Abstract
Even though the individuals’ motivations of operating anonymously on the Internet are manifold, their highest common denominator is the protection of (the own) privacy. Although everyone takes privacy in normal life for granted, trying to get the same level of privacy and anonymity on the Internet are as important as it is difficult to achieve the objective (Martin, 2006, http://www.securityfocus.com/columnists/386). In so doing, the netizens’ privacy in the online world needs to be defended against both the States (for example, under security interests) as well as against private actors, in terms of economic or criminal interests (Benedek, 2008, Internet governance and the information society: global perspectives and european dimensions, p. 40. Eleven International Publishing).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Privacy as a human right is enshrined in many international legal instruments, for example in Article 12 of the Universal Declaration of Human Rights (UDHR) (United Nations 1948), in Article 17 of the International Covenant on Civil and Political Rights (ICCPR) (United Nations 1966) as well as in Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR) (Council of Europe 1950). Some key aspects of these international legal instruments are to be described subsequently.
- 2.
See Chap. 4.
- 3.
This list is not intended to be exhaustive.
- 4.
Concerning the area of tension between the Articles 8 and 10 ECHR see in general Weber and Sommerhalder 2007.
- 5.
See European Court of Human Rights (ECHR): Klass and others vs. Germany. judgment of 6 September 1978. Series A No. 28, para 41.
- 6.
According to a 2011 Survey of the European Commission 94% of the Europeans aged 15–24 are using the Internet, see European Commission 2011b, p. 4.
- 7.
See ECHR: Copland vs. The United Kingdom, judgment of 3 April 2007, No. 62617/00, para 42.
- 8.
Online surveillances enable investigators to look at all data stored on the suspect’s computer (correspondence by email, pictures, documents) unknown to him/her and therewith affects the suspect’s legal position to a great extent since the obtained information’s content can be enormous. As in the case of eavesdropping a suspect’s Internet telephony, online surveillances are accomplished with the aid of (later explained) Trojan horse software and require an explicit warrant.
- 9.
As to that, the European Court of Human Rights emphasizes the necessity of an effective control against abuse; Pätzold 2012, Article 8 para 126.
- 10.
- 11.
For more details Volokh 2000, pp. 1057 ss, 1073 ss.
- 12.
This major concern, expressed by Volokh throughout his extensive study, requires careful attention (particularly Volokh 2000, pp. 1076/77, 1122/23).
- 13.
Summary of the treaty: http://conventions.coe.int/Treaty/en/Summaries/Html/108.htm.
- 14.
As in Article 16 of the Treaty of the European Union stating that “everybody has the right to the protection of personal data concerning them”; http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2008:115:0047:0199:EN:PDF.
- 15.
With a very few exceptions is was not until the second half of the 20th century that governments in Europe started establishing data protection laws encompassing also the issue of data retention. In 1968, at a time when the world could not yet anticipate the technological progress and its effects on data retention, the Council of Europe released a Recommendation concerning human rights and modern scientific and technological developments. Already at that time this Recommendation recognized the potential risks for individual rights. Later, in 1981, the Council of Europe released a Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (No. 108). Since then, the Committee of Ministers of the Council of Europe released several Recommendations entailing additional provisions which refine the notion of data retention.
- 16.
According to a recently published press release of the European Commission, the “goals were to protect individuals’ data in all policy areas, including law enforcement, while reducing red tape for business and guaranteeing the free circulation of data within the EU” (European Commission 2012a).
- 17.
Extensively on the subject Sect. 3.2.2.3.
- 18.
For a comprehensive approach on personal data protection in the EU see European Commission 2010, p. 8.
- 19.
In the last quarter of 2011, the European Commission maintained intensive dialogues with Europe’s national data protection authorities and with the European Data Protection Supervisor to investigate options for more consistent application of EU data protection rules across all EU Member States, see European Commission 2012b, p. 3.
- 20.
