What should we do about the naming deficit/surplus?


in mySociety Blog: “As I wrote in my last post, I am very concerned about the lack of comprehensible, consistent language to talk about the hugely diverse ways in which people are using the internet to bring about social and political change….My approach to finding an appropriate name was to look at the way that other internet industry sectors are named, so that I could choose a name that sits nicely next to very familiar sectoral labels….

Segmenting the Civic Power sector

Choosing a single sectoral name – Civic Power – is not really the point of this exercise. The real benefit would come from being able to segment the many projects within this sector so that they are more easy to compare and contrast.

Here is my suggested four part segmentation of the Civic Power sector…:

  1. Decision influencing organisations try to directly shape or change particular decisions made by powerful individuals or organisations.
  2. Regime changing organisations try to replace decision makers, not persuade them.
  3. Citizen Empowering organisations try to give people the resources and the confidence required to exert power for whatever purpose those people see fit, both now and in the future.
  4. Digital Government organisations try to improve the ways in which governments acquire and use computers and networks. Strictly speaking this is just a sub-category of ‘decision influencing organisation’, on a par with an environmental group or a union, but more geeky.”

See also: Open Government – What’s in a Name?

China Law Translate (CLT), a collaborative translation project.


“CLT allows many users to translate small pieces of legal texts between Chinese and English, to promote mutual understanding and provide a resource to legal professionals around the world. The sum of these small pieces, contributed in any order or no order at all, gradually creates a completed translation. You can translate as little or as much as you like, or leave comments to discuss the work of others or suggest better translations.
Quick Start: 1. open a post 2. Select Language you want to translate INTO 3. Open Tranlator Mode. 4. Translate…
We aim to create complete translations of important Chinese laws and articles, but some of the articles you view may still be incomplete or translated less than fluently. Bear with us, we are a new resource and getting there slowly. If you are able,, help us improve the translations you see!”

Operation Decode San Francisco Will Hack the City's Legal Code


Motherboard: “The city of San Francisco is set to be hacked tonight. Legally, of course. It’s all part of the Operation Decode San Francisco effort, which will unwrap and simplify the city’s dense, labyrinthine laws and re-package them in a fresh, easy-to-use and searchable format.
The crew behind this, OpenGov, originally cut its teeth on KeepTheWebOpen.org. Founded by Rep. Darrell Issa and others to combat SOPA/PIPA, and running on a $5,000 piece of software called the Madison Project, the site also offered up an alternative bill: Issa’s Online Protection and Enforcement of Digital Trade Act (OPEN). Characterized as the first technological crowd-sourcing of legislation, the bill is still stuck in committee, but the site was certainly one of the many tentacles that helped suffocate SOPA/PIPA.

…The immediate hope with these beta Decoded sites is that they will appeal to individuals and organizations that regularly interact with the law. Lawyers and public interest groups are prime targets. However, the developers would like to make the sites attractive to all sorts of individuals who want to better understand city laws, and involve themselves in the debate process. The Decoded sites will first educate constituents, whereupon the Madison technology will takeover, allowing citizens to critique bills line-by-line with track changes. ”

An Inquiry into the Dynamics of Government Secrecy


New paper by Steven Aftergood in the Harvard Civil Rights-Civil Liberties Law Review (Vol. 48, No. 2, Summer 2013): “This Article reviews selected aspects of secrecy policy in the Obama Administration to better comprehend the dynamics of official secrecy, particularly in the national security realm. An understanding emerges: secrecy policy is founded on a set of principles so broadly conceived that they do not provide unequivocal guidance to government officials who are responsible for deciding whether or not to classify particular topics. In the absence of such guidance, individual classification decisions are apt to be shaped by extraneous factors, including bureaucratic self-interest and public controversy. The lack of clear guidance has unwholesome implications for the scope and operation of the classification system, leading it to stray from its legitimate national security foundations. But an insight into the various drivers of classification policy also suggests new remedial approaches to curtail inappropriate secrecy.”

Empirically Informed Regulation


Paper by Cass Sunstein: “In recent years, social scientists have been incorporating empirical findings about human behavior into economic models. These findings offer important insights for thinking about regulation and its likely consequences. They also offer some suggestions about the appropriate design of effective, low-cost, choice-preserving approaches to regulatory problems, including disclosure requirements, default rules, and simplification. A general lesson is that small, inexpensive policy initiatives can have large and highly beneficial effects. In the United States, a large number of recent practices and reforms reflect an appreciation of this lesson. They also reflect an understanding of the need to ensure that regulations have strong empirical foundations, both through careful analysis of costs and benefits in advance and through retrospective review of what works and what does not.”

