Social networking : law, rights and policy / edited by Paul Lambert.
2014
K564.C6 S632 2014 (Map It)
Available at Cellar
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Title
Social networking : law, rights and policy / edited by Paul Lambert.
Published
Dublin : Clarus Press, [2014]
Call Number
K564.C6 S632 2014
ISBN
9781905536559 (pbk.)
1905536550 (pbk.)
1905536550 (pbk.)
Description
xxix, 520 pages ; 24 cm
System Control No.
(OCoLC)877916194
Bibliography, etc. Note
Includes bibliographical references and index.
Record Appears in
Added Author
Table of Contents
Preface
ix
Acknowledgements
xi
Social Networking Websites Sample
xxv
Abbreviations and Meanings
xxvii
Part I: Introduction
ch. 1
Introduction
3
Introduction
3
Concepts
4
Part II: Internet And Social Networking
ch. 2
Internet And Technology
9
Headline of Issues
9
Introduction
9
A New Second Generation of Internet Activities
11
Describing Social Networking
13
Definitions
13
Some Categories of Social Networking
15
Conclusion
16
ch. 3
Concerns
17
Headline of Issues
17
Social Networking: A New Internet and New Concerns
17
Data Protection Update
22
Data Theft and Identity Theft
22
Misuse, Marketing, Direct Marketing, Targeted Behavioural Marketing
25
Sensitive Personal Data
28
Peer to Peer (P2P)
28
Knowledge, Education
29
Mobile and Wireless Internet
30
Children
30
Social Networks
33
Google Street View
35
Google Buzz
37
Cloud
37
Location Data
39
Conclusion
40
ch. 4
Privacy And Data Protection
43
Headline of Issues
43
Introduction
43
A New Era for Data Protection
43
Traditional Divisions Breaking Down
47
Expectations for Privacy in Modern Settings
47
Court Interpretations of Privacy in Modern Settings
48
The Concept of Privacy
49
Cases
51
Conclusion
52
ch. 5
Early To Current Data Protection
53
Headline of Issues
53
Introduction
53
The Data Protection Directive
54
Definitions in Data Protection Directive
55
Lawful Data Processing
57
Data Quality Principles and Data Protection Principles
57
Criteria for Making Data Processing Legitimate
58
Processing Special Categories of Personal Data (Sensitive Personal Data)
59
Certain Information Must be Given to Individuals
60
Data Protection Meets Social Networking: Users
61
Data Protection Meets Social Networking
63
EU Commission, Data Protection and the Future
64
EU Commission Recognises Outdated Data Protection Regime
64
EU Commission and the Future
64
Conclusion
66
ch. 6
Interim Data Protection
67
Headline of Issues
67
Introduction
67
WP29: Opinion 5/2009 on Social Networking
68
WP29: Opinion 1/2008 on Search Engines
72
WP29: Future of Privacy
76
Conclusion
78
Part III: Social Networks
ch. 7
User Generated Content
83
Headline of Issues
83
Introduction
83
User Generated Content
83
Existing Liability Models
85
The Dichotomy Between the Publisher and the Hosting Model
85
Liability for Print Publications
86
Liability for Radio and Television Broadcasting
88
Liability for Online Content
90
Where Do UGC Websites Fit In?
94
Conclusion
97
ch. 8
Social Networking Policies
101
Headline of Issues
101
Introduction
101
Terms and Conditions/Terms of Service (TOS)
101
Privacy Statements
102
Small Print
103
Too Much Data
104
Technical Privacy Settings
105
Consent
105
Default Settings
106
Unilateral Changes
107
Retention Periods
108
Are Privacy Statements Successful?
109
Security
110
Tagging
111
User Awareness
112
Terms/Privacy Statement Considerations
112
Facebook Changes
114
Facebook and Advertising
116
Facebook Beacon
116
Personal Data After Leaving a Social Network
118
Borders
118
Conclusion
118
ch. 9
Advertising And Marketing
121
Headline of Issues
121
Introduction
121
Definitions of Targeted Behavioural Marketing
121
UK Change of Position
122
US: FTC Principles
122
Self-Regulation
123
WP29: Opinion 2/2010 on Online Behavioural Advertising
123
Network Providers/Ad Network Providers
124
Publishers
125
Advertisers
126
Browser Settings
126
Opt-Outs
128
Opt-In
128
Children and Informed Consent
129
Information and Targeted Behavioural Advertising
129
Information Provider
130
Special Categories of Data
130
Data Quality
131
Security
132
Recommendations
132
Cookies and Data Protection Commissioner
134
Conclusion
135
ch. 10
Beacon Settlement
137
Headline of Issues
137
Social Networking Sites - A Spaghetti Junction with Nowhere to Hide?
