The Case for Accountability: How it Enables Effective Data Protection and Trust in the Digital Society


Centre for Information Policy Leadership: “Accountability now has broad international support and has been adopted in many laws, including in the EU General Data Protection Regulation (GDPR), regulatory policies and organisational practices. It is essential that there is consensus and clarity on the precise meaning and application of organisational accountability among all stakeholders, including organisations implementing accountability and data protection authorities (DPAs) overseeing accountability.

Without such consensus, organisations will not know what DPAs expect of them and DPAs will not know how to assess organisations’ accountability-based privacy programs with any degree of consistency and predictability. Thus, drawing from the global experience with accountability to date and from the Centre for Information Policy Leadership’s (CIPL) own extensive prior work on accountability, this paper seeks to explain the following issues:

  • The concept of organisational accountability and how it is reflected in the GDPR;
  • The essential elements of accountability and how the requirements of the GDPR (and of other normative frameworks) map to these elements;
  • Global acceptance and adoption of accountability;
  • How organisations can implement accountability (including by and between controllers and processors) through comprehensive internal privacy programs that implement external rules or the organisation’s own data protection policies and goals, or through verified or certified accountability mechanisms, such as Binding Corporate Rules (BCR), APEC Cross-Border Privacy Rules (CBPR), APEC Privacy Recognition for Processors (PRP), other seals and certifications, including future GDPR certifications and codes of conduct; and
  • The benefits that accountability can deliver to each stakeholder group.

In addition, the paper argues that accountability exists along a spectrum, ranging from basic accountability requirements required by law (such as under the GDPR) to stronger and more granular accountability measures that may not be required by law but that organisations may nevertheless want to implement because they convey substantial benefits….(More)”.

Regulation by Blockchain: The Emerging Battle for Supremacy between the Code of Law and Code as Law


Paper by Karen Yeung at Modern Law Review: “Many advocates of distributed ledger technologies (including blockchain) claim that these technologies provide the foundations for an organisational form that will enable individuals to transact with each other free from the travails of conventional law, thus offering the promise of grassroots democratic governance without the need for third party intermediaries. But does the assumption that blockchain systems will operate beyond the reach of conventional law withstand critical scrutiny?

This is the question which this paper investigates, by examining the intersection and interactions between conventional law promulgated and enforced by national legal systems (ie the ‘code of law’) and the internal rules of blockchain systems which take the form of executable software code and cryptographic algorithms via a distributed computing network (‘code as law’).

It identifies three ways in which the code of law may interact with code as law, based primarily on the intended motives and purposes of those engaged in activities in developing, maintaining or undertaking transactions upon the network, referring to the use of blockchain: (a) with the express intention of evading the substantive limits of the law (‘hostile evasion’); (b) to complement and/or supplement conventional law with the aim of streamlining or enhancing compliance with agreed standards (‘efficient alignment’); and (c) to co-ordinate the actions of multiple participants via blockchain to avoid the procedural inefficiencies and complexities associated with the legal process, including the transaction, monitoring and agency costs associated with conventional law (‘alleviating transactional friction’).

These different classes of case are likely to generate different dynamic interactions between the blockchain code and conventional legal systems, which I describe respectively as ‘cat and mouse’, the ‘joys of (patriarchial) marriage’ and ‘uneasy coexistence and mutual suspicion’ respectively…(More)”.

Digital Switzerlands


Paper by Kristen Eichensehr: “U.S. technology companies are increasingly standing as competing power centers that challenge the primacy of governments. This power brings with it the capacity to bolster or undermine governmental authority, as well as increasing public demands for the companies to protect users from governments. The companies’ power raises serious questions about how to understand their role. Scholars have proposed varying conceptions, suggesting that the companies should be understood as public utilities, information fiduciaries, surveillance intermediaries, or speech governors. This Article takes up another possibility, one suggested by the companies themselves: that they are “Digital Switzerlands.”