In December 2010, the Working Group on Data Retention—a citizens’ movement—brought an action with 35.000 complainants before the German Federal Constitutional Court demanding amongst other things additional guarantees for the freedom of electronic communication, limitations and cutbacks of existing surveillance powers and a restraint on the introduction of such new powers; see De Simone 2010, p. 306 ss.
- 21.
After the German Federal Court issued an (again extended) injunction in 2008, prohibiting law enforcement authorities the access to retained data, the Court nullified the German Data Retention Law on March 2, 2010, 1 BvR 256/08.
- 22.
Romania: Decision no. 1258 of 8 October 2009, published in: Official Gazette no.798 of November 23, 2009; Czech Republic: Data Retention in Telecommunications Services, 2011/03/22–Pl. ÚS 24/10.
- 23.
See Orwell 1949.
- 24.
- 25.
See Sect. 1.1.
- 26.
- 27.
QQ is an international messenger with more than 1Â billion registered and 500Â million monthly active accounts and, according to their own statements, the most popular instant messaging service and the largest online community in China; see http://www.tencent.com/en-us/index.shtml.
- 28.
By installing a keyword blocking program (OpenNet Initiative 2009, p. 15).
- 29.
Unfortunately, this is not only a problem in countries with limited human rights protection; among others also Germany and the USA accomplished excessive citizen surveillance and monitoring (European Parliament 2010).
- 30.
- 31.
This approach has been repeatedly reiterated by members of the European Commission, for example by EU justice commissioner Viviane Reding in a speech to the European parliament on 16 March 2011.
- 32.
In more detail see Sect. 3.1.4.2(1).
References
Akdeniz Y (2002) Democracy and cyberspace. Social Res Int Q 69(1):223–237
Benedek W (ed) (2006) Understanding human rights: manual on human rights education. Berliner Wissenschafts-Verlag, Vienna
Benedek W (2008) Internet governance and human rights. In: Benedek W, Bauer V, Kettemann MC (eds) Internet governance and the information society: global perspectives and european dimensions. Eleven International Publishing, Utrecht
Benhamou B (2006) Organizing internet architecture. http://www.diplomatie.gouv.fr/en/IMG/pdf/Organizing_Internet_Architecture.pdf. Accessed 31 Jan 2012
Bignami FE (2007) Privacy and law enforcement in the european union: the data retention directive. Chicago J Int Law 8:233–255
Brown I (2010) Communications data retention in an evolving internet. Int J Law Inf Technol 19(2):95–109
Brunst PW (2009) Anonymität im Internet—rechtliche und tatsächliche Rahmenbedingungen. Duncker and Humblot, Berlin
Charte du droit à l’oubli dans les sites collaboratifs et les moteurs de recherche (2010). 13 Oct 2010. http://www.aidh.org/Actualite/Act_2010/Images/Charte_oubli_La_Charte.pdf. Accessed 31 Jan 2012
Cheung AS (2009) Rethinking public privacy in the internet: a study of virtual persecution by the internet crowd. J Media Law 1(2):191–217
Council of Europe (1950) European Convention for the Protection of Human Rights and Fundamental Freedoms. Summary. http://conventions.coe.int/Treaty/en/Summaries/Html/005.htm. Accessed 31 Jan 2012
Council of Europe (1981) Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. 28 Jan 1981. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=108&CL=ENG. Accessed 31 Jan 2012
Council of Europe (2002) Contribution to the 2nd preparatory committee for the World Summit on Information Society: Democracy, Human Rights and the Rule of Law in the Information Society. 9 Dec 2002. http://www.itu.int/dms_pub/itu-s/md/03/wsispc2/c/S03-WSISPC2-C-0032!!PDF-E.pdf. Accessed 31 Jan 2012
Court of Justice of the European Union (2009) Judgement of the Court of 10 Feb 2009 (case C-301/06) (Ireland versus the European Parliament and the Council of the European Union). http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:62006J0301:EN:NOT. Accessed 31 Jan 2012