137
What is Facebook (If You Are Not One of the Billion Members Who Already Know) and What is Beacon?
138
Opting in? Don't Bother - Facebook Did it for You
138
Opting out - Facebook Opted out of Beacon and Ended up in Court
139
Who Are the Class Members Anyway?
140
Charity Begins at Home
140
Other Facebook Investigations
141
Do You Consent? The European Perspective'
141
Is Consent Still Required if the Person's Details Are Fake?
142
Facebook - Criticised in Canada
143
China's Data Protection Regulations
143
Sensitive Personal Data - How Can Facebook Tell?
144
So What Are New Members Signing up to?
144
Time to Fine - Who's First?
145
Are Governments in Compliance?
146
The Birth of a New Profession - Privacy
147
The Future - Where Does Privacy on Social Networks Go from Here?
148
Is There a Solution in Sight?
149
ch. 11
Europe Against Facebook
151
Headline of Issues
151
Complaint 01: "Pokes"
151
Complaint 02: "Shadow Profiles"
152
Complaint 03: "Tagging"
153
Complaint 05: "Deleted Postings"
155
Complaint 06: "Posting on other Users' Pages"
156
Complaint 07: "Messages"
157
Their Individual Copy of the Message
158
The Material Claim
158
Deletion Process
159
Comparison to Email and Chat Programs
159
Government Access
159
Surveillance by Design
160
Complaint 08: "Privacy Policy and Consent"
160
Privacy Policy
160
Consent
166
Improved Information for New Users
167
Complaint 09: "Face Recognition"
168
Complaint 10: "Access Requests"
169
The ODPC 's Reports and Investigation
170
Facebook S. Credibility Relating to Access Requests
172
Summary - Access Requests
179
Complaint 11: "Deleted Tags"
180
Complaint 12: "Data Security"
181
Complaint 13: "Applications"
182
Changes
182
Consent by Third Parties
183
Arrangement with Third Parties
184
Complaint 14: "Deleted Friends"
184
Complaint 15: "Excessive Processing of Data"
185
Complaint 16: "Opt-Out"
186
Complaint 17: "Like Button"
188
Purpose
188
Consent
190
Complaint 19: "Picture Privacy Settings"
190
Complaint 20: "Deleted Pictures"
191
Complaint 22: "New policy"
191
ch. 12
Facebook Audit
193
Headline of Issues
193
Introduction
193
Background to the Audit: "Europe v Facebook"
194
"From Pokes to Privacy": The Issue of Data Protection and Facebook
196
"From Here to There": An Assessment of the Impact of the Audit
197
"The Future of Facebook and Data Protection" Criticisms
200
Conclusions
202
ch. 13
Laws Re-Phormed?
205
Headline of Issues
205
Introduction
205
Online Behavioural Advertising: Context and Emergence
207
What is Phorm and How Does it Work?
208
Scope and Application of the Constitutional Privacy Right
209
Relevant Statutory Provisions
213
Compliance with the Cookie Regulations
214
Compliance with the Data Protection Act
218
Interception of Communications
222
Criminal Provisions
222
Civil Remedy
223
Conclusion
224
ch. 14
Data Breaches
229
Headline of Issues
229
Introduction
229
Breaches, Data Loss and Threats
229
Social Networks
230
UK
231
Ireland
231
Consequences
232
Data Security Obligations: DPA
232
Data Breach/Loss Notofication Rules
233
Recent UK Penalties
235
Leveson
235
Criminal and Custodial Sentences for Breach
236
Conclusion
236
ch. 15
Tagging
237
Headline of Issues
237
Introduction
237
Personal Postings
237
Third-Party Postings
238
Taking Down Third-Party Images
238
Tagging Increases
238
Detagging
239
Status Updates
240
Facebook
240
Interim Audit Review
240
Re-Audit Review
241
Conclusion
241
Part IV: Social Networking And Evidential Issues
ch. 16
Evidential Issues
245
Headline of Issues
245
Introduction
245
New Uses and Sources of Electronic Evidence
246
Individual and Organisational Liability Issues
246
Evidence
247
Civil Evidence
247
Criminal Evidence
248
Records
250
Discovery
251
Social Networking Evidential Issues
253
Preservation of Evidence
254
Discovery and Privacy
255
US Cases
256
Canadian Cases
257
Statutory Instrument (SI No 93 of 2009)
258
eDiscovery Ireland
258
Best Practice Ireland Guide
258
Conclusion
258
ch. 17
Cloud Computing
259
Headline of Issues
259
Introduction
259
Big Computers in Cold Rooms
260
Outside the Air-Conditioned Room
262
Virtualisation: Many Computers, One Machine
266
So What Can I Do with Cloud Computing? Stuff as a Service
268
So Just How Useful is Cloud Computing?
