Conceptualising a Right to Oblivion in the Digital World* A human rights-based approach

June 29, 2012 at 4:24 pm | Posted in Concepts, Critical Perspectives, Questions, Thoughts | Comments Off on Conceptualising a Right to Oblivion in the Digital World* A human rights-based approach

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2064503

Conceptualising a Right to Oblivion in the Digital World*

A human rights-based approach

Electronic copy available at: http://ssrn.com/abstract=2064503

Conceptualising a Right to Oblivion in the Digital World*

A human rights-based approach

Napoleon Xanthoulis

BA MS LLB (Hons)

napoleon.xanthoulis.09@ucl.ac.uk

University College London

Faculty of Laws

Contents

1. Introduction ………………………………………………………………………………………………………………………. 2

2. The right to oblivion as a modern phenomenon …………………………………………………………………… 3

2.1 A Fictional Desire? ……………………………………………………………………………………………………….. 3

2.2 To Forget or not to Forget: That is the Question (maybe) …………………………………………………. 4

3. The right to oblivion in the digital world ………………………………………………………………………………. 6

3.1 Definitional and terminological difficulties………………………………………………………………………. 7

3.2  The inefficiency of the current data protection mechanisms ………………………………………….. 10

4. The right to oblivion in the EU: A proposal for a “right to be forgotten and to erasure” …………. 12

4.1 Basic remarks …………………………………………………………………………………………………………….. 12

4.2 The “right to erasure” …………………………………………………………………………………………………. 14

4.3 Particular limitations and exceptions to the “right to erasure” ………………………………………… 15

4.4 Where is the “right to be forgotten”? …………………………………………………………………………… 15

4.5 Preliminary conclusions ………………………………………………………………………………………………. 17

5. Conceptualising a human right to oblivion …………………………………………………………………………. 18

5.1 Oblivion as a right ………………………………………………………………………………………………………. 18

5.2 Oblivion as a human right ……………………………………………………………………………………………. 19

6. A systematic attempt to define the scope of a human right to oblivion ………………………………… 21

6.1 The relationship between the right to oblivion and the right to privacy ……………………………. 22

6.2 The right to privacy as a multidimensional concept ………………………………………………………… 23

6.3 The right to privacy as an instrumental good in the light of Aristotelian philosophy …………… 25

6.4  The right to oblivion as an instrumental good and a specific expression of a multidimensional

right to privacy ………………………………………………………………………………………………………………… 26

7. Addressing the potential threat of human rights inflation …………………………………………………… 29

8. Conclusions ……………………………………………………………………………………………………………………… 32

Bibliography………………………………………………………………………………………………………………………… 34

*

This paper is based on a research essay written at University College London (UCL), Faculty of Laws under the

supervision of Mr. Colm O’Cinneide, Reader in Law.

Electronic copy available at: http://ssrn.com/abstract=2064503

2

1. Introduction

According to ancient Greek mythology, Lethe («Λήθη»), better known as Oblivion, was a

river deity, the daughter of Ungratefulness, who flowed in the underworld Hades. People

believed that when the dead reached Hades they were forced to drink Lethe‟s waters to erase

any memory of their previous life1.

Today, after more than two and half millennia, whether forgetfulness is a blessing or a

curse is still discussed as part of a debate on what I am going to term the right to oblivion. In

broad terms, the right to oblivion is presented in the academic debate, prima facie, as the

right of an individual to have full control of the information related to him, particularly in the

digital world; a right that is widely reflecte\d through an individual‟s claim to erasure of such

data. Thus, this is a discussion on a right to cyber-oblivion”2.

The main aim of this essay is to argue that a right to oblivion should be

conceptualised as a human right and more specifically as an expression of the broader right to

privacy, which itself is approached as a multidimensional concept.

Firstly, I will discuss the right to oblivion as a phenomenon, in other words, how it is

prima facie presented in the current debate. Secondly, I will look at terminological problems

associated with the right to oblivion, examining how these have contributed to the current

conceptual diversity, and how they have so far prevented any systematic attempt to

conceptualise this right. Thirdly, I will explain how the current legal framework fails to offer

a holistic conceptualisation of a right to oblivion and I will argue that a new proposal under

consideration by the EU suffers from the same deficiencies. Fourthly, I will argue that, as the

term itself reveals, the concept should be discussed from a human rights-based approach

rather than from a mere control-based perspective. More particularly, I will suggest that the

1

Pausanias, Description of Greece, Book 9. 39. 8.

2

Brimsted K., „The right to be forgotten: can legislation put the data genie back in the bottle?‟ (2011), Privacy

& Data Protection, Vol. 11(4), pp. 6-8, 7.

3

right to oblivion should be conceptualised in light of the right to privacy, as a

multidimensional concept. Finally, I will address the question of whether introducing a right

to oblivion might contribute further to a potential inflation of human rights.

2. The right to oblivion as a modern phenomenon

2.1 A Fictional Desire?

Arguably, the debate on the right to oblivion is an unavoidable result of the social and

technological evolution of the last decades. In this light, Morin suggests that, as our

information becomes accessible globally and indefinitely, there seems to be “an urgent need 

to address personal information management in a socially responsible way […] to put the 

user back in control of his digital fate” 3.

On the other hand, there are strong opposing views arguing that what people desire is

not simply the power to control their privacy settings; rather, to gain full control over their

online reputation4. Such an aim, is argued to be merely an unrealistic fantasy in the era of

Facebook and Google5. This argument is further supported by the claim that the complexity

of enforcing such deletion of data would require a hyper-specific set of regulations which will

not succeed in practice6. On the other hand, an individual‟s claim against an Internet Service

Provider (“ISP”) to take any available reasonable measures to delete personal information, is

argued to minimise the difficulties of enforcing such regulations (see section 4.2).

3

Morin J.-H., Towards Socially-Responsible Management of Personal Information in J.G. Breslin et al. (eds)

Social Networks, BlogTalk 2008/2009, LNCS 6045, Springer (2010), pp.108-115, 108, 110; Also Mayer V.,

Delete – The Virtue of Forgetting in the Digital Age, (2009) Princeton University Press, pp.85-86.

4

Rosen J., „The Web Means the End of Forgetting‟, The New York Times, 21.07.2010.

5

Ibid.

6

Fleischer Peter, „Foggy thinking about the Right to Oblivion‟, 09.03.2011,

http://peterfleischer.blogspot.co.uk/.

4

2.2 To Forget or not to Forget: That is the Question (maybe)

As the term itself suggests, the concept of the right to oblivion is related to the broad concepts

of remembering and forgetting, the “duality of human memory”7. Should in fact everything

be remembered? Is there some value on forgetting certain information and if so, what should

be forgotten and when? Even though these questions constitute the main areas of dispute

among the authors, it seems that most of the available attempts made to answering them, as

part of the on-going debate to the right to oblivion, have not yet provided a systematic

approach to this problematic.

Firstly, it is suggested that forgetting is a “natural mentation for human beings8 and

that it provides us with peace of mind, mental growth, and positive human relationship-

building assisting therefore in the establishment of a personal identity9. This value is argued

to be threatened by the development of ICT, as it effectively enforces the idea that everything

should be remembered. However, critics counter that, “the total capture and recall of a 

society‟s (or even individual‟s) works and activities has never been, and is unlikely ever to

be, possible”, despite the rapid evolution of ICT technologies10.

Secondly, to be forgotten is argued to allow the opportunity for a fresh start11.

According to this view “it is socially beneficial to encourage individuals to reform their lives

[and therefore not] be barred by their past „mistakes‟” when entering into social and

economic life12.Taking the opposite view, Peter Fleischer, Google‟s Chief Privacy officer,

7

Bannon L. J., „Forgetting as a feature, not a bug: the duality of memory and implication for ubiquitous

computing‟ (2006) CoDesign, Vol.2, No.1, pp.3-15,13.

8

Murata K., Orito Y., The right to forget/be forgotten, (2001) in Proceedings of CEPE, 6, pp.192-201, 193.

9

Murata K., Orito Y., ibid. at 194.

10

Lievrouw L. A., „The Next Decade in Internet Time: Ways Ahead for New Media Studies, presented‟ (2011)

in A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, Oxford Internet Institute,

21-24 September 2011, p.11.

11

Blanchette  J. F., „Johnson D.G., Data retention and the panoptic society: The social benefits of forgetfulness‟

(1998), ACM Policy ‟98 Conference, LSE, p.4

12

Westin A. F. and Baker M. A., Databanks in a free society: Computers, record keeping, and privacy (1972)

New York: Quadrangle/New York Times Book Company, p.267.

5

understands the right to oblivion as “an attempt to give people the right to wash away digital 

muck, or delete the embarrassing stuff”13. He argues that “history should be remembered, not

forgotten, even if it‟s painful”. According to Fleischer “culture is memory”. One response to

this argument is that human cultures seem to have been built over the course of time through

a process of selective remembering and forgetting, not through total remembering, as this was

simply not possible until recently (and still is not in most parts of the world). Despite this, it

might worth considering that a right to remember as much as possible may have some

benefits to our political system  which could themselves be undermined by putting forward a

potential right to oblivion14. As has been characteristically written: “I don‟t want a world 

where politicians or demagogues can get their dodgy past involvements with fascism [..] or

whatever quietly deleted or rendered un-findable on Google”15. To the contrary, it has been

suggested that such power to forget and be forgotten is not merely an individual good but in

essence a social value, that benefits the society as a whole, as it allows the independent self-

development of individuals as democratic citizens. In other words, no forgetfulness, no

effective democratic citizens. However, the opposite extreme seems to be equally

unacceptable. “A world in which individuals are not held accountable over time for the

consequences of their actions will not produce the sense of responsibility that is just as

necessary to a democratic society”16. Unavoidably, there will be a balancing act.

Critics have also argued that it is difficult if not impossible to predict what

information might be useful in the future, and that allowing the deletion of data without

careful consideration of its implications in the future might lead to having important

13

Fleischer Peter, supra note 6.

14

Edwards L., „The Rights to forget of the right to spin?‟, panGloss, 18.03.2011.

15

Edwards L.,  ibid.

16

Blanchette J. F., supra note 11 at 6.

6

information “inaccessible, incomplete and/or misrepresentative of reality17. It is submitted

that this argument may be relevant when it relates to facts and events of public importance or

public policy, but fails to explain how it can justify preventing a person from exercising full

control over his personal information when this can have no consequential implications on

the history of a state or nation.

Finally, other legal arguments have been presented that introducing a right to oblivion

creates a presumption that privacy is more important than other potentially conflicting human

rights such as freedom of speech18, or other values such as journalism and literature, or other

principles such as security or data integrity19. As will be shown in section 4.3, future

proposals on a right to oblivion will most likely include certain limitations and exceptions

that would strive to balance the competing fundamental public and individual interests

(among others).

Overall, the diversity of ideas outlined above underscores the point that there is no

unified approach to the concept in question. Furthermore, it confirms Bernal‟s observation

that the concept of a right to oblivion “provokes emotional and instinctive reactions, often 

very negative, rather than rational and thoughtful responses”20, particularly since the

discussion around the world has only recently taken shape.

3. The right to oblivion in the digital world

Flaherty‟s reference to a right to be forgotten 21 in relation to private data in the digital world

in 1989 is considered one of the first that have been recorded in the academic literature.

17

See Ausloos J., „The „Right to be Forgotten‟ – Worth Remembering?‟ (2012) Computer Law & Security

Review, 28(2), pp.143–152, 7 and the relevant references provided.

18

„Data Protection: forget about a “right to forget”‟, Amberhawk, 28.03.2011.

19

Kierkegaard S., et al., „30 years on – The review of the Council of Europe Data Protection Convention‟

(2011) 108, Computer Law & Security Review 27, pp.223-231, 227.

20

Bernal P. A., „A Right to Delete?‟, (2011) European Journal of Law and Technology, Vol. 2, Issue 2, p.2.

21

Flaherty D., Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France

Canada, and the United States (1989) Chapel Hill, NC: The University of North Carolina Press.

7

However, the first references to what was then called right to be forgotten are made in cases

related to the rights of ex-convicts22, with particular reference to their right to erase their past

convictions under certain circumstances or to prevent the re-publication of details of

unfortunate past events under specific conditions. In this framework, after a certain period of

time, persons who have been sentenced for criminal offences may be granted the right to

prevent third parties from identifying their criminal past, a right which is recognised under

the broader idea of a right to personality in most continental jurisdictions23.

3.1 Definitional and terminological difficulties

It is arguably difficult in principle to argue on a subject matter when the terms surrounding it

have been given a range of different meanings24. However, when this is combined with a

parallel disagreement on the term that should be used, which itself leads inevitably to an

inconsistent use of the available terms in the academic literature, then approaching this

concept becomes a far from an easy task.

