1.
Introduction and Background ^
2.1.
International Standards of Human Rights ^
(2) Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.
(3) Compliance with this rules shall be subject to control by an independent authority.
Originally this article was supposed to start with a right to anonymity:«Everyone has the right of protection of her or his identity.»20 In this context the members of convention discussed the right of anonymous access to the Internet.21 There is no doubt that the protection of anonymous speech is vital to democratic discourse. As the U.S. Supreme Court already stated:«Anonymity is a shield from the tyranny of the majority […] It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation – and takes ideas from suppression – at the hand of an intolerant society.»
2.2.1.
Volkszählungsurteil ^
The German Federal Constitutional Court defined informational self-determination (informationelle Selbstbestimmung) as a basic right.22 In its pathbreaking decision «Volkszählungsurteil» in 1983, the court postulated this in respect to human dignity (Article 2 (1) in connection with Article 1 (1) of the German Constitution (Grundgesetz). The court pointed out that the «new» fundamental right is essential for private live and for democracy.
- personal data shall be processed only for a certain purpose and
- that individuals have a right to know to what extent their data is processed (requirement for transparency),
- that every interference by the state must be proportional.25
2.2.2.
«Großer Lauschangriff » ^
- the role that one´s home and its physical place plays in insuring «the right to be let alone.»
- Information privacy as a basic right is necessary for the free development of a personality and of a liberal democracy.
2.2.3.
Secret Online-Search ^
- Transparency (the use of security technology has to be apparent to the data subject.
- Openness (Requirement for truthful information about the pros and cons of security technology in special contexts).
- Careful Treatment (In cases where the identification of a specific individual is not necessary for security purposes, it must be avoided.
- Respect for legal requirements (Security technology has to comply with legal requirements. For example, security technology must support the person´s rights of rectification, erasure or blocking the data in an e-democracy).
3.
Final Remarks ^
Marie-Theres Tinnefeld, Professor; University of Applied Sciences München, Germany,tinnefeld@hm.edu
- 1 See, for example Doesinger, Virtually Home, in Eberspächer/Hertz (Eds.), 2008, pp. 29-37.
- 2 Cited after Miguel Held, Delete it or leave it?, Internationsla Tribune, December 13, 2010, p. 14.
- 3 Palfrey/Gasser. Generation Internet (2008), pp. 63-101. For a similar conclusion regarding the absence of privacy on the Internet, see Schwarz, Privacy and Democracy in Cyberspace, 52 Vanderbilt L.Rev. 1647 (1999).
- 4 See critical comments by Leutheusser-Schnarrenberger, ZRP (2007), p. 9.
- 5 Simitis, KritV 83 (2000), p. 365.
- 6 See Sakia Sassen: Digital Networks and the State: Some Governance Questions, Theory, Culture & Soc`y, Aug. 2000, pp. 19-34; Sassen, Das Paradox des Nationalen (2008), pp. 523-60.
- 7 BVerfGE 109, 279; W. Hassemer, EuGRZ (2005), p. 300 and p. 302.
- 8 BVerfGE 120, 274 -350= NJW (2008), p. 822.
- 9 BVerfGE 65, 1 (75).
- 10 See under:www.bundesverfassungsgericht.de/entscheidungen/cs20090303_2bvc000307.html . The decision is published under: K&R (2009), pp. 255-260 , DVBl (2009), pp. 511-516, MMR (2009), pp. 316-321, JZ (2009), pp. 566-572 and NVwZ (2009), pp. 708-715 For a further discussion about E-Voting and E-Security see Oppliger, digma (2008), pp. 82-85.
- 11 Popper, Karl: Die offene Gesellschaft und ihre Feinde, Band I, 6. Auflage, München (1980).
- 12 Osen, Janet: In the Battle of the Bits – Final Score: Internet I, Congress O, Network Security (1997) pp. 12-16.
- 13 See Article 19 – Global Campaign for Free Expression.
- 14 BVerfGE 20, 162 (174 f.) – Spiegel; BVerfGE 117, 244 – Cicero.
- 15 http://wikileaks.org ; seehttp://en.wikipedia.org/wiki/Wikileaks ;www.lawblog.de/index.php/archives/2010/12/07/kriegsgerat-serverplatz/ .
- 16 See par example Der Spiegel, Enthüllt. Wie Amerika die Welt sieht (2010), pp. 21-27.
- 17 Rossnagel, MMR (2007), p. 16.
- 18 Frowein, in: Frowein/ Peukert (Eds.), Europäische Menschenrechtskonvention, EMRK-Kommentar, 3. Aufl. (2009), Art. 8 Rdnr. 1.
- 19 ECHR, 16.02. 2000, Amann vs. Schweiz, § 65 (OJZ 2001, p. 71).
- 20 See CHARTE 4123/1/00 REV 1 Convent 5.
- 21 See Bernsdorff/Borowsky, Charter der Grundrechte der Europäischen Union. Aufzeichnungen und Sitzungsprotokolle (2002), p. 155.
- 22 BVerfGE 65, 1.
- 23 Warren/Brandeis: The Right to Privacy, 4 Harv. L. Rev. (1890) pp.193-197.
- 24 Westin: Privacy and Freedom (1967).
- 25 BVerfGE 65, 1 (43).
- 26 BVerfGE 65, 1
- 27 Tor: anonymity online:www.torproject.org/ .
- 28 See Brunst, Anonymität im Internet – rechtliche und tatsächliche Rahmenbedingungen (2009), pp. 225-234..
- 29 BVerfGE 109, 275 (314); BVerfGE 65, 1 (46).
- 30 BVerfGE 109, 275 (279).
- 31 BVerfGE 120, 274-350.
- 32 Id. Part. 200. See Hoffmann-Riem, JZ (2008), p. 1009 (1010); Petri DuD (2008) p. 443; Rogan (Ed.): Online-Durchsuchungen – Rechtliche und tatsächliche Konsequenzen des BVerfG-Urteils vom 27. Februar 2008 (2008). Uepmann-Wittzak (Ed.), Das neue Computergrundrecht (2009).
- 33 BVerfGE 6, 31 (41); BVerfGE 109, 279 (311).
- 34 See Papier: Das Volkszählungsurteil des Bundesverfassungsgerichts, in: Der Bundesbeauftragte für den Datenschutz und die Informationsfreiheit, Dokumentation, 1. Auflage (2009), p. 15 and p. 22; Tinnefeld, DuD (2009), pp. 490-494.
- 35 Spinoza, Theologisch-politischer Traktat (1670), p. 20.