De Simone C (2010) Pitting Karlsruhe Against Luxembourg? German Data Protection and the Contested Implementation of the EU Data Retention Directive. German Law J 11(3):291–318
Deutscher Bundestag (2007) Gesetz zur Neuregelung der TelekommunikationsĂĽberwachung und anderer verdeckter Ermittlungsmassnahmen sowie zur Umsetzung der Richtlinie 2006/24/EG (Law on the Revision of Telecommunications Monitoring and other Covert Investigation Measures and on the Implementation of Directive 2006/24/EC). 21 December 2007. http://www.gesmat.bundesgerichtshof.de/gesetzesmaterialien/16_wp/telekueberw/telekueberw-index.htm. Accessed 31 Jan 2012
European Commission (2010) Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions: A comprehensive approach on personal data protection in the European Union. COM(2010) 609 final. 4 Nov 2010. http://ec.europa.eu/justice/news/consulting_public/0006/com_2010_609_en.pdf. Accessed 31 Jan 2012
European Commission (2011) Report from the Commission to the Council and the European Parliament. Evaluation report on the Data Retention Directive (Directive 2006/24/EC). COM(2011) 225 final. 18 April 2011. http://www.cep.eu/fileadmin/user_upload/Kurzanalysen/Vorratsdatenspeicherung/COM_Data_Retention_Evaluation_en18042011.pdf. Accessed 31 Jan 2012
European Commission (2011b) Special Eurobarometer 359: Attitudes on Data Protection and Electronic Identity in the European Union. Report. June 2011. http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf. Accessed 31 Jan 2012
European Commission (2012a) Commission proposes a comprehensive reform of data protection rules to increase users’ control of their data and to cut costs for businesses. Press release. 25 Jan 2012. http://europa.eu/rapid/pressReleasesAction.do?reference=IP/12/46&format=HTML&aged=0&language=EN&guiLanguage=en. Accessed 31 Jan 2012
European Commission (2012b) Communication from the European Parliament, the Council and the European Economic and Social Committee and the Committee of the Regions: Safeguarding Privacy in a Connected World. A European Data Protection Framework for the 21st Century. COM(2012) 9 final. 25 Jan 2012. http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_9_en.pdf. Accessed 31 Jan 2012
European Commission (2012c) Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). COM(2012) 11/4 draft. http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf. Accessed 31 Jan 2012
European Commission (2012d) Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data. COM(2012) 10 final. http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_10_en.pdf. Accessed 31 Jan 2012
European Parliament (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on Free Movement of such Data. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:1995:281:0031:0050:EN:PDF. Accessed 31 Jan 2012
European Parliament (2000) Charter of Fundamental Rights of the European Union. 2000/C 364/01. 18 Dec 2000. http://www.europarl.europa.eu/charter/default_en.htm. Accessed 31 Jan 2012
European Parliament (2002) Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications). http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2002:201:0037:0047:EN:PDF. Accessed 31 Jan 2012
European Parliament (2006) Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the Retention of Data Generated or Processed in Connection with the Provision of Publicly Available Electronic Communications Services or of Public Communications Networks and Amending Directive 2002/58/. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF. Accessed 31 Jan 2013
European Parliament (2010) Information and Communication Technologies and Human Rights. http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocument=EN&file=31731. Accessed 31 Jan 2012
European Union (2010) Consolidated Version of the Treaty on the Functioning of the European Union.http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2010:083:0047:0200:en:PDF. Accessed 31 Jan 2012
German Federal Constitutional Court (2010) 1 BvR 256/08. 2 March 2010. http://www.bverfg.de/entscheidungen/rs20100302_1bvr025608.html. Accessed 31 Jan 2012