Aristotle identified two terminological difficulties that should be solved when an issue

is initially approached. He suggests that is vital to identify first whether the things that

constitute the subject matter of a certain research are “equivocally named” («omonyma»), i.e.

things that have the name only in common, the definition corresponding to the name being

different”25 and secondly, to see whether the things are “univocally named”26 sinonyma»),

22

According to other opinion the “right to be forgotten” was born from the concept of “right to forget”,

Vermesa O., Friess P. (Eds.), Internet of Things Global Technological and Social Trends, (2011) River

Publishers, Denmark, p.78.

23

Werro F., „The Right to Inform v. the Right to be Forgotten: A transatlantic Clash‟, in Haftungsrecht im

dritten millennium = Liability in the third millennium, (2009) Center for Transnational Legal Studies

Colloquium, Georgetown University, Research Paper No. 2, in Ciacchi A. C., Godt C., Rott P., Smith L. J.

(Eds.), Baden-Baden, F.R.G.: Nomos, pp. 285-300, 285.

24

Brimsted K., supra note 2 at 6.

25

Aristotle, Categories, 1a 1-2. The problem of “things equivocally named” («ομωνύμων») and the effects on

the conceptualization of “law” has been systematically explained in Chougias- Palaeologos Al., Philosophy of

Law: 1. Fundamental Problematic (2000), Ant. N. Sakkoulas, pp.34-67.

26

Aristotle, ibid., 1a 6-8.

8

meaning, when not only they correspond to the same name but the name itself corresponds to

the same definition, as for example a man and an ox are both called „animals‟.

The concept of the right to oblivion in the digital world first appeared in the form of

the French le droit à l‟oublie. Writers in English have referred to the concept in various

terms: “right to forget”, “right to be forgotten”, “right to forget/be forgotten”, “right to 

delete” and “right to oblivion”. As a prima facie observation, some of these terms are

defined differently by different authors, therefore leading to a situation where the same term

is used to define a different thing (things equivocally named). On the other hand, many

authors use several of the above mentioned terms interchangeably27, treating them, therefore,

as things univocally named. Despite this, all these terms seem to refer to the concept of

forgetfulness or else oblivion, as even the term right to delete which refers restrictively on the

deletion of data, implies that by deleting information, such information is eventually

forgotten. Overall, it is submitted that no attempt has been made, so far, to present a holistic

systematic conceptual approach of the right to oblivion through identifying and solving the

terminological problems mentioned above and defining the substantial conceptual

differences, if there are any, of all the above mentioned terms.

In his attempt to categorise the conceptual differences that reflect the use of two of the

above mentioned terms, Koops suggests that the right to forget seems to be taking the

perspective of the individual/user by referring to the importance for someone not to be

obliged to be confronted with his own past, whether the individual himself has forgotten or is

currently trying to forget it.28 In this context, the protection of this interest might imply the

need to introduce: a) a right that will allow an individual to be able to “control his past” such

as e.g. by deleting certain elements from his past that he wishes not to remember (a positive

27

See for example O. Vermesa, P. Friess supra note 22.

28

Koops B.-J., „Forgetting footprints, shunning shadows. A Critical Analysis of the “Right to Be Forgotten” in

Big Data Practice‟, (2011) Scripted, Vol.8, Issue 3, p.231.

9

right) and b) an obligation to third parties not to use/remind the individual of

facts/information that the individual wishes to forget (a negative right). On the other hand, the

right to be forgotten seems to take the perspective of third parties who are invited to take

measures so as not to be able to remember/refer to certain aspects of an individual‟s past,

which is presented as a negative right or “a duty to abstain from remembering someone‟s 

past”29.

Based on the above, forgetfulness seems to have been introduced as an umbrella

concept that could capture the substance of the right to forget/be forgotten.30 However, it is

the author‟s opinion that oblivion is a more suitable term since: a) it represents the historical

origin of the concept in the late 1970s from the French “le droit a l‟oublie”31; b) it covers the

conceptualisations of both the right to forget and be forgotten as described above and c) it

does not, a priori, restrict the definitional scope of the concept, and therefore accommodates

its potential future evolution and the broadening of the scope of the protected values.

In 2009, France launched a “Charter of good Practices on the right to be forgotten on 

social networks and search engines”32, which invited the signing parties to adopt measures

that facilitate protection of the personal data of the web users33. Furthermore, based on the

French initiative, there is an ongoing discussion on the potential inclusion of a right to

oblivion (mentioned, however, as a right to be forgotten) in the framework of the Council of

Europe34, while the European Commission (“EC”) has just published a widely debated

proposal on the review of the EU Data Protection legal framework where a separate “right to 

29

Koops B.-J., ibid. at 232.

30

Koops B.-J., ibid.

31

In Italian the “dirito a l‟oblio”, see Bernal P. A., supra note 20, p.2 and the relevant references provided. A

possible objection is that „oblivion‟ has particular connotations in English that „oublier‟ doesn‟t have in French

– but that‟s always the case whatever translation is used.

32

«Charte du droit à l‟oubli dans les sites collaboratifs et les moteurs de recherche».

33

Kuschewsky M., „The right to be forgotten – the fog finally lifts‟ (2012) Privacy & Data Protection,

Vol.12(3), pp.10-12, 11.

34

Kierkegaard S., et al., supra note 19 at 225.

10

be forgotten and to erasure” has been included. Despite this hyperactivity in the legal world,

as a prima facie observation there is still no universal agreement on what a right to oblivion is

and what it aims to protect.

3.2  The inefficiency of the current data protection mechanisms

Given the heated debate on the nature and scope of the right to oblivion, it is hardly

surprising that the ongoing disagreement extends to the question of whether this right already

exists within the current legal framework35.

Focusing on the EU legal framework, Article 16(1) of the Treaty on the Functioning

of the European Union (“TFEU”) provides that “everyone has the right to the protection of 

personal data concerning them”. Similarly, Article 8 of the EU Charter of Fundamental

Rights of the European Union36 (“EU Charter”) provides that “everyone has the right to the 

protection of personal data concerning him or her” (para. 1) and that “such data must be 

processed fairly for specified purposes and on the basis of the consent of the person

concerned or some other legitimate basis laid down by law” while in parallel “everyone has 

the right of access to data which has been collected concerning him or her, and the right to

have it rectified” (para.2). It has been argued that a right to oblivion is not part of the

Charter37 or the TFEU, since there is no clear provision that would allow an individual to

have control of his data, such as through a clear right of deletion of data.

Furthermore, as Commissioner Reading argued, the notion of consent, which is one of

the fundamental principles underpinning the EU data protection scheme, does not succeed in

its purpose as it is currently applied38. It is submitted that this as a fundamental reason could

prima facie justify the need to introduce a right to oblivion, taking into account the often

35

Nys H., „Towards a human right “to be forgotten online”?‟ (2011) European Journal of Health Law, 18(5),

pp.469-475.

36

Charter of the Fundamental Rights of the European Union, (OJ C 364/1 of 18.12.2000).

37

Koops B.-J., supra note 28 at 247.

38

See also Bernal P. A., supra note 20 at 4.

11

complicated, misleading terms of use of several well-known internet applications. A typical

„oneclick‟ expression of consent, within an online environment where the user has no

discretionary power to choose among different options/levels of use of his data, cannot

simply be regarded as sufficient expression of consent, i.e. “a freely given specific and 

informed indication”39 of someone‟s wishes. Indeed, despite the fact that “privacy is often 

considered to be sufficiently protected by giving the individuals the „power‟ to (dis)agree”,

the notion of consent is a mere “illusion of choice”40 since in reality “privacy policies are 

written in vague legalese, [there is a] lack of valid alternatives […] and even a withdrawal of

consent does not (necessarily) allow a person to have his or her data removed

retroactively”41.

Considering the above, it is clear that the current data protection framework is mainly

inspired by what are known as control-based theories, i.e. the idea that a person should have

full control over his personal information. Despite its significance, such an approach is in my

opinion unable to provide effective protection from the threats imposed by modern

technological developments, since as it has been argued, this conceptualisation is vulnerable

to examples of “threatened losses”42, e.g. where there has been no actual misuse of my data,

but for an existing threat or cases “when there is no control over disclosure”43 such as those

in which it seems that an individual has given up all his rights to controlling the use of his

personal data.

39

Reding V., speech/10/441, Brussels, 16.10.2010.

40

Ausloos J., supra note 17 at 8 and the references provided.

41

Ausloos J., ibid. at 6.

42

Austin L., „Privacy and the Question of Technology‟ (2003) Law and Philosophy, Vol. 22, No.2, pp.119-166,

125.

43

Austin L., ibid. at 126.

12

Furthermore, Ausloos44 argues that the current data protection scheme takes a

proprietary approach to privacy protection, which differs from the personal privacy

approach adopted by the “European Convention of Human Rights” (“ECHR”) (discussed

further in section 6.1). This matters, in the author‟s view, since the underlying value of the

right to oblivion should not merely be the protection of proprietary interests in certain data

but a number of interrelated fundamental values (e.g. autonomy, personality and dignity

among others) that are covered by the right to privacy as a multidimensional concept

(discussed in section 6.2).

4. The right to oblivion in the EU: A proposal for a right to be

forgotten and to erasure

4.1 Basic remarks

In 2009, the Vice President of the EC, Viviane Reding, announced her intention45 to review

the Data Protection Directive 199546 (“DPD”), a plan which would include a separate “right 

to be forgotten”. The Commissioner justified the need for such an initiative by explaining

that “whether you are online or offline, you should get full, easily accessible and easy to 

understand information on how your data is processed [and the latter should] not go beyond

what is strictly necessary”47. Furthermore, she argued that “a unified approach at EU level 

will make Europe stronger in promoting high data protection standards globally”48.

44

Ausloos J., supra note 17 at.3.

45

“European Commission sets out strategy to strengthen EU data protection rules”, IP/10/1462, 04.11.2010.

46

The 1995 EU Data Protection Directive (95/46/EC) on the protection of individuals with regard to the

processing of personal data and on the free movement of such data (OJ of 23 November 1995 No L.281, p.31)

lays down general principles to harmonise national rules.

47

Reding V., supra note 39.

48

European Commission, supra note 45.

13

On January 25th 2012 a proposal for a new Regulation49 was published which, if it

becomes law (perhaps within the next two years), will replace the current DPD. Since the

proposed Regulation will have a direct effect it is expected to achieve greater harmonisation

of the national legislations of the Member States50 by tackling any existing inconsistencies

related to application of the data protection rules.

The new Regulation introduced in Article 17 a “right to be forgotten and to erasure”.

This provision generated some (predictably) controversial responses. On the one hand,

Rosen, commenting on the new proposal, was of the opinion that the right to be forgotten

“represents the biggest threat to free speech on the Internet in the coming decade”51. On the

other hand, concerns were raised that the way the right to be forgotten had been presented in

the EC‟s proposed Regulation could mislead individuals by falsely raising their expectations

on the actual enforcement of the right and its effectiveness52. Nevertheless, for the first time

we are presented with a solid legislative proposal on a potential right to oblivion, which for

the sake of consistency we will be discussing through the wording of the proposed

Regulation, notwithstanding that the enforcement implications of this right are still

surrounded by heavy fog.

The new proposal is introduced on the assumption that under the current DPD, there

is no absolute right to be forgotten. However, “data subjects do have a right to require

irrelevant, inaccurate or out of date data to be deleted as well as a right to object to the use

of information by others, both subject to certain exceptions53. Therefore, considering that

49

European Commission, „Proposal for a Regulation on the protection of individuals with regard to the

processing of personal data and on the free movement of such data (General Data Protection Regulation)‟,

Brussels, 25.1.2012, COM(2012) 11 final.

50

Graham R., „Prepare for European data protection reform‟ (2011/12) Computers & Law, 22(5), pp.22-23.

51

Rosen J., „The Right to Be Forgotten‟ (2012), 64 Stanford Law Review Online, pp.88-92, 88.

52

Kuschewsky M., supra note 33 at 10.

53

Finlay A., „Right to be forgotten: will a broad new right work?‟ (2011) Data Protection Law & Policy, 8(1),

p. 14-16. See also Article 2(d) of Directive 95/46/EC.

14

the substance of a right to be forgotten is provided by the current data protection framework54

it is reasonable to ask what is new about this proposed right?55

4.2 The right to erasure

Article 17 of the proposed Regulation seems to be providing, in principle, a right to delete

personal data, i.e. “any information related to the data subject”56. More specifically,

according to Article 17(1), individuals (“data subject”) have the right to request from the

“data controller” the erasure of personal data relating to them and the abstention from

further dissemination of such data mainly: a) if the data are no longer necessary in relation to

the purposes for which they were controlled/processed or b) the consent on which the

processing was based has been withdrawn. The fact that search engines would be obliged to

delete data following claims submitted by users has generated fears that this could transform

Google and other application into “censor-in-chiefs”57. As a response to this argument it has

been suggested that “given the quantity of user-generated content, […] the speed at which 

information is produced, [the size and] the anonymity of most posters, and the enduring

nature of the violations, the most practical and efficient solution is to appeal to ISPs for help

and intervention”58, a scheme that would potentially solve jurisdictional difficulties as well.

