The interesting article quoted (Tweeting about drink drivers) does not take into account the fact that the Attorney General might have made an initial comment through his twitter account to nudge and influence an emerging behaviour (police officers naming people on Twitter). So that the conclusion seems to me a quite balanced and fair one.
Not at all fair neither sensible the fact that if your Twitter account is deliberately taken over to mess up the perception of your activity, brands or history and identity (or to hide or mock abuses you have been victimised with or to test and survey 'opportunities' for behavioural advertising and the like) you cannot sue, you cannot change the data or restore your account without the intervention of the social media company - and it is quite difficult you can claim compensation under Computer Misuse Act 1990 either.
That is why I could not agree more with the vigorous statements of the EU Parliament's LIBE Committee against profiling and about the need to reinforce explicit 'consent' throughout the whole personal data digital supply chain.
Perhaps great times for change management in privacy policies and practices - not just in the legislation - are coming.
Furthermore I would like to add the same type of offences to the way an individual's identity is represented online (and I am not talking straight about defamation here - that can be a consequence of misrepresentation or not, depending on the context) is true for other major and disgraceful tampering operations on personal data made unintentionally (because of flawed IT procedures) or intentionally by civil servants and other employees. These cannot be 100% identified most of the times at present (unless we implementa strong type of authentication system, like Belgium and other continental countries) or by third parties working on public registries.
And this is the current case of GPs against the sale of personal data to third parties, I see very reassuring the public opinion in a matter of balanced views on NHS records management philosophy, and many other issues related to the way in which serious organised criminals master online open data.
Brunella Longo
Information Management Adviser
http://www.brunellalongo.co.uk
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|