The companies’ claim to be Digital Switzerlands encompasses two ideas: that the companies are on par with, not subordinate to, the countries that try to regulate them, and that they are in some sense neutral. This Article critically evaluates the plausibility of these claims and explores how the companies differ from other powerful private parties. The Digital Switzerlands concept sheds light on why the companies have begun to resist both the U.S. and foreign governments, but it also means that the companies do not always counter governments. Understanding the relationship between companies, users, and governments as triangular, not purely hierarchical, reveals how alliances among them affect the companies’ behavior toward governments. But the companies’ efforts to maintain a posture of neutrality also carry a risk of passivity that may allow governmental attacks on users to go unchallenged.

Turning to the normative, the Article proposes several considerations for assessing the desirability of having companies be Digital Switzerlands. Does the rise of the companies as competing power centers benefit individual users? Does the companies’ lack of democratic attributes render them illegitimate powers? If the companies claim the benefits of the sovereign analogy, should they also be held to the public law values imposed on governments, and if so, how? And if there is value in the companies acting as Digital Switzerlands, how can this role be entrenched to prevent backsliding? The Article offers preliminary answers to these questions, with the knowledge that the answers may well evolve along with the companies’ self-conception….(More)”.

The CrowdLaw Catalog


The GovLab: “The CrowdLaw Catalog is a growing repository of 100 CrowdLaw cases from around the world. The goal of the catalog is to help those wishing to start new or improve existing CrowdLaw projects to learn from one another.

Examples are tagged and searchable by four criteria:

  1. Level – What level of government is involved? Search by National, Regional, and/or Local
  2. Stage – At what stage of the law or policymaking process the participation take place? Search by Problem Identification, Solution Identification, Drafting, Decision Making, Implementation and/or Assessment
  3. Task – What are people being asked to contribute? Search by: Ideas, Expertise, Opinions, Evidence and/or Actions.
  4. Technology – What is the platform? Search by: Web, Mobile and/or Offline

The catalog offers brief descriptions of each initiative and links to additional resources….(More)”.

Health Insurers Are Vacuuming Up Details About You — And It Could Raise Your Rates


Marshall Allen at ProPublica: “With little public scrutiny, the health insurance industry has joined forces with data brokers to vacuum up personal details about hundreds of millions of Americans, including, odds are, many readers of this story. The companies are tracking your race, education level, TV habits, marital status, net worth. They’re collecting what you post on social media, whether you’re behind on your bills, what you order online. Then they feed this information into complicated computer algorithms that spit out predictions about how much your health care could cost them.

Are you a woman who recently changed your name? You could be newly married and have a pricey pregnancy pending. Or maybe you’re stressed and anxious from a recent divorce. That, too, the computer models predict, may run up your medical bills.

Are you a woman who’s purchased plus-size clothing? You’re considered at risk of depression. Mental health care can be expensive.

Low-income and a minority? That means, the data brokers say, you are more likely to live in a dilapidated and dangerous neighborhood, increasing your health risks.

“We sit on oceans of data,” said Eric McCulley, director of strategic solutions for LexisNexis Risk Solutions, during a conversation at the data firm’s booth. And he isn’t apologetic about using it. “The fact is, our data is in the public domain,” he said. “We didn’t put it out there.”

Insurers contend they use the information to spot health issues in their clients — and flag them so they get services they need. And companies like LexisNexis say the data shouldn’t be used to set prices. But as a research scientist from one company told me: “I can’t say it hasn’t happened.”

At a time when every week brings a new privacy scandal and worries abound about the misuse of personal information, patient advocates and privacy scholars say the insurance industry’s data gathering runs counter to its touted, and federally required, allegiance to patients’ medical privacy. The Health Insurance Portability and Accountability Act, or HIPAA, only protects medical information.

“We have a health privacy machine that’s in crisis,” said Frank Pasquale, a professor at the University of Maryland Carey School of Law who specializes in issues related to machine learning and algorithms. “We have a law that only covers one source of health information. They are rapidly developing another source.”…(More)”.