In any case, it is submitted that controllers are already forced to undertake certain aspects of

such a role, including in their duty to delete data in many cases of profound violations of

fundamental rights, e.g. instances of child pornography.

54

Koops B.-J., supra note 28 at 237.

55

Ustaran E., „Forget me not‟ (2010) Data protection Law & Policy, 7(12), p.3. For a summary presentation of

the new proposal see Birnhack M., „Reverse Engineering Informational Privacy Law,‟ (February 10, 2012), p.

34-35.

56

Article 4(2)

57

Rosen J., supra note 51 at 92.

58

Cheung A. SY., „Rethinking Public Privacy in the Internet Era: A Study of Virtual Persecution by the Internet

Crowd‟ (2009) Journal of Media Law, Vol.2, pp.191-217, 215.

15

In addition to the above, the data controller will be obliged to remove the relevant

personal data if the individual exercises the “right to object” to their processing59, including

data processing for marketing purposes60. In answering such an objection, the data controller

would have to “demonstrate compelling legitimate grounds for the processing which

override the interests or fundamental rights and freedoms of the data subject”61 if the process

is deemed necessary under certain conditions.

4.3 Particular limitations and exceptions to the right to erasure

The right to erasure is not introduced as an absolute right, as certain exceptions to its

application are provided. More specific, Article 17(3) provides that the retention of the data

might be deemed necessary if the protection of other interests/rights/freedoms prevails such

as the exercise of the right of freedom of expression, the protection of public health and

where “the processing of personal data [is] solely for journalistic purposes of artistic or 

literary expression”62. Further limitations are provided by Article 17(4).

Finally, perhaps the most fundamental exception to the application of the proposed

Regulation constitutes the so-called “household exception” according to which the provisions

will not apply to the processing of personal data by a natural person without any gainful

interest in the course of its own exclusively personal or household activity”63.

4.4 Where is the right to be forgotten?

The proposed Regulation does not provide any clear or descriptive definition of what might

constitute the right to be forgotten, and how it potentially differs from the right to erasure,

even though the EC had acknowledged that there were concerns that the right to be forgotten

59

Article 19.

60

Article 19(2).

61

Article 19(1).

62

Article 80.

63

Article 2(1)(d).

16

is not “widely understood”, and that this right “and the existing right to delete one’s own 

personal data are similar”64, a fact that should normally have led to “a clear distinction 

between the two rights”65 being drawn.

The relevant EC Communication66 refers to the right to be forgotten in the online

environment as “the right [of individuals] to have their data deleted if they withdraw their

consent and if there are no other legitimate grounds for retaining the data”. If this

interpretation is adopted then the right to be forgotten is tautologous with the right to erasure

or, in Aristotle‟s terms, both of them constitute things univocally named (see section 3.1).

In addition, paragraph 54 of the proposed Regulation presents the right to be forgotten

as a mere extension of the right to erasure. In the actual wording: “to strengthen the ‘right to 

be forgotten’ in the online environment, the right to erasure should also be extended in such a

way that a controller who has made the personal data public should be obliged to inform

third parties […]”.

Considering this, one possibility would be to interpret the right to be forgotten as a

mere extension to the right to erasure. Under this approach the right to be forgotten would

logically constitute what is left of Article 17 when we exclude the provisions that relate to the

obligation of the data controller to delete personal data following a justified claim by a user.

In that case, the right to be forgotten is summarised in Article 17(2) which provides that, in

case the data controller has made the personal data public, it will be obliged to take all

reasonable steps, including technical measures, to inform third parties which are processing

such data of the erasure request made by the individual, and in case the data has been

published under the authorisation of the data controller the latter would be held responsible.

64

See also European Digital Rights (EDRi), „Response to EC consultation on the review of the Data Protection 

Directive‟, 15.01.2011., p.8.

65

EC Staff Working Paper, „Impact Assessment Accompanying the proposed Regulation‟, SEC(2012) 72 final.

66

EC Communication, supra note at 6.

17

However, if we read the Explanatory Memorandum of the proposed Regulation, the

EC seems to provide that the extension of a right to erasure is only one of the “conditions of 

the right to be forgotten” provided in Article 17: “Article 17 [...] provides the conditions of

the right to be forgotten including the obligation of the controller which has made the

personal data public to inform third parties on the data subject’s request to erase any links

to, or copy or replication of that personal data”67. Undoubtedly, if we adopt this view, and

considering that the rest of the provisions refer to the right to erasure, then it is reasonable to

ask: which are these “other conditions” of the right to be forgotten, that are supposed to be

provided by Article 17? Logically, if all the other conditions refer to the right to erasure then

the right to be forgotten would simply constitute a tautology of the right to erasure, with the

exception of the extension of Article 17(2) mentioned above.

Considering the above, could it be true that “the right to be forgotten”, as presented

in the new EU proposed Regulation, does not in fact add much more than a “shiny” title to

Article 17?

4.5 Preliminary conclusions

Firstly, as Koops rightly observed68 in relation to the current DPD, the new proposal focuses

on providing a right to erase data that are no longer necessary, which raises concern for when

and why the right can be invoked since an individual would most likely not be informed

about the existence and the use of the outdated data before the harm has already occurred.

Secondly, all rights provided in the proposed Regulation would not apply in

“household situations” (Article 2(1)(d)) as is the case with the current DPD, which may

67

Paragraph 3.4.3.3. of the Explanatory Memorandum of the proposed Regulation.

68

Koops B.-J., supra note 28 at 244.

18

result in the exclusion from any protection framework of a great number of cases such as

those involving an individual‟s social-networking contributions69.

Finally, the new proposal maintains the current conceptualisation of data protection as

a control-based mechanism which itself implies that the proprietary approach on personal

data prevails, as mentioned above in section 3.2.

5. Conceptualising a human right to oblivion

5.1 Oblivion as a right

A number of attempts have been made to conceptualise the right to oblivion within the

existing legal mechanisms. Firstly, a tort-based approach by analogy to the right to restitution

for harm seems unable to stand as it fails to provide sufficient protection. Indeed, it would be

difficult for an individual to prove the conditions required, as in that case he would need to

know with certainty which other person/company held information and to be able to prove

that from such circumstances he has suffered harm.70

Secondly, a property-based71 mechanism has been presented which argues for an

ownership conceptualisation of this right, i.e. that an individual, as we mentioned above, will

have a kind of control-right of the data, causing an “erga omnes effect”72 even after the

information has left his/her hands. Similarly, the copyright-based approach73 which falls

close to property-based perspective, offers a bundle of rights protection74 regardless of

whether the information has been publicly exposed. As illustrated, the fact that I have

exposed my book to someone does not eliminate the rights I have on the book. since it would

69

Koops B.-J ibid. at 238.

70

Conley C., „The Right to Delete‟ (2010) AAAI Spring Symposium Series, North America, p.55.

71

See for example Schwartz P., „Property, Privacy and Personal Data‟, (2004) Harvard Law Review, Vol. 117,

No.4, pp.2056-2128, 2057 (and the references provided).

72

Koops B.-J., supra note 28 at 247.

73

See for example Samuelson P., „Privacy As Intellectual Property‟, (2000) Stanford Law Review, Vol. 52, pp.

1125-1173.

74

Conley C., supra note 70 71 at 55.

19

be illegal to photocopy it cover to cover and sell it to third parties75. However, it is suggested

that this conceptualisation cannot apply efficiently in the framework of the right to oblivion

since, as we will argue, the scope of such a right should not be restricted merely to protecting

the data but also to safeguarding the well-being of an individual. In order to succeed this, it

requires the protection of a number of human goods from any potential threats, even in cases

where there has not been any prima facie unlawful interference with a person‟s data in the

traditional approach (e.g. the recent cases in Spain76 where Google has been asked to prevent

users‟ access to sites that contain defamatory content about an individual).

5.2 Oblivion as a human right

Feinberg defined a right as a claim first against specifiable individuals and second with

reference to their action or omission on one‟s behalf.77 Naturally, the question arises: “When 

does someone‟s interest become a justified claim upon others?” Tasioulas argues that our

interests ground rights only if they are weighty enough to justify the imposition on others of

duties to respect those interests78. Therefore, the actual difference between a right and mere

interest on which a right might be based is the fact that the content of a right (and particularly

a human right) is also the content of a corresponding duty79.

For the purpose of this article we may endorse the spirit of the broader definition

given by Raz80, that a concept/interest may be regarded as human right: a) if it can be shown

that there is an individual interest which according to certain social conditions should be

75

Solove D. J., The future of reputation gossip, rumour, and privacy on the internet (2007), p. 185.

76

Alonso N., „The right to be forgotten: a look at recent Spanish cases‟ (2011) Data Protection Law & Policy,

8(10), p.4.; also „The “right to be forgotten”: its recent application in Spain‟ (2001) Data Protection Law &

Policy 8(3), pp.10-11.

77

Feinberg J., Rights, Justice and the Bounds of Liberty (1980) Princeton University Press, chs. 6,9-11.

78

Tasioulas J., „Human Rights, Universality and the Values of Personhood: Retracing Griffin‟s Steps‟ (2002)

European Journal of Philosophy, 10:1, pp. 79-100, 96.

79

Tasioulas, „Taking Rights out of Human Rights‟ (2010) Ethics, 120, pp. 647-678; Griffin, On Human Rights

(2008), Oxford University Press, p.97.

80

Raz J., „Human Rights Without Foundations‟ (2007), Oxford Legal Studies Research Paper No. 14/2007,

p.18.

20

satisfied (moral right), and b) when the conditions are appropriate to create a duty to

protect/respect/promote the interests of individuals identified in (a)81. Logically, if reaching

the threshold of rights requires the existence of an important interest, then to enter the world

of human rights something more should be required. Griffin rightly suggests that only human

interests of special importance should be ring-fenced with the notion of human rights.82

If we adopt this view then a potential human right to oblivion could only be justified

if its underlying rationale was the protection of such a fundamental value, namely that was so

important to human nature as to impose corresponding duties to others to respect this value.

However, Griffin argues further that to distinguish human rights from other interests, we

should apply the condition of “practicalities”, i.e. that human rights must depend, to some

extent upon their being “an effective, socially manageable, claim on others”83. For him,

“rights bear a close relationship with duties. What is true of duties, meaning that you cannot 

ask from someone to do the impossible, is equally true of rights”. If it is impossible for a

thing to be done, it is absurd to claim it as a right84.

Griffin‟s argument simply defends the view that a right should not be introduced if it

is in principle unenforceable. However, this is not necessarily true since if a right is

impractical or unnecessary at time T in society S, should it not be a human right?85 In my

view, the fact that a right, in certain circumstances cannot be adequately fulfilled for all does

not necessarily prevent it being a human right.86 Applying this view in relation to the right to

81

in this framework we are not concerned with Raz‟s third condition which refers to a state‟s lack of immunity

from interference regarding these matters.

82

Griffin J., „First Steps in an Account of Human Rights‟, (2001) European Journal of Philosophy, 9:3, pp.306-

327, 314.

83

Griffin J., „First Steps in an Account of Human Rights‟, ibid. at 315.

84

Cranston M., „Are There Any Human Rights?‟, (1983) Daedalus, MIT Press, Vol. 112, No. 4, Human Rights,

pp. 1-17,13.

85

Eddy K., „On Revaluing the Currency of Human Rights‟ (2006) University of Oxford, Department of Politics

and International Relations / Centre for the Study of Social Justice, Working Paper Series SJ003, p.6.

86

Tasioulas J., „Human Rights, Universality and the Values of Personhood: Retracing Griffin‟s Steps‟, supra

note 78 at 90.

21

oblivion, I suggest that it should be conceptually approached in the light of the modern social

world and not outside the notion of present human behaviour. The fact that some countries

are not so technologically advanced as to generate the need for a right to oblivion or chose

not to apply it for any other reason, does not require us to exclude such a right from the

concept of human rights in principle or to reject its existence, providing it fulfils Raz‟s above

mentioned conditions.

To conclude, if we want to include the right to oblivion among human rights, the

main question is whether the right to oblivion protects such individual interests/values of

special importance, related to human existence, as to result in the creation of duties to others

to protect it.

