Skip to the main content

Comparative Online Privacy - Spring 2016

Professor of Practice Urs Gasser
Spring 2016 Seminar
Meets: Tu5:00pm - 7:00pm
2 classroom credits
 

Online privacy has become a major issue for Internet users, technology companies, online business, researchers, and policy-makers around the world, as more and more personal information is collected, aggregated, shared, and used across a wide variety of contexts. Policy-makers on both sides of the Atlantic -- and globally -- have been responsive to concerns expressed by users, consumer organizations, activists, and academics, and have proposed an important series of new laws, regulations, and other privacy-enhancing instruments at the international and national level. At the same time, the approaches aimed at regulating the respective information practices on the Internet -- targeting social net-working sites, online advertising, data aggregators, and the like -- as well as the details of the proposed privacy norms are highly controversial.

In this interactive seminar, we will identify, map, analyze, and discuss latest developments in privacy law related to the Internet from a comparative perspective and put them into a broader context. Specifically, in the first part of the seminar we will introduce competing theories and models of online privacy and map current policy proposals as well as regulatory action onto such a matrix. In addition to discussing theoretical frameworks and analyzing current developments in online privacy, we will also take a closer look into qualitative and quantitative studies regarding privacy attitudes and practices online, and ask how such findings from research have shaped?or should shape?both the theoretical frameworks as well as the actual application of law. In the second part, the seminar examines in greater detail potential solutions to the concerns and harms that are presented in the first section. In our analysis, we will survey and critique both legal and non-legal solutions. We will hope to answer questions like: which institutions are the most capable of enforcing user privacy? And how can we design our technologies so that privacy values are embedded into the construction of our technological tools. In asking these questions, we will create a valuable matrix and taxonomy for recommending solutions to potential privacy harms. Finally, in the third section, we will look at specific cases that reflect current trends in privacy law. For instance, we will apply our studies earlier in the seminar towards Europe?s ?Right to be Forgotten? as well as other instances of recent tensions between privacy and other values (autonomy, transparency, etc).