David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Philosophy and Technology 24 (4):411-418 (2011)
Once upon a time, they managed to bring Neverland into the bedrooms; they were seen as the heroes of a new era. However, as heroes always tend to walk a fine line between good and evil, it does not come as a surprise that a decade later the perception has dramatically changed; the fairy tale turned into a nightmare. Are Internet Service Providers (ISPs) no more than data-guzzling monsters that need to be tamed? In November, the European Commission published a “Comprehensive approach on personal data protection in the European Union” which seems to nod approval. The approach seeks to strengthen the individual’s rights regarding the use of data by ISPs. The Commission notes that children deserve specific protection in this context due to the fact that their awareness of risks and consequences is usually underdeveloped. Both a general principle of transparent processing and specific obligations for data controllers regarding the type of information to be provided and the modalities for providing it had to be taken into account. Not only legal but also self-regulatory initiatives should contribute to a better enforcement of data protection rules. This approach is both applauded and heavily criticized by the European Data Protection Supervisor. In particular, he argues that children’s particular interests have not been sufficiently addressed presenting a long list of suggestions for improvement including specific provisions against behavioral advertising, the exclusion of some data categories, an age threshold or special requirements on the issue of informed consent and a reinforcement of data controllers’ accountability. Is there really a need for a new magic formula? This paper reviews the current options for addressing the challenges of the use of personal data of minors by ISPs
|Keywords||Data protection Information technologies Rights of minors Ethical liability of ISPs|
No categories specified
(categorize this paper)
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
Luciano Floridi (2005). The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7 (4):185-200.
European Group on Ethics in Science & New Technologies (2005). Ethical Aspects of ICT Implants in the Human Body. Jahrbuch für Wissenschaft Und Ethik 10 (1).
Citations of this work BETA
No citations found.
Similar books and articles
Tiffany Chenneville, Kimberly Sibille & Debra Bendell-Estroff (2010). Decisional Capacity Among Minors with Hiv: A Model for Balancing Autonomy Rights with the Need for Protection. Ethics and Behavior 20 (2):83 – 94.
Debra Bendell-Estroff, Kimberly Sibille & Tiffany Chenneville (2010). Decisional Capacity Among Minors With HIV: A Model for Balancing Autonomy Rights With the Need for Protection. Ethics and Behavior 20 (2):83-94.
Gloria González Fuster (2010). Inaccuracy as a Privacy-Enhancing Tool. Ethics and Information Technology 12 (1):87-95.
Raphael Cohen-Almagor (2010). Responsibility of and Trust in ISPs. Knowledge, Technology and Policy 23 (3-4):381-397.
James R. Maxeiner, Business Information and 'Personal Data': Some Common Law Observations About the Draft EU Data Protection Directive.
A. Conti, P. Delbon, L. Laffranchi, C. Paganelli & F. De Ferrari (2012). HIV-Positive Status and Preservation of Privacy: A Recent Decision From the Italian Data Protection Authority on the Procedure of Gathering Personal Patient Data in the Dental Office. Journal of Medical Ethics 38 (6):386-388.
Dag Elgesem (1999). The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data. [REVIEW] Ethics and Information Technology 1 (4):283-293.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
J. Street (1991). Personal Data Protection in Health and Social Services. Journal of Medical Ethics 17 (1):53-54.
Mireille Hildebrandt (2011). Who Needs Stories If You Can Get the Data? ISPs in the Era of Big Number Crunching. Philosophy and Technology 24 (4):371-390.
Dorothy E. Denning (2010). Comments on Responsibility of and Trust in ISPs. Knowledge, Technology and Policy 23 (3-4):399-401.
Charles R. McCarthy & Joan P. Porter (1991). Confidentiality: The Protection of Personal Data in Epidemiological and Clinical Research Trials. Journal of Law, Medicine and Ethics 19 (3-4):238-241.
Litska Strikwerda (2012). Theft of Virtual Items in Online Multiplayer Computer Games: An Ontological and Moral Analysis. [REVIEW] Ethics and Information Technology 14 (2):89-97.
Maria Bakardjieva & Andrew Feenberg (2001). Involving the Virtual Subject. Ethics and Information Technology 2 (4):233-240.
Added to index2011-06-10
Total downloads12 ( #141,639 of 1,413,407 )
Recent downloads (6 months)1 ( #154,345 of 1,413,407 )
How can I increase my downloads?