6. A systematic attempt to define the scope of a human right to

oblivion

A concept cannot be discussed without first defining its nature and substance. As the right to

oblivion has not yet taken a solid form within the academic debate, it is often discussed as a

right, mere interest, value or a policy aim87. This study argues for a right to oblivion as a

legal right and more particularly a human right. Based on this principle, the logical sequence

would be to ask what the scope of such a right might be.

Despite the broad disagreement on its definition, most authors agree that a right to

oblivion in the digital world aims in principle to grant an individual control not only of data

related to unfortunate past events or the ability to prevent the publication of data in libel

cases, but in fact to all data88 in the digital world (data stored on the Web as well as

organisational databases): i) generated by him (“digital footprints”), or ii) generated by

others but relating to him (“data shadows”), e.g. search questions, purchases etc.

87

Koops B.-J., supra note 28 at 230; also Leaton Gray J., „A right to be forgotten: the far-ranging implications‟

(2011) Data Protection Law & Policy, 8(5), pp.14-16.

88

Murata K., Orito Y., supra note 8 at 192.

22

6.1 The relationship between the right to oblivion and the right to

privacy

A debate related to personal data seems prima facie to be related to the well-established

discussion on people‟s right to a private life. Technology seems to be forcing us to reconsider

and perhaps deepen our understanding of the nature of privacy as a human right as well to

explain “why we are concerned about losses of privacy”89. A number of cases have recently

appeared that seem not to fall within the traditionally perceived domain of privacy as they: a)

involve the collection, use or disclosure of information that does not seem prima facie to be

sensitive‟ and b) concern circumstances where the information seemed already to have been

in the broad public domain90.

More specific, there is evidence that the UK Courts have recently started to embrace a

more protective approach, beyond the traditional breaches of privacy, which seem to relate to

both the above mentioned situations91. However, despite the promising decisions in both

Campbell92 and Rowling93 it is perhaps safe to conclude that a UK court might still be

reluctant to accept without any further considerations that “the mere taking of one‟s 

photograph in public, the exposure to observation, and the subsequent dissemination of such

information to the wider public”94 constitute a breach of the right to privacy.

On the other hand, the European Court of Human Rights (“ECtHR”) has taken a

different approach by using Article 8(1) of ECHR, i.e. “everyone has the right to respect for 

89

Austin L., supra note 42 at 121.

90

Austin L., supra note 42 at 120; also Nissenbaum H., „Protecting Privacy in an Information Age: The Problem

of Privacy in Public‟ (1998) Law & Philosophy, Vol. 17, p.559.

91

Basil Markesinis, Colm O’Cinneide, Jörg Fedtke, Myriam Hunter-Henin, „Concerns and Ideas about the

Developing English Law of Privacy (And How Knowledge of Foreign Law Might Be of Help)‟, (2004) The

American Journal of Comparative Law, Vol. 52, No. 1, pp. 133-208,148-150.

92

Campbell v MGN Ltd [2004] UKHL 22.

93

David Murray v Express Newspapers and Big Pictures Ltd [2007] EWHC 1908 (Ch).

94

Cheung A. SY., supra note 58 at 201.

23

his private and family life”. More particularly, following Peck v UK95 and Von Hannover v

Germany96, according to the ECtHR, “privacy also concerns individual acts that take place

in public, where the boundary between what is public and what is private becomes

immediately blurred”97, while in parallel, “information at issue does not need to be sensitive, 

embarrassing or humiliating in order to qualify for protection”98.

6.2 The right to privacy as a multidimensional concept

We have mentioned in section 3.2 that the current data-protection scheme is based upon the

idea that a person should be able to control the information related to him; in other words that

“knowledge about me is my property”99. Ramsay argues that this constitutes a very narrow

understanding of what privacy is in reality, as there is more to privacy than controlling

information, as for example in cases where a person believes he is spied upon or where media

is focused upon his life100. In such situations he argues that a person does not seek to control

the flow of information but simply to “be let alone”101. In addition, he suggests that

autonomy itself, as the value of being able to develop and retain control over life and choices,

cannot be the sole reason we need privacy as there are cases where we “spy [on] someone to

protect their own autonomy […] or to protect the autonomy of all”102 as well as cases where

for example someone is spied upon but is unaware of this and therefore his control over his

life and choices is not threatened103. At this point we need to note Weber‟s suggestion that the

95

Peck v United Kingdom, (Case 44647.98) [2003] EMLR 15 (ECtHR).

96

Von Hannover v Germany, (2005) 40 EHRR 1.

97

Cheung A. SY., supra note 58 at 194; Markesinis B., O’Cinneide C., Fedtke J., Hunter-Henin M., supra note

91 at 162-163.

98

Cheung A. SY., supra note 58 at 208.

99

Ramsay H., „Privacy, Privacies and basic needs‟ (2010) The Heythrop Journal, 51(2), pp.288-297, 288.

100

Ramsay H., ibid. at 289.

101

Warren S., Brandeis L., „The Right to Privacy‟ (1890) Harvard Law Review, Vol. 15, No.5, pp. 193-220.

This view implies that the “right to be let alone” is merely only one aspect of the right to privacy.

102

Ramsay H., supra note 99 at 289.

103

Ramsay H., ibid. at 289-290.

24

“rightholders‟ autonomy”104 should perhaps be the central idea when discussing potential

threats to privacy rights in the digital world, as well as Bernal‟s105 view that besides the

actual threat to an individual‟s autonomy, a potential direct threat to autonomy106 should

equally be taken into account that could arise from people‟s feelings when under the threat of

surveillance and/or having their personal information potentially misused.

Recently, a number of attempts have been made to explain how privacy should be

approached in the context of ongoing technological evolution. Several authors have argued

that privacy should be understood as a “cluster concept”107, i.e. that we should cluster

together “certain of the conceptions instead of considering only one single conception”108. In

other words, instead of trying to argue whether privacy aims to safeguard values such as

“secrecy”, “control of personal information”, and “personhood” (e.g. individuality,

autonomy, dignity and other factors)109 we should be aiming to claim an

“interrelationship”110 of different values from a “multidimensional approach”111. Hugl112

summarises such an approach attempted by Burgoon et al.113, who defines privacy as “the 

ability to control and limit physical, interactional, psychological and informational access to

one‟s group or to the self”. More specifically, in this view: “a) the physical dimension refers

to how physically accessible an individual is to others; b) the psychological dimension looks

104

Weber R.H., „The Right to Be Forgotten: More than a Pandora‟s Box?‟ (2011) JIPITEC, Vol.2, pp. 120-130,

128.

105

Bernal P. A., „A Right to Delete?‟, supra note 20 at 5.

105

Bernal P. A., ibid. at 5.

106

Ausloos J., supra note 17 at 33.

107

Hugl U., „Approaching the value of Privacy: Review of theoretical privacy concepts and aspects or privacy

management‟ (2010), AMCIS 2010 Proceedings, Paper 248, p. 4-5.

108

Hugl U., ibid. at 4.

109

Solove D. J., „Conceptualising privacy‟, (2002) California Law Review, Vol. 90, pp.1087-1156.

110

Hugl U., supra note 107 at 6.

111

Burgoon J. K., Parrot R., LePoire, B. A., Kelley D. L., Walther J. B. and Perry D., „Maintaining and restoring

privacy through communication in different types of relationship‟ (1989) Journal of Social and Personal

Relationships, Vol. 6, pp.131-158.

112

Hugl U., supra note 107 at 4.

113

Burgoon J. K. et al., supra note 111.

25

to an individual‟s right to decide with whom she or he shares personal information […]; c)

the social dimension means the ability to control social interactions […] and d) the

informational privacy dimension refers to an individual‟s right to reveal personal 

information to others”114.

Along the same lines, Solove rightly observes that “not all privacy problems are the 

same, and different conceptions of privacy work best in different contexts. Instead of trying to

fit new problems into old conceptions, we should seek to understand the special

circumstances of a particular problem”115. Having identified the relevant circumstances we

can then understand which dimension of privacy this disruption belongs to, which will then

reveal the types of human goods that are threatened.

6.3 The right to privacy as an instrumental good in the light of

Aristotelian philosophy

Having observed that privacy itself does not seem to be aimed by individuals for its own sake

Ramsey suggests that “[p]rivacy may not be one of the most basic of human goods not one

of the goods which actually constitute our well being; but it is one of the strategically vital,

„second order‟ goods without which our chances of securing well-being are dramatically

reduced”116. His conceptualisation of privacy is based upon Aristotle‟s idea that there are two

kinds of objective human goods. On the one hand, there are “intrinsic goods117

(«architektonika αgatha») which are sought by people for their own sake and not in order to

achieve/gain something else. On the other hand, there are “instrumental goods”118, i.e. the

ones that we aim to achieve not for their own sake but so as to gain another greater good.

Based on this conceptualisation of human goods, Ramsay rightly argues that privacy would

114

Hugl U., supra note 107 at 4.

115

Solove D. J., „Conceptualising privacy‟, supra note 109 at 1147.

116

Ramsay H., supra note 99 at 293.

117

(«αρχιτεκτονικά αγαθά»); Aristotle, Nicomachean Ethics, Book A, 1094a18-22.

118

Ibid.

26

never be pursued for its own sake but constitutes rather “one of the pre-conditions that must

be satisfied if persons are to function, and function well, in respect of their most important

capacities”119.

Based on the above, Ramsey seems to be reaching the same conclusion as Tasioulas

(see section 5.2) but from a different path. Ramsay argues that, assuming the idea of objective

human goods is true, then when there is a human need to obtain a value necessary for “our 

natural functioning and flourishing”120, in other words a need to obtain an “instrumental 

good” which, once achieved, will allow us to acquire a basic (intrinsic) good, such as for

example knowledge, health, friendship etc., then “the rights-claim to what is needed can

accurately be described as a „human right‟”121. It is submitted that this conceptualisation of

privacy based on Aristotle‟s philosophy on human goods seems paradoxically122 to be hidden

within the text of the current EU DPD which provides that “data-processing systems are

designed to serve man; […] respect their fundamental rights and freedoms, notably the right

to privacy, and contribute to […] the well-being of individuals”123.

6.4  The right to oblivion as an instrumental good and a specific

expression of a multidimensional right to privacy

Having described in sections 6.2-6.3 the two main categorical characteristics of privacy, as a

multidimensional concept and as an instrumental good, we now turn to examine the

relationship between the right to oblivion and the right to privacy.

Having considered the broad debate in the literature, a summary of which was

presented in section 2 of this essay, Koops identified three possible conceptualisations of the

right to oblivion: The first is a more widely accepted demand for personal data to be deleted

119

Ramsay H., supra note 99 at 293.

120

Also Finnis J., Natural Law and Natural Rights, 9th ed. (1996) OUP, p.205.

121

Ramsay H., supra note 99 at 294.

122

Oddly enough, as we have shown, the DPD  provisions reflect a pure “controlbased” perception of privacy.

123

EU Data Protection Directive 1995, s.2.

27

in due time (the new EU proposal discussed in section 4 is an example of such a perspective).

The second is what he called a “clean slate” perspective, i.e. “that outdated data should not

be used against people”. This approach could allow the right to oblivion to “be translated 

into sector-specific and context-specific norms specifying which online information should be

included or excluded in decision making”124 (e.g. employment, public administration etc.).

Finally, he presented an alternative “clean slate” perspective on the right to oblivion which

refers to the need for an individual to feel unrestrained in expressing himself, which itself

would then guarantee his self-development.125 In Koops‟s own words, this third aspect “aims 

at preventing people from suffering unduly from information about their past, with

connections to the right to privacy and identity construction”126. He argues that the first two

perspectives could potentially constitute the content of a legal right; however, he considers

that the third one could only have the character of a mere interest or value127.

Koops‟s conceptualisation of the right to oblivion seems satisfactorily to cover the

main broad areas which have been argued to fall under this concept, even though his

definitions seem to partly overlap and therefore should be seen as complementary to each

other. In our view, all three conceptual categories mentioned above can be conceptualised

under a multidimensional right to privacy, and by doing so, all underlying values should be

legally protected.

More specifically, the first approach which summarises the right to delete/erasure, as

discussed in sections 4.2-4.3, mainly refers to the need to restrict informational access of

third parties to certain personal information, which according to Burgoon at all128 constitutes

one of the dimensions of the right to privacy. This conceptualisation seems to reflect the

124

Koops B.-J., supra note 28 at 252.

125

Koops B.-J., ibid. at 254.

126

Koops B.-J., ibid. at 253.

127

Koops B.-J., ibid.

128

Burgoon et al., supra note 111.

28

traditional understanding of a right to privacy as a control-based mechanism (see section

3.2).

The second perspective seems to refer to an individual‟s need to avoid being

sanctioned, for example in his professional environment, in cases where information has been

obtained about his past that is irrelevant to assessing his present and future potential. This

need falls, prima facie, mostly under the social dimension of privacy, mentioned by Burgoon

et al.129, as it protects an individual‟s freedom to determine his social relationships with third

parties.