How Charities Are Using Artificial Intelligence to Boost Impact


Nicole Wallace at the Chronicle of Philanthropy: “The chaos and confusion of conflict often separate family members fleeing for safety. The nonprofit Refunite uses advanced technology to help loved ones reconnect, sometimes across continents and after years of separation.

Refugees register with the service by providing basic information — their name, age, birthplace, clan and subclan, and so forth — along with similar facts about the people they’re trying to find. Powerful algorithms search for possible matches among the more than 1.1 million individuals in the Refunite system. The analytics are further refined using the more than 2,000 searches that the refugees themselves do daily.

The goal: find loved ones or those connected to them who might help in the hunt. Since Refunite introduced the first version of the system in 2010, it has helped more than 40,000 people reconnect.

One factor complicating the work: Cultures define family lineage differently. Refunite co-founder Christopher Mikkelsen confronted this problem when he asked a boy in a refugee camp if he knew where his mother was. “He asked me, ‘Well, what mother do you mean?’ ” Mikkelsen remembers. “And I went, ‘Uh-huh, this is going to be challenging.’ ”

Fortunately, artificial intelligence is well suited to learn and recognize different family patterns. But the technology struggles with some simple things like distinguishing the image of a chicken from that of a car. Mikkelsen believes refugees in camps could offset this weakness by tagging photographs — “car” or “not car” — to help train algorithms. Such work could earn them badly needed cash: The group hopes to set up a system that pays refugees for doing such work.

“To an American, earning $4 a day just isn’t viable as a living,” Mikkelsen says. “But to the global poor, getting an access point to earning this is revolutionizing.”

Another group, Wild Me, a nonprofit created by scientists and technologists, has created an open-source software platform that combines artificial intelligence and image recognition, to identify and track individual animals. Using the system, scientists can better estimate the number of endangered animals and follow them over large expanses without using invasive techniques….

To fight sex trafficking, police officers often go undercover and interact with people trying to buy sex online. Sadly, demand is high, and there are never enough officers.

Enter Seattle Against Slavery. The nonprofit’s tech-savvy volunteers created chatbots designed to disrupt sex trafficking significantly. Using input from trafficking survivors and law-enforcement agencies, the bots can conduct simultaneous conversations with hundreds of people, engaging them in multiple, drawn-out conversations, and arranging rendezvous that don’t materialize. The group hopes to frustrate buyers so much that they give up their hunt for sex online….

A Philadelphia charity is using machine learning to adapt its services to clients’ needs.

Benefits Data Trust helps people enroll for government-assistance programs like food stamps and Medicaid. Since 2005, the group has helped more than 650,000 people access $7 billion in aid.

The nonprofit has data-sharing agreements with jurisdictions to access more than 40 lists of people who likely qualify for government benefits but do not receive them. The charity contacts those who might be eligible and encourages them to call the Benefits Data Trust for help applying….(More)”.

Activism in the Social Media Age


PewInternet: “This month marks the fifth anniversary of the #BlackLivesMatter hashtag, which was first coined following the acquittal of George Zimmerman in the shooting death of unarmed black teenager Trayvon Martin. In the course of those five years, #BlackLivesMatter has become an archetypal example of modern protests and political engagement on social media: A new Pew Research Center analysis of public tweets finds the hashtag has been used nearly 30 million times on Twitter – an average of 17,002 times per day – as of May 1, 2018.

Use of the #BlackLivesMatter hashtag on Twitter periodically spikes in response to major news events

The conversations surrounding this hashtag often center on issues related to race, violence and law enforcement, and its usage periodically surges surrounding real-world events – most prominently, during the police-related deaths of Alton Sterling and Philando Castile and the subsequent shooting of police officers in Dallas, Texas, and Baton Rouge, Louisiana, in July 2016.1

The rise of the #BlackLivesMatter hashtag – along with others like #MeToo and #MAGA (Make America Great Again) – has sparked a broader discussion about the effectiveness and viability of using social media for political engagement and social activism. To that end, a new survey by the Center finds that majorities of Americans do believe these sites are very or somewhat important for accomplishing a range of political goals, such as getting politicians to pay attention to issues (69% of Americans feel these platforms are important for this purpose) or creating sustained movements for social change (67%).

