes, and Paul de Hert, 20: 203–26. Law, Governance and Technology Series. Springer, Netherlands, 2015. doi:10.​1007/​978-94-017-9385-8_​8.
Zurück zum Zitat Mayer-Schönberger, Viktor. 2011. Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press. Mayer-Schönberger, Viktor. 2011. Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.
Zurück zum Zitat Pearson, Siani, and Marco Casassa-Mont. 2011. Sticky policies: An approach for managing privacy across multiple parties. Computer 44(9): 60–68. doi:10.1109/MC.2011.225. Pearson, Siani, and Marco Casassa-Mont. 2011. Sticky policies: An approach for managing privacy across multiple parties. Computer 44(9): 60–68. doi:10.​1109/​MC.​2011.​225.
Zurück zum Zitat Pesce, João Paulo, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media—PSOSM ’12, 1–8. New York, USA: ACM Press. doi:10.1145/2185354.2185358. Pesce, João Paulo, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media—PSOSM ’12, 1–8. New York, USA: ACM Press. doi:10.​1145/​2185354.​2185358.
Zurück zum Zitat Sarrouh, Nadim, Florian Eilers, Uwe Nestmann, and Ina Schieferdecker. 2011. Defamation-free networks through user-centered data control. In Security and Trust Management SE—12, ed. Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner, 6710: 179–93. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. doi:10.1007/978-3-642-22444-7_12. Sarrouh, Nadim, Florian Eilers, Uwe Nestmann, and Ina Schieferdecker. 2011. Defamation-free networks through user-centered data control. In Security and Trust Management SE—12, ed. Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner, 6710: 179–93. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. doi:10.​1007/​978-3-642-22444-7_​12.
Zurück zum Zitat Squicciarini, Anna Cinzia, Mohamed Shehab, and Federica Paci. 2009 Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web—WWW ’09, 521. New York, USA: ACM Press, 2009. doi:10.1145/1526709.1526780. Squicciarini, Anna Cinzia, Mohamed Shehab, and Federica Paci. 2009 Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web—WWW ’09, 521. New York, USA: ACM Press, 2009. doi:10.​1145/​1526709.​1526780.
Zurück zum Zitat Talukder, Nilothpal, and Sheikh Iqbal Ahamed. 2010. Preventing multi-query attack in location-based services. In Proceedings of the Third ACM Conference on Wireless Network Security - WiSec ’10, 25. New York, USA: ACM Press, 2010. doi:10.1145/1741866.1741873. Talukder, Nilothpal, and Sheikh Iqbal Ahamed. 2010. Preventing multi-query attack in location-based services. In Proceedings of the Third ACM Conference on Wireless Network Security - WiSec ’10, 25. New York, USA: ACM Press, 2010. doi:10.​1145/​1741866.​1741873.
Zurück zum Zitat Thompson, David, and Michael Fertik. 2010. Wild west 2.0: How to protect and restore your online reputation on the untamed social frontier. amacom, 2010. Thompson, David, and Michael Fertik. 2010. Wild west 2.0: How to protect and restore your online reputation on the untamed social frontier. amacom, 2010.
Zurück zum Zitat Tokunaga, Robert S. 2011 Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior 27(2): 705–13. doi:10.1016/j.chb.2010.08.014. Tokunaga, Robert S. 2011 Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior 27(2): 705–13. doi:10.​1016/​j.​chb.​2010.​08.​014.
Zurück zum Zitat Weinberg, Tamar. 2009. An introduction to social media marketing. In The New Community Rules: Marketing on the Social Web, 1st ed., 1–18. O’Reilly Media, Inc. Weinberg, Tamar. 2009. An introduction to social media marketing. In The New Community Rules: Marketing on the Social Web, 1st ed., 1–18. O’Reilly Media, Inc.
Zurück zum Zitat Werkers, Evi, Eva Lievens, and Peggy Valcke. 2007. A critical analysis of the right of reply in online media. In Third International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS’07), 181–88. IEEE, 2007. doi:10.1109/AXMEDIS.2007.11. Werkers, Evi, Eva Lievens, and Peggy Valcke. 2007. A critical analysis of the right of reply in online media. In Third International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS’07), 181–88. IEEE, 2007. doi:10.​1109/​AXMEDIS.​2007.​11.
Zurück zum Zitat Wisniewski, Pamela, Heather Lipford, and David Wilson. 2012. Fighting for My Space. In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems—CHI ’12, 609. New York, New York, USA: ACM Press, 2012. doi:10.1145/2207676.2207761. Wisniewski, Pamela, Heather Lipford, and David Wilson. 2012. Fighting for My Space. In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems—CHI ’12, 609. New York, New York, USA: ACM Press, 2012. doi:10.​1145/​2207676.​2207761.
Metadaten
Titel
Forget About Being Forgotten
verfasst von
Yod-Samuel Martin
Jose M. del Alamo
Copyright-Jahr
2016
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-7376-8_10

Premium Partner