Finally, the third perspective, in substance, falls both under the psychological as well

as the social dimensions of privacy, as understood by Burgoon et al.130. By referring to the

need to protect individual self-development and personal identity, this conceptualisation of

the right to oblivion aims to safeguard individual autonomy and dignity in cases where,

despite the absence of any clear-cut unlawful use of personal information, an individual‟s

rights are nevertheless violated (e.g. where a person feels that is under surveillance by a

social network or a search engine which collects data related to his actions, despite these data

not yet having been used). Having described privacy as an instrumental good that aims to

allow individuals to enjoy intrinsic goods, among which we have identified autonomy, and

taking into account that this perspective of the right to oblivion aims to protect this exact

value, i.e. personal autonomy/development, it can reasonably be argued that a claim against a

threat to this value should be regarded as a human right claim.

Consequently, based on the above, it seems that the right to oblivion, at least as

conceptualised in the broadest possible terms (as provided by Koops), could be regarded as

an expression of the multidimensional right to privacy, and therefore a human right. In

129

Burgoon et al., ibid.

130

Burgoon et al., ibid.

29

addition, the right to oblivion is also an instrumental good, i.e. a mean to achieve a greater

intrinsic good, since in fact all three conceptualisations of the right seem to be aiming to

protect basic human goods that are necessary for human well-being, including autonomy,

dignity and self-development.

7. Addressing the potential threat of human rights inflation

As O‟ Neil explained, “[o]ne of the most effective ways to destroy a concept is through the

process of conceptual inflation: First, expand the ambit of the concept to include

contradictory elements. Then, resolve the contradictions you have created through insistence

that none of the elements must be weighed off against the others. Finally, systematically and

incrementally work to favour the bogus elements of the concept until the original meaning is

totally lost”131.Significant arguments have been presented by Maurice Cranston132 that such a

fate could befall the concept of human rights through what is called human rights inflation.

To approach this concept we need in principle to endorse Griffin‟s view that human

rights are rights not to anything that merely promotes human good or flourishing, but simply

what is needed for human status. They are protections of human life, not of a good or happy

or perfected human life133. Consequently, if people have human rights to everything which

will or may improve the quality of their life, then the concept of human rights would not be

exceptional134 and the language of rights would become redundant135. In other words, if the

concept of human rights is to be useful, we must distinguish it from other desirable social

objectives.136

131

O‟ Neill B., „Inflating Away Our Human Rights‟, December 14 2009.

132

Cranston M., „Are there Any Human Rights?‟, supra note 84.

133

Griffin J., „First Steps in an Account of Human Rights‟, supra note 82 at 312.

134

Raz J., supra note 80 at 7.

135

Griffin J., „First Steps in an Account of Human Rights‟, supra note 82 at 312.

136

Freeman M., Human Rights (2002) Polity, p.6.

30

If we adopt this view on the nature of human rights, then Maurice Cranston‟s concern

that positing too many rights will lead to rights inflation and to a devaluation of the currency

of rights should be considered with care. According to Cranston, a human right, by

definition, is something that no one, anywhere, may be deprived of without a grave affront to

justice. There are certain actions that are never permissible, certain freedoms that should

never be invaded, certain things that are sacred. If rights of different order are introduced,

everything is immediately slackened: the sharp, clear imperative becomes a vague wish137.

Considering the above, we should ask whether the introduction of a right to oblivion, as

conceptualised so far, could potentially cause further inflation of human rights.

There is a significant concern that human rights inflation trivialises rights, imposes

unreasonable burdens on duty bearers and excessive constraints on freedom, restricts the

scope of democratic politics, limits the role of toleration and pluralism, and undermines

valuable social relations.138 Critics of the right to oblivion have presented a number of

arguments against its status as a human right (see sections 2), including: a) that the nature of

the right as presented would in fact be unenforceable; b) that there seem to be cases where

the free flow of information is beneficial whether to the individual or the society139 (e.g.

public security, health); and c) that introducing this right would significantly restrain the

exercise of other rights and freedoms.

In my opinion, the enforcement argument can potentially be addressed by uniform

legislative initiatives (e.g. at EU level) or by international courts‟ jurisprudence (e.g. ECtHR).

Furthermore, we have previously argued in section 4.2 that a claim against the ISPs may

solve enforcement and jurisdictional challenges, at least with regards to use of online

137

Cranston M., „Are there Any Human Rights?‟, supra note 84 at 12.

138

Freeman M., Human Rights, supra note 136 at 84-85.

139

Hugl U., supra note 107 at 3.

31

personal data, a mechanism that was also adopted in the new EU proposal140 (see sections

4.2-4.4). The two remaining arguments, have been previously addressed while discussing the

new EU proposal, where it was shown that the potential exercise of a right to oblivion, as is

the case with the right to privacy, is not an unqualified right, but is subject to strict limitations

and exceptions (see section 4.3). Besides, as the Court of Justice of the EU has ruled141, the

right to the protection of personal data is not an absolute right but should be considered in

relation to its function in society, and a balance should be applied with the other fundamental

rights and in line with the principle of proportionality142.

The potential negative effects from adopting a strict approach to the threat of “human 

rights inflation” have raised opposite concerns on the danger of conceptualising one static,

traditional list of human rights objects, a view that would ignore the clear fact of social

change in general. Orend observes that our tendency, as we become more advanced, is to

believe more and more that better things are required to ensure minimally decent treatment

for all143. Similarly, as Tasioulas suggests, human rights are those possessed in virtue of

being human and inhabiting a social world that is subject to the conditions of modernity144.

Therefore, human rights should not be conceptualised as a static object but rather as a living

body which evolves through time and depends upon the needs of society.

Considering the above, the right to oblivion does not in our view devalue the notion of

a human right or have any potential to cause further human rights inflation. In fact, the right

to oblivion should not be considered as a new right. Based on the conceptualisation of the

right to oblivion as an expression of the multidimensional right to privacy, it can be argued

140

Article 51(2) of the proposed Regulation.

141

Joined Cases C-92/09 and C-93/09 Volker und Markus Schecke and Eifert, judgment of 9.11.2010.

142

See EC Communication, „Safeguarding Privacy in a Connected World European Data Protection

Framework for the 21st Century‟, Brussels 25.1.2012, COM(2012) 9 final, p.9.

143

Orend B., Human Rights-Concept and Context (2002) Broadview Press, p.111.

144

Tasioulas J., „The Moral Reality of Human Rights‟, in T. Pogge (ed.), Freedom from Poverty as a Human

Right: Who Owes What to the Very Poor? (2007) OUP, pp.75-101, 76-77.

32

that, the right to oblivion is a mere response to the new threats imposed by the evolution of

ICT and aims to secure a fair balance between the need to use ICT in our lives without

jeopardising individuals‟ abilities to enjoy fundamental human goods.

8. Conclusions

I have tried to show that there seems to be no universal agreement, either on the substantial

constituting elements of the right to oblivion in the digital world, or on the term that should

be used to describe it. The disagreement on the conceptualisation of this right is a result of: a)

certain linguistic problems caused by the inconsistent and non-systematic use of fundamental

terms by academic authors; b) the absence of a holistic legislative initiative up to now, with

the exception of the EC‟s controversial recent proposal; and c) the absence of a systematic

attempt to define the scope and rationale of this right.

My view has been that oblivion has proven under certain circumstances to be a

necessity, or in different terms, an instrument, to safeguard human well-being. I have

attempted to show that a right to oblivion confirms the need for a paradigm shift in privacy,

leading to a multidimensional conceptualisation of the right to privacy. This conceptual

perspective does not require amending the ECHR145 in order to enforce an effective right to

oblivion nor does it compel us “to invent a new theory of privacy from the ground up in order

to deal with the threats posed by information technology”146. Therefore, the view that a right

to oblivion “can only be read very indirectly into the right to privacy as formulated in art. 

8(1) ECHR”147 is incorrect.

Finally, I concluded that any future legal and political initiatives concerning the right

to oblivion as an expression of the right to privacy should not be dogmatically attached on the

control-based understanding of personal information but rather constitute the outcome of an

145

Koops B.-J., supra note 28 at 247.

146

Austin L., supra note 42 42at 164.

147

Koops B.-J., supra note 28 at 247.

33

objective philosophical dialectic on the foundations of the nature of the human being well as

the conditions of human flourishing148. The right to oblivion is not a new right, only a

mechanism to address threats from the misuse of fast-growing technological innovations in

the digital world and to safeguard the core human privacy, and therefore it cannot cause by

its nature any potential further inflation of human rights.

* Total amount of words (excluding bibliography): 10952

148

Ramsay H., supra note 99 at 296.

34

Bibliography

Books

Chougias-Palaeologos Al., Philosophy of Law: 1. Fundamental Problematic  (2000) Ant. N.

Sakkoulas.

Feinberg J., Rights, Justice and the Bounds of Liberty (1980) Princeton University Press.

Finnis J., Natural Law and Natural Rights, 9th ed. (1996) OUP.

Flaherty D., Protecting privacy in surveillance societies: The Federal Republic of Germany,

Sweden, France Canada, and the United States (1989) Chapel Hill, NC: The

University of North Carolina Press.

Freeman M., Human Rights (2002) Polity.

Griffin, On Human Rights (2008), Oxford University Press.

Mayer V., Delete – The Virtue of Forgetting in the Digital Age, (2009) Princeton University

Press.

Morin J.-H., Towards Socially-Responsible Management of Personal Information in J.G.

Breslin et al. (eds) Social Networks, BlogTalk 2008/2009, LNCS 6045, Springer

(2010).

Orend B., Human Rights-Concept and Context (2002) Broadview Press.

Solove D. J., The future of reputation gossip, rumour, and privacy on the internet (2007).

Tasioulas J., „The Moral Reality of Human Rights‟, in T. Pogge (ed.), Freedom from Poverty

as a Human Right: Who Owes What to the Very Poor? (2007) OUP.

Vermesa O., Friess P. (Eds.), Internet of Things Global Technological and Social Trends,

(2011) River Publishers, Denmark.

Westin A. F. and Baker M. A., Databanks in a free society: Computers, record keeping, and

privacy (1972) New York: Quadrangle/New York Times Book Company.

Academic Articles

Alonso N., „The right to be forgotten: a look at recent Spanish cases‟ (2011) Data Protection

Law & Policy, 8(10).

―― „The “right to be forgotten”: its recent application in Spain‟ (2001) Data Protection Law

& Policy 8(3), pp.10-11.

Ausloos J., „The „Right to be Forgotten‟ – Worth Remembering?‟ (2012) Computer Law &

Security Review, 28(2), pp.143–152.

35

Austin L., „Privacy and the Question of Technology‟ (2003) Law and Philosophy, Vol. 22,

No.2, pp.119-166.

Bannon L. J., „Forgetting as a feature, not a bug: the duality of memory and implication for

ubiquitous computing‟ (2006) CoDesign, Vol.2, No.1, pp.3-15.

Bernal P. A., „A Right to Delete?‟, (2011) European Journal of Law and Technology, Vol. 2,

Issue 2, p.2.

Birnhack M., „Reverse Engineering Informational Privacy Law,‟ (February 10, 2012), p. 34-

35.

Blanchette J. F., „Johnson D.G., Data retention and the panoptic society: The social benefits

of forgetfulness‟ (1998), ACM Policy ‟98 Conference, LSE.

Brimsted K., „The right to be forgotten: can legislation put the data genie back in the bottle?‟

(2011), Privacy & Data Protection, Vol. 11(4), pp. 6-8.

Burgoon J. K., Parrot R., LePoire, B. A., Kelley D. L., Walther J. B. and Perry D.,

„Maintaining and restoring privacy through communication in different types of

relationship‟ (1989) Journal of Social and Personal Relationships, Vol. 6, pp.131-

158.

Cheung A. SY., „Rethinking Public Privacy in the Internet Era: A Study of Virtual

Persecution by the Internet Crowd‟ (2009) Journal of Media Law, Vol.2, pp.191-

217.

Conley C., „The Right to Delete‟ (2010) AAAI Spring Symposium Series, North America.

Cranston M., „Are There Any Human Rights?‟, (1983) Daedalus, MIT Press, Vol. 112, No. 4,

Human Rights, pp. 1-17.

Eddy K., „On Revaluing the Currency of Human Rights‟ (2006) University of Oxford,

Department of Politics and International Relations / Centre for the Study of Social

Justice, Working Paper Series SJ003.

Finlay A., „Right to be forgotten: will a broad new right work?‟ (2011) Data Protection Law

& Policy, 8(1),  p. 14-16.

Graham R., „Prepare for European data protection reform‟ (2011/12) Computers & Law,

22(5), pp.22-23.