270
The Big "But"
272
The Caveats at the End
274
Part V: Employees And Education
ch. 18
Employees
279
Headline of Issues
279
Introduction
279
Employer Liability Issues
279
Viruses, Etc
280
Bandwidth and Resources
280
Defamation
280
Records and Information
281
Employee Profiles
282
Telecommuting
283
Employees and Blogs
283
Harassment
284
Employee Monitoring
287
Public Organisations and Information Published
288
Existing Employees
288
Potential Employees
289
Identity
290
Restrictions
291
Redress
291
Using Social Networking for Business
292
Education
293
Policy on Social Networks
294
Contract Consent
294
Fan Pages
294
Spoilation Changes
295
Archives
296
Conclusion
296
ch. 19
Educational Institutions
297
Headline of Issues
297
Introduction
297
Concern for Schools, Universities and Parents
297
Schools
297
Teachers
298
Universities
299
Student Awareness
302
Public Organisations
303
Conclusion
304
Part VI: Personal Issues
ch. 20
Tracking The Trackers
307
Headline of Issues
307
Online Tracking
307
ch. 21
Personal Relations
315
Headline of Issues
315
Introduction
315
Online Abuse, Bullying, Stalking, Harassment, Bullying and Grooming
315
Relationships Fall Foul of Social Networking
316
Sexting Online Abuse
316
Texting Online Abuse
317
Virtually Speaking
318
Hacking
319
Conclusion
319
ch. 22
Social Networking After Death
321
Headline of Issues
321
Introduction
321
The Social Networking Ghost
322
The Health Analogy
324
Personal Data
326
EU WP29
327
UK
328
Ireland
328
(Living) Third-Party Interests
328
Conclusion
330
ch. 23
Profiles In Purgatory
331
Headline of Issues
331
Introduction
331
Control and Expectations of the Living User
334
Right to be Forgotten, Free Speech and Maintaining Online
Archives
335
Social Network Settings, Wills and Online Repositories
338
Conclusion
341
ch. 24
A Critical Approach To Right To Be Forgotten
343
Headline of Issues
343
Introduction
343
The Questions Raised by the Spanish High Court
345
The Right to be Forgotten: Conceptual Aspects
347
The Right to be Forgotten: Substantive Issues
349
Controllers and Processors: the Addressees of the Data Protection Directive
350
Technical Aspects of the Functioning of the Internet
351
Policy Considerations
352
Territorial Aspects of the Request
353
The Territorial Application of the Directive
353
The Extraterritorial Effects of the Directive
355
Conclusions: The Internet Paradox
355
Part VII: Children And Social Networking
ch. 25
Children And Social Networking
359
Headline of Issues
359
Introduction
359
Child Concerns Online and on Social Networks
360
Sexual Exploitation
361
Harmful Content
361
Cyberbullying
362
Children and Advertising
362
UK
363
Ireland
364
EU Article 29 Working Party Opinion 2/2009
365
Children: Consent and EU Article 29 Working Party Opinion 2/2010
367
Children: EU Article 29 Working Party Opinion 5/2009
368
Children: Problems with the EU Data Protection
Directive 1995
368
EU Commission: No Children in Data Protection
369
US Responses to Children
370
Children and Commercial Matter
372
UN Convention on Children
372
Hotlines
373
Age Verification
373
Age and Website Rules/Settings
374
Age and Technology Solutions
374
Self-Regulation/Soft Law
374
Regulation/Liability
375
Child Education and Awareness
376
The Parent Gap
376
Child Development/Child Rights
377
Child Criminals
377
Children and Defamation
377
Spyware
379
Referendum
380
Criminal Offence of Cyberbullying
380
Single Body to Oversee Social Networking
381
Conclusion
382
ch. 26
An Irish Perspective
383
Headline of Issues
383
Introduction
383
Social Networks and Children
385
Benefits and Risks of Social Network Use by Children
386
The EU Data Protection Directive and Social Networks
388
Case Law
390
Data Protection Directive and Children's Data on Social Networking
391
Age-Verification Techniques
393
Recommendations to Ensure Safety of Children on Social Networks