Certain groups of social media users – most notably, those who are black or Hispanic – view these platforms as an especially important tool for their own political engagement. For example, roughly half of black social media users say these platforms are at least somewhat personally important to them as a venue for expressing their political views or for getting involved with issues that are important to them. Those shares fall to around a third among white social media users.2

At the same time, the public as a whole expresses mixed views about the potential broader impact these sites might be having on political discourse and the nature of political activism. Some 64% of Americans feel that the statement “social media help give a voice to underrepresented groups” describes these sites very or somewhat well. But a larger share say social networking sites distract people from issues that are truly important (77% feel this way), and 71% agree with the assertion that “social media makes people believe they’re making a difference when they really aren’t.” Blacks and whites alike offer somewhat mixed assessments of the benefits and costs of activism on social media. But larger majorities of black Americans say these sites promote important issues or give voice to underrepresented groups, while smaller shares of blacks feel that political engagement on social media produces significant downsides in the form of a distracted public or “slacktivism.”…(More)”.

Bad Governance and Corruption


Textbook by Richard Rose and Caryn Peiffer: “This book explains why the role of corruption varies greatly between public services, between people, between national systems of governance, and between measures of corruption.

More than 1.8 billion people pay the price of bad government each year, by sending a bribe to a public official.

In developing countries, corruption affects social services, such as health care and education, and law enforcement institutions, such as the police. When public officials do not act as bureaucrats delivering services by the book, people can try to get them by hook or by crook. The book’s analysis draws on unique evidence: a data base of sample surveys of 175,000 people in 125 countries in Africa, Asia, the Middle East, Europe, and North and South America. The authors avoid one-size-fits-all proposals for reform and instead provide measures that can be applied to particular public services to reduce or eliminate opportunities for corruption….(More)”.

Virtualization of government‐to‐citizen engagement process: Enablers and constraints


Paper by Joshua Ofoeda et al: “The purpose of this study is to investigate the factors that constrain or enable process virtualization in a government‐to‐citizen engagement process. Past research has established that most e‐government projects, especially in developing countries, are regarded as total failure or partial failure.

Citizens’ unwillingness to use government electronic services and lack of awareness are among some of the reasons why these electronic services fail.

Using the process virtualization theory (PVT) as theoretical lens, the authors investigated the various activities within the driver license acquisition process at the Driver and Vehicle Licensing Authority.

The PVT helped in identifying factors which enable or inhibit the virtualization of the driver license acquisition process in Ghana. Based on a survey data of 317 participants, we report that process characteristics in the form of relationship requirements affect citizens’ willingness toward the use of government virtualized processes. Situating the PVT within a developing country context, our findings reveal that some cultural and behavioral attributes such as socialization hinder the virtualization of some activities within the driver licensing process….(More)”.

Essentials of the Right of Access to Public Information: An Introduction


Introduction by Blanke, Hermann-Josef and Perlingeiro, Ricardo in the book “The Right of Access to Public Information : An International Comparative Legal Survey”: “The first freedom of information law was enacted in Sweden back in 1766 as the “Freedom of the Press and the Right of Access to Public Records Act”. It sets an example even today. However, the “triumph” of the freedom of information did not take place until much later. Many western legal systems arose from the American Freedom of Information Act, which was signed into law by President L.B. Johnson in 1966. This Act obliges all administrative authorities to provide information to citizens and imposes any necessary limitations. In an exemplary manner, it standardizes the objective of administrative control to protect citizens from government interference with their fundamental rights. Over 100 countries around the world have meanwhile implemented some form of freedom of information legislation. The importance of the right of access to information as an aspect of transparency and a condition for the rule of law and democracy is now also becoming apparent in international treaties at a regional level. This article provides an overview on the crucial elements and the guiding legal principles of transparency legislation, also by tracing back the lines of development of national and international case-law….(More)”.