Griffin J., „First Steps in an Account of Human Rights‟, (2001) European Journal of

Philosophy, 9:3, pp.306-327.

Hugl U., „Approaching the value of Privacy: Review of theoretical privacy concepts and

aspects or privacy management‟ (2010), AMCIS 2010 Proceedings, Paper 248.

36

Kierkegaard S., et al., „30 years on – The review of the Council of Europe Data Protection

Convention‟ (2011) 108, Computer Law & Security Review 27, pp.223-231.

Koops B.-J., „Forgetting footprints, shunning shadows. A Critical Analysis of the “Right to

Be Forgotten” in Big Data Practice‟, (2011) Scripted, Vol.8, Issue 3.

Kuschewsky M., „The right to be forgotten – the fog finally lifts‟ (2012) Privacy & Data

Protection, Vol.12(3), pp.10-12.

Leaton Gray J., „A right to be forgotten: the far-ranging implications‟ (2011) Data Protection

Law & Policy, 8(5), pp.14-16.

Lievrouw L. A., „The Next Decade in Internet Time: Ways Ahead for New Media Studies,

presented‟ (2011) in A Decade in Internet Time: Symposium on the Dynamics of

the Internet and Society, Oxford Internet Institute, 21-24 September 2011.

Markesinis B., O’Cinneide C., Fedtke J., Hunter-Henin M., „Concerns and Ideas about the

Developing English Law of Privacy (And How Knowledge of Foreign Law

Might Be of Help)‟, (2004) The American Journal of Comparative Law, Vol. 52,

No. 1, pp. 133-208.

Murata K., Orito Y., The right to forget/be forgotten, (2001) in Proceedings of CEPE, 6,

pp.192-201.

Nissenbaum H., „Protecting Privacy in an Information Age: The Problem of Privacy in

Public‟ (1998) Law & Philosophy, Vol. 17.

Nys H., „Towards a human right “to be forgotten online”?‟ (2011) European Journal of

Health Law, 18(5), pp.469-475.

Ramsay H., „Privacy, Privacies and basic needs‟ (2010) The Heythrop Journal, 51(2), pp.288-

297.

Raz J., „Human Rights Without Foundations‟ (2007), Oxford Legal Studies Research Paper

No. 14/2007.

Rosen J., „The Right to Be Forgotten‟ (2012), 64 Stanford Law Review Online, pp.88-92.

Samuelson P., „Privacy As Intellectual Property‟, (2000) Stanford Law Review, Vol. 52, pp.

1125-1173.

Schwartz P., „Property, Privacy and Personal Data‟, (2004) Harvard Law Review, Vol. 117,

No.4, pp. 2056-2128.

Solove D. J., „Conceptualising privacy‟, (2002) California Law Review, Vol. 90, pp.1087-

1156.

37

Tasioulas J., „Human Rights, Universality and the Values of Personhood: Retracing Griffin‟s

Steps‟ (2002) European Journal of Philosophy, 10:1, pp. 79-100.

―― „Taking Rights out of Human Rights‟ (2010) Ethics, 120, pp. 647-678

Ustaran E., „Forget me not‟ (2010) Data protection Law & Policy, 7(12).

Warren S., Brandeis L., „The Right to Privacy‟ (1890) Harvard Law Review, Vol. 15, No.5,

pp. 193-220.

Weber R.H., „The Right to Be Forgotten: More than a Pandora‟s Box?‟ (2011) JIPITEC,

Vol.2, pp. 120-130.

Werro F., „The Right to Inform v. the Right to be Forgotten: A transatlantic Clash‟, in

Haftungsrecht im dritten millennium = Liability in the third millennium, (2009)

Center for Transnational Legal Studies Colloquium, Georgetown University,

Research Paper No. 2, in Ciacchi A. C., Godt C., Rott P., Smith L. J. (Eds.),

Baden-Baden, F.R.G.: Nomos, pp. 285-300.

Media/Blogs

(Anonymous), „Data Protection: forget about a “right to forget”‟, Amberhawk, 28.03.2011.

Edwards L., „The Rights to forget of the right to spin?‟, panGloss, 18.03.2011.

Fleischer Peter, „Foggy thinking about the Right to Oblivion‟, 09.03.2011.

O‟ Neill B., „Inflating Away Our Human Rights‟, December 14 2009.

Rosen J., „The Web Means the End of Forgetting‟, The New York Times, 21.07.2010.

Legislative Documents

The 1995 EU Data Protection Directive (95/46/EC) on the protection of individuals with

regard to the processing of personal data and on the free movement of such data

(OJ of 23 November 1995 No L.281, p.31).

EC Communication, „Safeguarding Privacy in a Connected World European Data

Protection Framework for the 21st Century‟, Brussels 25.1.2012, COM(2012) 9

final.

EC,„Proposal for a Regulation on the protection of individuals with regard to the processing

of personal data and on the free movement of such data (General Data Protection

Regulation)‟, Brussels, 25.1.2012, EC COM(2012) 11 final.

Explanatory Memorandum on the Proposal for a Regulation on the protection of individuals

with regard to the processing of personal data and on the free movement of such

38

data (General Data Protection Regulation), Brussels, 25.1.2012, EC COM(2012)

11 final.

EC Staff Working Paper, „Impact Assessment Accompanying the proposed Regulation‟,

SEC(2012) 72 final.

Cases

Campbell v MGN Ltd [2004] UKHL 22

David Murray v Express Newspapers and Big Pictures Ltd [2007] EWHC 1908 (Ch).

Peck v United Kingdom (Case 44647.98) [2003] EMLR 15 (ECtHR).

Von Hannover v Germany (2005) 40 EHRR 1.

Joined Cases C-92/09 and C-93/09 Volker und Markus Schecke and Eifert, judgment of

9.11.2010.

Reports-Speeches

European Digital Rights (EDRi), „Response to EC consultation on the review of the Data 

Protection Directive‟, 15.01.2011.

Reding V., speech/10/441, Brussels, 16.10.2010.

“European Commission sets out strategy to strengthen EU data protection rules”,

IP/10/1462, 04.11.2010.

Ancient Literature

Aristotle, Categories.

――Nicomachean Ethics.

Pausanias, Description of Greece.

The Right to Be Forgotten

June 29, 2012 at 4:14 pm | Posted in Concepts, Critical Perspectives, Questions, Thoughts | Comments Off on The Right to Be Forgotten

http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten

The Right to Be Forgotten

February 13, 2012 64 Stan. L. Rev. Online 88
by Jeffrey Rosen

Professor of Law, The George Washington University
Legal Affairs Editor, The New Republic

At the end of January, the European Commissioner for Justice, Fundamental Rights, and Citizenship, Viviane Reding, announced the European Commission’s proposal to create a sweeping new privacy right—the “right to be forgotten.” The right, which has been hotly debated in Europe for the past few years, has finally been codified as part of a broad new proposed data protection regulation. Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade. The right to be forgotten could make Facebook and Google, for example, liable for up to two percent of their global income if they fail to remove photos that people post about themselves and later regret, even if the photos have been widely distributed already. Unless the right is defined more precisely when it is promulgated over the next year or so, it could precipitate a dramatic clash between European and American conceptions of the proper balance between privacy and free speech, leading to a far less open Internet.

In theory, the right to be forgotten addresses an urgent problem in the digital age: it is very hard to escape your past on the Internet now that every photo, status update, and tweet lives forever in the cloud. But Europeans and Americans have diametrically opposed approaches to the problem. In Europe, the intellectual roots of the right to be forgotten can be found in French law, which recognizesle droit à l’oubli—or the “right of oblivion”—a right that allows a convicted criminal who has served his time and been rehabilitated to object to the publication of the facts of his conviction and incarceration. In America, by contrast, publication of someone’s criminal history is protected by the First Amendment, leading Wikipedia to resist the efforts by two Germans convicted of murdering a famous actor to remove their criminal history from the actor’s Wikipedia page.[1]

European regulators believe that all citizens face the difficulty of escaping their past now that the Internet records everything and forgets nothing—a difficulty that used to be limited to convicted criminals. When Commissioner Reding announced the new right to be forgotten on January 22, she noted the particular risk to teenagers who might reveal compromising information that they would later come to regret. She then articulated the core provision of the “right to be forgotten”: “If an individual no longer wants his personal data to be processed or stored by a data controller, and if there is no legitimate reason for keeping it, the data should be removed from their system.”[2]

In endorsing the new right, Reding downplayed its effect on free speech. “It is clear that the right to be forgotten cannot amount to a right of the total erasure of history,” she said.[3] And relying on Reding’s speeches, press accounts of the newly proposed right to be forgotten have been similarly reassuring about its effect on free speech. In a post at the Atlantic.com, Why Journalists Shouldn’t Fear Europe’s ‘Right to be Forgotten, John Hendel writes that although the original proposals a year ago “would have potentially given people the ability to cull any digital reference—from the public record, journalism, or social networks—they deemed irrelevant and unflattering,” Reding had proposed a narrower definition of data that people have the right to remove: namely “personal data [people] have given out themselves.”[4] According to Hendel “[t]his provision is key. The overhaul insists that Internet users control the datathey put online, not the references in media or anywhere else.”[5]

But Hendel seems not to have parsed the regulations that were actually proposed three days later on January 25. They are not limited to personal data that people “have given out themselves”; instead, they create a new right to delete personal data, defined broadly as “any information relating to a data subject.”[6] For this reason, they arguably create a legally enforceable right to demand the deletion of any photos or data that I post myself, even after they’ve gone viral, not to mention unflattering photos that include me or information about me that others post, whether or not it is true.

In a widely cited blog post last March, Peter Fleischer, chief privacy counsel of Google, notes that the right to be forgotten, as discussed in Europe, often covers three separate categories, each of which proposes progressively greater threats to free speech.[7] And the right to be forgotten, as proposed at the end of January, arguably applies in all three of Fleischer’s categories.

The first category is the least controversial: “If I post something online, do I have the right to delete it again?” This involves cases where I post a photo on Facebook and later think better of it and want to take it down. Since Facebook and other social networking sites already allow me to do this, creating a legally enforceable right here is mostly symbolic and entirely unobjectionable. As proposed, the European right to be forgotten would also usefully put pressure on Facebook to abide by its own stated privacy policies by allowing users to confirm that photos and other data have been deleted from its archives after they are removed from public display.

But the right to delete data becomes far more controversial when it involves Fleischer’s second category: “If I post something, and someone else copies it and re-posts it on their own site, do I have the right to delete it?” Imagine a teenager regrets posting a picture of herself with a bottle of beer on her own site and after deleting it, later discovers that several of her friends have copied and reposted the picture on their own sites. If she asks them to take down the pictures, and her friends refuse or cannot be found, should Facebook be forced to delete the picture from her friends’ albums without the owners’ consent based solely on the teenager’s objection?

According to the proposed European Right to Forget, the default answer is almost certainly yes. According to the regulation, when someone demands the erasure of personal data, an Internet Service Provider “shall carry out the erasure without delay,” unless the retention of the data is “necessary” for exercising “the right of freedom of expression,” as defined by member states in their local laws.[8] In another section, the regulation creates an exemption from the duty to remove data for “the processing of personal data solely for journalistic purposes, or for the purposes of artistic or literary expression.”[9] Essentially, this puts the burden on Facebook to prove to a European commission authority that my friend’s publication of my embarrassing picture is a legitimate journalistic (or literary or artistic) exercise. If I contact Facebook, where I originally posted the embarrassing picture, it must take “all reasonable steps” on its own to identify any relevant third parties and secure the takedown of the content.[10] At the very least, Facebook will have to engage in the kinds of difficult line-drawing exercises previously performed by courts. And the prospect of ruinous monetary sanctions for any data controller that “does not comply with the right to be forgotten or to erasure”—a fine up to 1,000,000 euros or up to two percent of Facebook’s annual worldwide income[11]—could lead data controllers to opt for deletion in ambiguous cases, producing a serious chilling effect.