Gollwitzer W (2005) Menschenrechte im Strafverfahren: MRK und IPBPR. Commentary. Walter de Gruyter, Berlin
Grewlich KW (1999) Governance in “cyberspace”: access and public interest in global communications. Kluwer Law International, The Hague
Hosein G (2006) Privacy as freedom. In: Jørgensen RF (ed) Human rights in the global information society. MIT Press, Cambridge
Jackson M (2011) Right to privacy, unlawful search and surveillance. In: Chan J, Lim CL (eds) Law of the Hong Kong constitution. Sweet and Maxwell, Hong Kong
Kang J (1998) Information privacy in cyberspace transactions. Stanford Law Rev 50(4):1193–1294
Martin K (2006) Privacy and anonymity, security focus. 14 Feb 2006. http://www.securityfocus.com/columnists/386. Accessed 31 Jan 2012
Marzouki M (2006) The “guarantee rights” for realizing the rule of law. In: Jørgensen RF (ed) Human rights in the global information society. MIT Press, Cambridge
Mayer-Schönberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton
OECD (1980) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. 23 Sept 1980. http://www.oecd.org/document/18/0,3746,en_2649_34255_1815186_1_1_1_1,00&&en-USS_01DBC.html. Accessed 31 Jan 2012
OECD (2002) Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. 25 July 2002. http://www.oecd.org/dataoecd/16/22/15582260.pdf. Accessed 31 Jan 2012
OpenNet Initiative (2009) Internet Filtering in China. 15 June 2009. http://opennet.net/sites/opennet.net/files/ONI_China_2009.pdf. Accessed 31 Jan 2012
Orwell G (1949) 1984, London
Pätzold J (2012) Art. 8 EMRK. In: Karpenstein U., Mayer FC (eds) EMRK—Konvention zum Schutz der Menschenrechte und Grundfreiheiten. Commentary. C.H. Beck, Munich
Posner RA (1998) The right of privacy. Georgia Law Review 12(3):393–422
Reidenberg JR (2000) Resolving conflicting international data privacy rules in cyberspace. Stanford Law Rev 52(5):1315–1376
Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven
Trenkelbach H (2005) Internetfreiheit: Die Europäische Menschenrechtskonvention als “Living Instrument” vor neuen Herausforderungen?. Logos Verlag, Berlin
United Nations (1948) Universal Declaration of Human Rights, 10 December 1948. http://www.ohchr.org/en/udhr/pages/introduction.aspx. Accessed 31 Jan 2012
United Nations (1966) International Covenant on Civil and Political Rights. 16 Dec 1966. http://www2.ohchr.org/english/law/ccpr.htm. Accessed 31 Jan 2012
United Nations (1990) Guidelines for the Regulation of Computerized Personal Data Files. 14 December 1990. http://www.unhcr.org/refworld/publisher,UNGA,THEMGUIDE,,3ddcafaac,0.html. Accessed 31 Jan 2012
Volokh E (2000) Freedom of speech, cyberspace, harassment law, and the Clinton administration. Law Contemp Prob 63:299–335
Wacks R (2000) Law, moralty, and the private domain, Hong Kong
Warren S, Brandeis L (1890) The right to privacy. Harvard Law Rev 4(5):193–220
Weber RH (2002) Regulatory models for the online world. Schulthess, Zurich
Weber RH (2009) Internet governance: regulatory challenges. Schulthess, Zurich
Weber RH (2011a) The Right to Be Forgotten: More Than a Pandora’s Box?. J Intellectual Property Inf Technol E-Commerce Law 2: 120–130
Weber RH (2012b) How Does Privacy Change in the Age of the Internet, In: Fuchs C, Boersma K, Albrechtslund A, Sandoval M (eds) Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Routledge, New York
Weber RH, Sommerhalder M (2007) Das Recht der personenbezogenen Information. Schulthess/Nomos, Zurich
Wildhaber L, Breitenmoser S (1992) Art. 8 EMRK. In: Golsong H, Karl W (eds) Internationaler Kommentar zur Europäischen Menschenrechtskommission. Commentary. Carl Heymanns Verlag, Cologne
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Weber, R.H., Heinrich, U.I. (2012). Legal Foundations of Anonymity. In: Anonymization. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-4066-5_3
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4066-5_3
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4065-8
Online ISBN: 978-1-4471-4066-5
eBook Packages: Computer ScienceComputer Science (R0)