The Shame Game: U.S. Department of Labor Smartphone App Will Allow Public to Effortlessly Scrutinize Business Employment Practices


Charles B. Palmer in National Law Review: “The United States Department of Labor (DOL) recently launched a contest to find a new smartphone app that will allow the general public to effortlessly search for and scrutinize businesses and employers that have faced DOL citations. Dubbed the DOL Fair Labor Data Challenge, the contest seeks app entries that integrate information from consumer ratings websites, location tracking services, DOL Wage & Hour Division (WHD) citation data, and Occupational Safety & Health Administration (OSHA) citation data, into one software platform. In addition, the contest also encourages app developers to include other features in their respective app entries, such as information from state health boards and various licensing agencies.
The DOL Fair Labor Data Challenge is part of the DOL’s plan to amplify its enforcement efforts through increased public awareness and ease of access to citation data. Consumers and job applicants will soon be able to search for and publicly shame employers that hold one or more citations in the DOL database, all by just using their smartphones.”

International Principles on the Application of Human Rights to Communications Surveillance


Final version, 10 July 2013:  “As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. This document attempts to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.
These principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology.”

New Report Finds Cost-Benefit Analyses Improve Budget Choices & Taxpayer Results


Press Release: “A new report shows cost-benefit analyses have helped states make better investments of public dollars by identifying programs and policies that deliver high returns. However, the majority of states are not yet consistently using this approach when making critical decisions. This 50-state look at cost-benefit analysis, a method that compares the expense of public programs to the returns they deliver, was released today by the Pew-MacArthur Results First Initiative, a project of The Pew Charitable Trusts and the John D. and Catherine T. MacArthur Foundation.

The study, “States’ Use of Cost-benefit Analysis: Improving Results for Taxpayers”, comes at a time when states are under continuing pressure to direct limited dollars toward the most cost-effective programs and policies while curbing spending on those that do not deliver. The report is the first comprehensive study of how all 50 states and the District of Columbia analyze the costs and benefits of programs and policies, report findings, and incorporate the assessments into decision-making. It identifies key challenges states face in conducting and using the analyses and offers strategies to overcome those obstacles. The study includes a review of state statutes, a search for cost benefit analyses released between 2008 and 2011, and interviews with legislators, legislative and program evaluation staff, executive officials, report authors, and agency officials.”

The Internet generation will learn to let go


Julian B. Gewirtz and Adam B. Kern in The Washington Post: “Ours is the first generation to have grown up with the Internet. The first generation that got suspended from school because of a photo of underage drinking posted online. The first generation that could talk in chat rooms to anyone, anywhere, without our parents knowing. The first generation that has been “tracked” and “followed” and “shared” since childhood.
All this data will remain available forever — both to the big players (tech companies, governments) and to our friends, our sort-of friends and the rest of civil society. This fact is not really new, but our generation will confront the latter on a scale beyond that experienced by previous generations…
Certainly there will be many uses for information, such as health data, that will wind up governed by law. But so many other uses cannot be predicted or legislated, and laws themselves have to be informed by values. It is therefore critical that people establish, with their actions and expectations, cultural norms that prevent their digital selves from imprisoning their real selves.
We see three possible paths: One, people become increasingly restrained about what they share and do online. Two, people become increasingly restrained about what they do, period. Three, we learn to care less about what people did when they were younger, less mature or otherwise different.
The first outcome seems unproductive. There is no longer much of an Internet without sharing, and one of the great benefits of the Internet has been its ability to nurture relationships and connections that previously had been impossible. Withdrawal is unacceptable. Fear of the digital future should not drive us apart.
The second option seems more deeply unsettling. Childhood, adolescence, college — the whole process of growing up — is, as thinkers from John Locke to Dr. Spock have written, a necessarily experimental time. Everyone makes at least one mistake, and we’d like to think that process continues into adulthood. Creativity should not be overwhelmed by the fear of what people might one day find unpalatable.
This leaves the third outcome: the idea that we must learn to care less about what people did when they were younger or otherwise different. In an area where regulations, privacy policies and treaties may take decades to catch up to reality, our generation needs to take the lead in negotiating a “cultural treaty” endorsing a new value, related to privacy, that secures our ability to have a past captured in data that is not held to be the last word but seen in light of our having grown up in a way that no one ever has before.
Growing up, that is, on the record.”

Copyright Done Right? Finland To Vote On Crowdsourced Regulations


Fast-Feed: “Talk about crowdsourcing: Finland is set to vote on a set of copyright laws that weren’t proposed by government or content-making agencies: They were drafted by citizens.
Finns are able to propose laws that the government must consider if 50,000 supporters sign a petition calling for the law within six months. A set of copyright regulations that are fairer to everyone just passed that threshold, and TorrentFreak.com reports that a government vote is likely in early 2014. The new laws were created with the help of the Finnish Electronic Frontier Foundation, and the body has promised that it will maintain pressure on the political system so that the law will actually be changed.
The proposed new laws would decriminalize file sharing and prevent house searches and surveillance of pirates. TorrentFreak reminds us of the international media outcry that happened last year when during a police raid a 9-year-old girl’s laptop was confiscated on the grounds that she stole copyrighted content. Finland’s existing copyright laws, under what’s called the Lex Karpela amendment, are very strict and criminalize the breaking of DRM for copying purposes as well as preventing discussion of the technology for doing so. The laws have been criticized by activists and observers for their strictness and infringement upon freedom of speech.”