For a preview of just how chilling that effect might be, consider the fact that the right to be forgotten can be asserted not only against the publisher of content (such as Facebook or a newspaper) but against search engines like Google and Yahoo that link to the content. The Spanish Data Protection authority, for example, has sued Google to force it to delete links to embarrassing newspaper articles that are legal under Spanish law.[12] And suits against third party intermediaries are also threatening freedom of speech in Argentina, as the case of Virginia Da Cunha shows. The Argentine pop star had posed for racy pictures when she was young, but recently sued Google and Yahoo to take them down, arguing that they violated the Argentine version of the “right to be forgotten.” Google replied that it could not comply technologically with a broad legal injunction demanding the removal of the pictures, and Yahoo said that the only way to comply would be to block all sites referring to Da Cunha for its Yahoo search engines. Nevertheless, an Argentine judge sided with Da Cunha and after fining Google and Yahoo, ordered them to remove all sites containing sexual images that contained her name. The decision was overturned on appeal, on the grounds that Google and Yahoo could only be held liable if they knew content was defamatory and negligently failed to remove it. But there are at least one hundred and thirty similar cases pending in Argentine courts demanding removal of photos and user-generated content, mostly brought by entertainers and models. The plaintiffs include the Sports Illustrated swimsuit model Yesica Toscanini; when a user of Yahoo Argentina plugs her name into the Yahoo search engine, the result is a blank page.[13]

Finally, there is Fleischer’s third category of takedown requests: “If someone else posts something about me, do I have a right to delete it?” This, of course, raises the most serious concerns about free expression. The U.S. Supreme Court has held that states cannot pass laws restricting the media from disseminating truthful but embarrassing information—such as the name of a rape victim—as long as the information was legally acquired.[14]

The proposed European regulation, however, treats takedown requests for truthful information posted by others identically to takedown requests for photos I’ve posted myself that have then been copied by others: both are included in the definition of personal data as “any information relating” to me, regardless of its source.[15] I can demand takedown and the burden, once again, is on the third party to prove that it falls within the exception for journalistic, artistic, or literary exception. This could transform Google, for example, into a censor-in-chief for the European Union, rather than a neutral platform. And because this is a role Google won’t want to play, it may instead produce blank pages whenever a European user types in the name of someone who has objected to a nasty blog post or status update.

It’s possible, of course, that although the European regulation defines the right to be forgotten very broadly, it will be applied more narrowly. Europeans have a long tradition of declaring abstract privacy rights in theory that they fail to enforce in practice. And the regulation may be further refined over the next year or so, as the European Parliament and the Council of Ministers hammer out the details. But in announcing the regulation, Reding said she wanted it to be ambiguous so that it could accommodate new technologies in the future. “This regulation needs to stand for 30 years—it needs to be very clear but imprecise enough that changes in the markets or public opinion can be maneuvered in the regulation,” she declared ominously.[16] Once the regulation is promulgated, moreover, it will instantly become law throughout the European Union, and if the E.U. withdraws from the safe harbor agreement that is currently in place, the European framework could be imposed on U.S. companies doing business in Europe as well.[17] It’s hard to imagine that the Internet that results will be as free and open as it is now.

  1. John Schwartz, Two German Killers Demanding Anonymity Sue Wikipedia’s Parent, N.Y. Times, Nov. 12, 2009, at A13; see also Walter Sedlmayr,Wikipedia (last visited Feb. 6, 2012), http://en.wikipedia.org/wiki/Walter_Sedlmayr.
  2. Viviane Reding, Vice President, Eur. Comm’n, The EU Data Protection Reform 2012: Making Europe the Standard Setter for Modern Data Protection Rules in the Digital Age 5 (Jan. 22, 2012), available at http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/12/26&format=PDF.
  3. Id.
  4. John Hendel, Why Journalists Shouldn’t Fear Europe’s ‘Right to Be Forgotten,’ Atlantic (Jan. 25, 2012),http://www.theatlantic.com/technology/archive/2012/01/why-journalists-shouldnt-fear-europes-right-to-be-forgotten/251955/.
  5. Id.
  6. Commission Proposal for a Regulation of the European Parliament and of the Council, art. 4(2), COM (2012) 11 final (Jan. 25, 2012) [hereinafter Proposed Data Protection Regulation], available at http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf.
  7. Peter Fleischer, Foggy Thinking About the Right to Oblivion, Privacy . . . ? (Mar. 9, 2011), http://peterfleischer.blogspot.com/2011/03/foggy-thinking-about-right-to-oblivion.html.
  8. Proposed Data Protection Regulation, supra note 6, at art. 17(3).
  9. Id. at art. 80.
  10. Id. at art. 17(2).
  11. Id. at art. 79(5)(c), (6)(c).
  12. Peter Fleischer, The Right to Be Forgotten, or How to Edit Your History, Privacy . . . ? (Jan. 29, 2012), http://peterfleischer.blogspot.com/2012/01/right-to-be-forgotten-or-how-to-edit.html.
  13. Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y. Times, Aug. 20, 2010, at B4.
  14. Florida Star v. B.J.F., 491 U.S. 524 (1989).
  15. Proposed Data Protection Regulation, supra note 6, at art 4(2).
  16. Matt Warman, EU Fights ‘Fierce Lobbying’ to Devise Data Privacy Law, Telegraph (Feb. 9, 2012), available athttp://www.telegraph.co.uk/technology/internet/9069933/EU-fights-fierce-lobbying-to-devise-data-privacy-law.html.
  17. Private Data, Public Rules, Economist (Jan. 28, 2012), available at http://www.economist.com/node/21543489.

Flawed discourse of Aadhar and privacy

December 7, 2011 at 11:55 am | Posted in Questions, Thoughts | Comments Off on Flawed discourse of Aadhar and privacy

In the last sixty years India has seen many communal riots.

During some riots Sikhs were the target, in others Buddhists, and some riots were planned  against Tribal  Christians but a lot of riots were directed against the Muslims of India. In all these riots the state could not control the act of rioting for a long time.

Voter lists has emerged as a favorite tool of rioters. A database derived from voter registration exercise is a rich source of spatial and social co-ordinates. This data is essential in orchestrating riots. What is the process of collecting data on voters,  according to election commission of India, ‘

The Election Commission prepares the electoral rolls through a process of intensive revision where house-to-house enumeration is done and electors residing in each house are registered by official enumerators who go physically from door-to-door to collect the information about electors. This process is done normally once in five years. Between two Intensive revisions, summary revisions are done every year during a specified period when persons who are left out of the electoral rolls are given an opportunity to register themselves by applying in Form-6.’

In the mainstream media a lot of people are trying to frame the discourse around Aadhar in terms of privacy. I wonder, why do these people not say a word, A WORD, about privacy when riots happen or when media discusses HOW A RIOT HAPPENS

In every riot privacy, of the most vulnerable people of India, is infringed, why not talk about privacy in terms of riots. Why not talk about reforming laws to protect the privacy of voter registration databases and making the divulging of information an offense

Aadhar and pogroms

December 6, 2011 at 11:55 pm | Posted in Questions, Thoughts | Comments Off on Aadhar and pogroms

Earlier during riots they used to move around with voter lists now with Aadhar databases with Iris scans and fingerprints will they communally scan areas with fingerprint scanners?

Identity and identification

November 22, 2011 at 3:29 pm | Posted in Questions | Comments Off on Identity and identification

Why are policy makers and academics not interested in the core issue- what do we mean by the identity of a human being. Can someone map this identity.

What is a possible measure of identity.

How are identity and identification different. How can you make a distinction when you do not know exactly what one entity stands for.

Information system

November 22, 2011 at 3:25 pm | Posted in Questions | Comments Off on Information system

If UID is constructed as a information system, the idea is to allow information to flow symmetrically, what are possible information asymmetries of this system.

Can someone map all information asymmetries, name it and plug it.

Top 200 IT cos log $84 bn revenue

August 2, 2011 at 7:48 am | Posted in New Business, Questions, The Market | Comments Off on Top 200 IT cos log $84 bn revenue

Fact-

According to an IE report the IT sector in India is booming again.

 

Question-

How was this possible.

What role did UIDAI play in this upsurge.

Why is the Indian state redistributing money to this failed sector.

Why is the money not invested in other sectors, especially labor intensive sectors that benefits a lot of small enterprises like agriculture or handlooms or iron smithry or brass tool and object making or tannery or semi precious jewels or  public health.

Why is the Indian state seems to benefiting few people over others.

Why is Infosys on top now.

Is that just a coincidence or there is a relationship to the fact that Nandan Nilekani its former boss is sitting smugly in Delhi and manning over UIDAI

 

http://www.indianexpress.com/news/top-200-it-cos-log-84-bn-revenue/826056/0

Top 200 IT cos log $84 bn revenue

AgenciesTags : IT companies revenuesTCS revenueInfosys revenuesWipro revenuesPosted: Tue Aug 02 2011, 12:00 hrsBangalore:
IT

The top 200 IT companies in India logged a combined revenue of USD 84 billion.

The top 200 IT companies in India logged a combined revenue of USD 84 billion (Rs 384,250 crore) to achieve an average growth rate of 25 per cent in 2010-11, the highest in the past four years, according to a survey. 

 

The revenues of these companies stood at Rs 307,126 crore in 2009-10 and Rs 289,093 crore in 2008-09.

 

The combined revenue of the top 20 IT companies was USD 54 billion (Rs 247,808 crore) in 2010-11, also representing a growth of 25 per cent. This is significantly higher than the 8 per cent growth recorded in 2009-10 on the back of revenues of Rs 198,017 crore.

 

The 2010-11 growth surpasses the 24 per cent growth witnessed in 2007-08, the year before the slowdown, according to the annual research findings on the Indian IT industry by Dataquest, the flagship journal of specialty publishers CyberMedia.

 

Each of the top 20 IT companies earned over USD 1 billion in 2010-11, together posting revenues of USD 54 billion (Rs 247,808 crore), contributing 64 per cent to the top 200 companies’ revenue.

According to the findings, the top five Indian IT companies in 2010-11 were TCS, Infosys, Wipro, HP and Cognizant, with revenues of Rs 33,112 crore (25 per cent growth over last year), Rs 25,997 crore (22 per cent), Rs 24,899 crore (13 per cent), Rs 23,227 crore (30 per cent) and Rs 21,393 crore (37 per cent), respectively.

 

Wipro, which recorded the slowest growth in the top five, surrendered the number two slot to Infosys after six years, the findings said.

 

The number six slot went to the Indian subsidiary of 100-year-old global tech behemoth IBM (revenues Rs 14,132 crore, year-on-year growth of 14 per cent)

 

The two companies founded by Shiv Nadar — software major HCL Technologies and hardware firm HCL Infosystems – posted revenues of Rs 14,111 crore (28 per cent growth) and Rs 12,137 crore (2 per cent), respectively, to bag the number seven and number eight slots in the list.

 

Two product distribution companies, Ingram Micro and Redington, with revenues of Rs 9,766 crore (35 per cent) and Rs 9,274 crore (32 per cent), bagged the number 9 and number 10 slots.

 

The survey notes that significant leadership changes have taken place at the senior levels in nearly one-third of the top 200 IT companies.

 

“Very rarely has a more fundamental change swept across the Indian IT industry in the past,” Dataquest Editor Shyamanuja Das observed.

 

As many as seven of the Top 20 companies — TCS, Wipro, Cognizant, HCL Infosystems, Accenture, Microsoft and Oracle — effected changes in their top leadership, while a leadership change at Infosys would come through this month.

 

While Mahindra Satyam has made a re-entry in the list after two years, it hasn’t changed the ranking of the top 20 companies significantly. However, the revenues of the next 30 companies (ranked 21-50) grew at 29 per cent, faster than the top 20 companies.

 

Four companies recorded triple-digit growth, while 150 of the 200 companies (129 Indian companies and 71 foreign ones, who are active players in the Indian market) recorded double-digit growth.

 

In 2009-10, only one company grew at a rate over 100 per cent, while 78 recorded double-digit growth. In general, companies focused on the domestic market have grown faster than those focused on exports. As many as 18 of the 20 fastest growing companies are focused on the India market.

 

Coincidentally, the top company, TCS, with a revenue of Rs 33,112 crore (minus BPO), was over 200 times the size of the two companies at the 200th rank — Aftek Limited and Datamatics Global Services — which posted revenues of Rs 155 crore each in 2010-11, the survey said.

 

Company INFO

 

Why no one is looking at UID from a political point of view?

June 3, 2010 at 12:43 pm | Posted in My Notes, Questions, Thoughts | Comments Off on Why no one is looking at UID from a political point of view?

I was wondering something. I was wondering why haven’t people
started looking at UID from a political point of view.

Privacy argument is well known but given that Aadhaar is run by Brahmins,given that IT industry is hugely represented from people belonging to upper castes, then, can we hazard a guess, that could it be that in establishing UID under planning commission which is a non-statutory body and transferring such a huge amount of money (1.5 Lakh Crores) which will directly benefit the upper castes of India, is the
government of India, subsidizing and further accentuating monopoly of
Brahmins?

I wonder why are schemes of such scale not thought which
will directly benefit the manual scavengers of India? or for that
matter why are schemes of such scale and I mean schemes which will
result in a transfer of 1.5 LAKH CRORE RUPEES, not thought which will
say for instance, benefit the indigenous tribal population of India?

Can we think of UID as some sort a deliberate mischief on behalf of
GOI to aid Brahmins and other upper caste with public money on the
cost of other population clusters?

