11.11.1. Will proposed privacy laws have an effect?
+ I suspect just the opposite: the tangled web of laws-part
of the totalitarian freezeout-will "marginalize" more
people and cause them to seek ways to protect their own
privacy and protect themselves from sanctions over their
actions
+ free speech vs. torts, SLAPP suits, sedition charges,
illegal research, etc.
- free speech is vanishing under a torrent of laws,
licensing requirements, and even zoning rules
+ outlawing of work on drugs, medical procedures, etc.
- against the law to disseminate information on drug use
(MDMA case at Stanford), on certain kinds of birth
control
- "If encrytion is outlawed, only outlaws will have
encryption."
+ privacy laws are already causing encryption ("file
protection") to be mandatory in many cases, as with medical
records, transmission of sensitive files, etc.
- by itself this is not in conflict with the government
requirement for tappable access, but the practical
implementation of a two-tier system-secure against
civilian tappers but readable by national security
tappers-is a nightmare and is likely impossible to
achieve
11.11.2. "Why are things like the "Data Privacy Laws" so bad?"
- Most European countries have laws that limit the collection
of computerized records, dossiers, etc., except for
approved uses (and the governments themselves and their
agents).
- Americans have no such laws. I've heard calls for this,
which I think is too bad.
- While we may not like the idea of others compiling dossiers
on us, stopping them is an even worse situation. It gives
the state the power to enter businesses, homes, and examine
computers (else it is completely unenforceable). It creates
ludicrous situations in which, say, someone making up a
computerized list of their phone contacts is compiling an
illegal database! It makes e-mail a crime (those records
that are kept).
- they are themselves major invasions of privacy
- are you going to put me in jail because I have data bases
of e-mail, Usenet posts, etc.?
- In my opinion, advocates of "privacy" are often confused
about this issue, and fail to realize that laws about
privacy often take away the privacy rights of _others_.
(Rights are rarely in conflict--contract plus self-privacy
take care of 99% of situations where rights are purported
to be in conflict.)
11.11.3. on the various "data privacy laws"
- many countries have adopted these data privacy laws,
involving restrictions on the records that can be kept, the
registration of things like mailing lists, and heavy
penalties for those found keeping computer files deemed
impermissable
- this leads to invasions of privacy....this very Cypherpunks
list would have to be "approved" by a bureaucrat in many
countries...the oportunites (and inevitabilities) of abuse
are obvious
- "There is a central contradiction running through the
dabase regulations proposed by many so-called "privacy
advocates". To be enforceable they require massive
government snooping into database activities on our
workstatins and PCs, especially the activities of many
small at-home businesses (such as mailing list
entrepreneurs who often work out of the home).
"Thus, the upshot of these so-called "privacy" regulations
is to destroy our last shreds of privacy against
government, and calm us into blindly letting even more of
the details of our personal lives into the mainframes of
the major government agencies and credit reporting
agenices, who if they aren't explicitly excepted from the
privacy laws (as is common) can simply evade them by using
offshore havesn, mutual agreements with foreign
investigators, police and intelligence agencies." [Jim
Hart, 1994-09-08]
11.11.4. "What do Cypherpunks think about this?"
+ divided minds...while no one likes being monitored, the
question is how far one can go to stop others from being
monitored
- "Data Privacy Laws" as a bad example: tramples on freedom
to write, to keep one's computer private
11.11.5. Assertions to data bases need to be checked (credit,
reputation, who said what, etc.)
- if I merely assert that Joe Blow no longer is employed, and
this spreads...
Next Page: 11.12 National ID Systems
Previous Page: 11.10 Police States and Informants
By Tim May, see README
HTML by Jonathan Rochkind