395
European Safer Internet Forum Recommendations
395
EU Article
29
Working Party Recommendations
397
Recommendations of the EU Kids Online Report
398
Conclusion
398
Part VIII: Social Networking And Internet Access
ch. 27
Social Networking And Internet Access
403
Headline of Issues
403
Introduction
403
Social Networks: Contract
403
Social Networks: Blacklists and Civil Law
404
Social Networks: Blacklists and Criminal Law
404
Internet Access Sanctions
404
Hacking Internet Access Sanctions
405
Child Sex Offender Internet Access Sanctions
405
Challenges to Internet Sanctions
407
A Human Right to Internet Access
407
Broadband Internet
408
Children's Rights to Access Internet
408
Children's Referendum
409
Conclusion
409
Part IX: Social Networking, Peer To Peer And Privacy
ch. 28
Social Networking, Peer To Peer And Privacy
413
Headline of Issues
413
Introduction
413
The P2P Content Wars and Social Networks
414
The Reactions
415
Balancing Rights and Conduits
417
Private Spaces
420
Internet Monitoring and Surveillance
420
Internet Lockers
421
Notice and Takedown (NTD)
421
Contact Listings
422
YouTube and Copyright
423
UGC and Copyright
424
Identity Theft and Personal Name Squatting
428
Conclusion
429
Part X: Social Networking And Sport
ch. 29
Social Networking And Sport
433
Headline of Issues
433
Introduction
433
Social Networking and Sport
433
Issues and Concerns
434
Social Networking and ProfessionallAmateur Athletes
434
Social Networking and College Athletes
436
Social Networking and Journalists
437
Competing Rules
437
Transparency
438
Conclusion
438
ch. 30
Soccer Players On Social Media
439
Headline of Issues
439
Introduction
439
Social Media is Regulated
440
The Role of the Law in Social Media
441
The Role of the English FA
442
Why the English FA Should Not Regulate Players on Social Media
443
Inconsistent English FA Disciplining
443
Undesirability of the FA (A Self-Regulatory Body) Reasoning and Inconsistency
445
Lack of Consistency is Prevalent in Other Areas that the FA Act in a Self-Regulatory Capacity
447
Lack of Accountability - Can the FA Act as it Pleases?
448
Should the FA be Allowed to Regulate Members Speech?
449
An International Perspective-The NFL
449
The English FA are Insufficient Regulators of its Members on Social Media
450
Alternative Approach-Allow the Issue to be Dealt with Internally
450
Alternative Approach -An Independent Body
451
Recommendations Using Social Media
452
Conclusion
453
Part XI: Social Networking And Courts
ch. 31
Social Networking And Courts
457
Headline of Issues
457
Introduction
457
In-Court: Witnesses
457
In-Court: Juror Postings
458
In-Court: Lawyers and Judges
458
Twitter
460
Reporting: Twitter In Court
460
Court Reactions: Rules, Regulations, Consultations
461
Tweeting and UK Courts
462
UK Supreme Court Guidance
465
The UK Twitter Consultation
466
The Consultation
466
Contempt Consultation
467
Conclusion
467
Part XII: Data Protection: The Future
ch. 32
Privacy By Design
471
Headline Of Issues
471
Introduction
471
Origins of Privacy by Design
471
EU & Privacy by Design
477
Pre-Problem Solving
478
Regulations for Specific Technological Contexts
480
Expectations for the Future
481
Conclusion
482
ch. 33
Data Protection Audits
485
Headline of Issues
485
Introduction
485
The Austria Complaint
486
Norwegian Complaint
489
The Report and Decisions
490
Re-Audit Report
491
Conclusion
492
ch. 34
The Future
493
Headline of Issues
493
Introduction
493
Photograph Software
493
Future-Proofing Solutions
493
Spam Solutions
494
EU Official Data Protection Review
496
New EU Regulation
497
Raising Awareness of Dangers
499
Regulation and Social Networking
499
Special Rapporteur on Child Protection
500
Data Loss
502
Employer/University Access
502
Cloud
503
Politicisation of Data Protection
503
Conclusion
503
Author And Contributors
505
Index
511