I don’t know whether I am following the right track, maybe I am completely off the track as I don’t have any data to verify or disprove, it was just a question which came to my mind and I wanted to share it with you all.

On Communal Violence and its proximity to Census

May 27, 2010 at 8:22 am | Posted in Questions, Thoughts | Comments Off on On Communal Violence and its proximity to Census

Why is it that in the last twenty years two
of the most violent of communal clashes have erupted just the year
after the census?

I am of course referring to 2002 and 1992.

Inquiries instituted to asses the riots have often accepted the use
of voter lists by the rioters to kill specified persons with precision
and planning. Could it be a reason, why the far right of India are not
opposing the UID? Digital data. Fingerprint recognition. Even Spatial
mapping too, who knows! Is that why people who could use this
technology to murder others want this mapping of identities to happen
at any cost?

Are we going to witness an unprecedented scale of mass murder in India
in years to come?

On a sublime form of propaganda: ‘UIDAI is just the back-end’

May 22, 2010 at 7:59 am | Posted in Questions, Thoughts | Comments Off on On a sublime form of propaganda: ‘UIDAI is just the back-end’
Consider this: In a cognitive propaganda model, language is used
extensively to induce what is known as cognitive distortions. Such
distortions are then utilized to justify an action. A good example for
this would be: The underprivileged of India are ‘suffering’ we give
them a number and everything would be alright after wards etc.

The sublime technique of filtering is part of Cognitive Propaganda.
Now as we all know, ‘filtering’ is over-focusing on one aspect of
something to the exclusion of everything else.

Now consider this:

After attending a cabinet committee meeting on UIDAI alias Aadhar
alias MNIC, Mr. Nilekani spoke to the press. In this respect, I wish
to
draw your attention to the following statement given by Mr. Nilekani
about UIDAI.

“We are just a number issuing and data collecting authority…UIDAI is
just the back-end,” said Mr. Nilekani.

http://beta.thehindu.com/news/national/article433961.ece

I find the portrayal of UID by its boss Mr. Nilekani, as a ‘number
issuing authority’ very very interesting. My interest was drawn to a
particular word -JUST-

Remember 1,50,000 Crores are riding behind this word very innocuous
word  -just-. 1,50,000 crores of public money which is going to be
transferred in the name of creating an archive of hearsays’.

My respect for Mr. Nilekani has grown manifold, because he seems to be
using a very sophisticated cognitive propaganda model to complete his
brief i.e. to transfer 1,50,000 crores of public money, in the name of
a  necessary exercise, to a particular industry, in the name of a
technological ideal.

Every time Mr. Nilekani comes to face the news camera or talks to
press reporters. These days he does it every day. He will
focus on ‘number issuing authority’ aspect of UID in a very carefully
crafted manner.

What about Natgrid Sir?

What about total costs of the project, SIr?

He will not answer any question related to the total cost of project.
I mean. Man! does he wants us to believe that this is how he has run
his business all these years, without having an idea of the cost of
investment, or returns on investment or without having an idea of how
he will be spending in the course of say next five years?

Why does anyone not talk about this loot of public money in the name
of underprivileged of India?

Reminds me of a conversation I have had with a friend once. He was
telling me about the atom bomb. When atom bomb was made, US gov, hired
some linguists and propagandists i.e. communication experts to sell
the idea of bomb to the US public. They had to sell to the general
public, that it is morally okay for US army to slaughter a huge number
of innocent people who had nothing to do with the war.

Linguists zeroed in on one word. -ONLY- . The propaganda machine
worked like mad to sell this idea. Only a couple of thousands will be
affected. Only few hundred thousands will have to pay the immediate
price and so on to create an impression that ‘only’ a ‘few’ people
will be affected.

ONLY is a deeply ambiguous word which means a variety of things but
while used an adjective it means, being the single one or the
relatively few of the kind.

ONLY shares a close association with JUST which is also a deeply
ambiguous word and when used as an adverb means, only or merely.

I wonder if, Mr. Nilekani is deliberately resorting to the use of
these words to create some sort  carefully calibrated cognitive
dissonance? A type of dissonance which first justifies the use of UID
as an aid to the underprivileged while distorting UID’s potential as
an agency which could deeply harm the privacy of individuals. At the
same time, I wonder whether, cognitive dissonance is used deliberately
to take attention off from an open loot of the public money, this
naked subsidizing to revive a middle class sector, to revive a myth of
India as IT Superpower?

Are we the people of India, a property of its government?

May 14, 2010 at 3:55 pm | Posted in My Notes, Questions, Thoughts | Comments Off on Are we the people of India, a property of its government?

Every condom pack has a barcode. That barcode uniquely identifies that condom pack as that condom pack. Similarly bar codes are used for toothbrushes, fridges and almost every imaginable commodity available. These bar codes serve a utilitarian purpose.

Any person who owns a means of production to manufacture a commodity is given the right to tag that commodity, by law so as to ascertain an exact amount of money that he could receive from the sale of such a commodity.

Mr.Nilekani and his team wants to give all Indians a UID number. The GOI wants to tag us. Does the GOI consider all Indians as its property?  Should we now start to consider ourselves as a property of Government of India? Is it not that WE THE PEOPLE of INDIA collectively own the Government and the land and all the resources and every thing which is there in this country?

By collecting the identities of the people of India, is not the Government trying very hard to fundamentally change the primary relationship between a collective of Citizens and a machinery of the State which is run by ITS elected representatives? Who do you think you will belong to after Mr.Nilekani has done his job?

India or Government of India?

A note on imagining the current NID program as a form of ‘Slave Trade’

May 9, 2010 at 7:12 am | Posted in Concepts, My Notes, Questions, Thoughts | Comments Off on A note on imagining the current NID program as a form of ‘Slave Trade’

The argument that UID is good because it will create jobs is doing rounds. This argument is directed at middle class  audiences. I think in a country where there is a paucity of jobs, an initiative which promises jobs must be given due consideration. The intent behind it-is nice. We need jobs. However I wonder whether should we allow our money to be used for any initiative which promises to create jobs?

Should we not look at UID from a broad level and try to find whether the existence of such an institution is morally just and good?

I understand that if we were to scrap UID ( given the problems it is facing it might be sooner than we think ) then it will cause a lot of distress, emotional duress and strain to middle class people just like the hundreds of thousands of middle class people who were working for various corporations in England had to undergo a lot of distress, duress and emotional upheaval when the slave trade was abolished.

This is of course not to suggest that UID is like slave trade, that would be ridiculous, but could we not think that,  just like slave traders used to forcefully capture Human beings and turn them into commodities to be bought and to be sold and to be enslaved and to be shipped and to be restricted in their movement, so too, in its ‘modern’ Avataar, is there not something deeply sinister about the role which UID is playing?

Is it not that UID is engaging in an act of capturing not Human beings but an aspect of Human beings, i.e. their personal identities, either by diktat (you will have to register) or by economic seduction (you will get an ‘incentive’ of 100 rupees) or by threat to use force ( if you do not register, then you may have to undergo difficulties).

Will UID not  shackle our identities and put it behind digital cages? Just like slaves used to be tossed around the world without their
consent will the people behind UID not ship our personal identities across networks in India and possibly abroad and toss it here and there without our consent? Just like a slave ship had an economic value so too, will this digital ship of identities not have an economic value? Just like a slave was the property of a slave owner so too, will not our individual identities become a property of UID? Just like slave ships were subject to attacks by pirates so too, will not these digital ships carrying our identities be subject to constant
attacks by digital pirates like hackers? Just like slaves could be bought and sold so too will not our personal identities be bought and sold? Just like slavery snatched the dignity of human beings so too will not this enslavement of personal identities not snatch away the dignity of who we are? Just like slaves were used as lab rats for all sorts of psedu-scientific experiments like Phrenology and Intelligence Quotient to produce a mis-measure of man will not the data gathered from harvesting our individual identities not used for policy experiments to produce a mis-measure of our identities?

In the course of some other research work which I am pursuing for sometime, I came across a petition filed by the manufacturers belonging to the City of Birmingham arguing against the abolition of
slave trade. This petition was filed in 1789.

Please have a look at the language deployed to formulate the argument,
please look very carefully at the manner in which this appeal is
calibrated and then please reflect about the nature of UID and the
role it is playing.

I may be completely wrong in questioning UID in this manner and therefore I would welcome any comment to set me on the right track.

Image source:

Petition:

Branding:

Slave ship:

Slave auction:

National ID Card- View from England

May 3, 2010 at 7:23 pm | Posted in Arguments Against, Int'l NID Card, Process, Public Documents, Questions | Comments Off on National ID Card- View from England

Conservative Party’s view on the notion of a National ID card.

The role of an opposition party is to position itself against the party in power and offer critical viewpoints especially on those issues which require redistribution of a tax payer’s money in the name of public good.

By arguing to do away with the proposal to introduce national identity cards in the UK because of huge costs, the center right conservative party seems to be playing the role of a ‘good’ opposition party.

Why is it then, that the nincompoops managing the BJP, the combined Left and others sitting in opposition do not seem care at all at initiating a critical debate on the fuzzy logic of national identity in India?

(Photographs of an election hoarding sponsored by the Conservative Party. Location: Streatham High Street, London Borough of Lambeth. Date: 3rd of May just three days before the UK general election of 2010. Pictures by: Taha Mehmood )

8. Is UIDAI fair and just?

April 11, 2010 at 1:37 pm | Posted in Questions | Comments Off on 8. Is UIDAI fair and just?

If we age with every passing moment. If we are constantly in a state of flux all through our lives.

Then how come a bundle of information related to patterns of our iris and fingerprints and ten other arbitrary, random incidents, like the date of our birth or our name be used to fix who we are?

Is not identity a more complex phenomena?

7. Why invest money on UID?

April 8, 2010 at 10:06 am | Posted in Questions | Comments Off on 7. Why invest money on UID?

Nandan Nilekani says UID number will help the poorest of poor, aka underprivileged in politically correct language.

Arundhati Roy says the poorest of the poor, aka underprivileged in politically correct language, are naxal tribals.

She also says that they usually have many names and many identities and the underprivileged are constantly on the move.

Right now the State of India is in a state of war with Naxals.

How then will UID number help the poor if they have many names and government of India is killing poorest of the poor?

If UID cannot help the poorest of the poor what’s the need for it?
It doesn’t make sense, why would. Govt. of India, allot 1900 crore rupees to help poorest of the poor and then send an army to kill them.

6. On Census-

April 7, 2010 at 7:50 am | Posted in Questions | Comments Off on 6. On Census-

Would the information gathered by these hundreds of thousands of enumerators be absolutely correct?

Given since last year hundreds of millions of Indians must have left their home to work in other cities, for instance how would thousands Bihari laborers scattered in various parts of Delhi, Haryana, Punjab, Jammu and elsewhere, be documented?

What would happen to the enumeration of hundreds of millions who are commuting to places other than their home town on the day of enumeration?

5. On census

April 5, 2010 at 10:49 am | Posted in Questions | Comments Off on 5. On census

Why don’t we have any public data on-

1. The number of policies which are formulated by extensively using  Census data?

2. The number of policies which resulted in a just redistribution of public good?

If, of the total number of policies they aren’t many which were not able to create a systematic guideline which could result in a just redistribution public good,  then could we not think of using other strategies for effecting change?

4. On Census

April 3, 2010 at 9:33 am | Posted in Questions | Comments Off on 4. On Census

Question-

Do Indians in general trust a person representing the Govt. of  India as one of their own? If not then how do we know that all enumerators going in all areas of the country will be trusted? Why should we assume that the information collected by them would be genuine?

Assumption-

Given a prevalence of a general perception that a member of government is often corrupt, often exploitative and is often not seen as someone who is duty bound and desirous of our love and respect.

3. On census

April 3, 2010 at 7:13 am | Posted in Nandan Nilekani, Process, Questions | Comments Off on 3. On census

Question-

Nilikani claims numbers will be doled out by 2011-

Should we take all that Nilekani’s is projecting abut UIDAI as truth claims?

Given that India is an overwhelming under-documented nation, people do not have a robust tradition of keeping records, remembering birth dates and so on.

2. On Census

April 3, 2010 at 7:07 am | Posted in Process, Questions | Comments Off on 2. On Census

Question-

Why do we need a national census data?

Why can’t we have localized data?

How can we make policies in 2009 based on 2001 census data and expect it to work?

1. On Census

April 3, 2010 at 7:02 am | Posted in Process, Questions | Comments Off on 1. On Census

Question- Will the information provided by Census on house data and personal identity be accurate?

Given that-

a- Millions of people in India are internally displaced every year.

b- According to various sources anywhere between 180-220 districts of India’s 625 districts are effected by Maoists.

So who will go there and do house listing and survey?

Blog at WordPress.com.
Entries and comments feeds.