statcounter

Saturday, 26 December 2009

L'HADOPI se compose

La nouvelle est tombee par Decret du 23 Decembre 2009 (voir commentaire sous HADOPI 1+2 = 3). Les Membres sont nommés pour six ans selon la loi du 12 juin 2009'
Ils éliront leur président, également pour six ans, parmi les trois membres désignés par le vice-président du Conseil d’Etat, le premier président de la Cour de cassation et le premier président de la Cour des comptes. Il s’agira soit de Jean Mustelli, Marie-Françoise Marais, ou Patrick Bouquet.

1 - membre titulaire désignés par le vice-président du Conseil d'Etat

M. Jean MUSITELLI, 62 ans, Conseiller d’Etat depuis 2001, a été professeur d’italien avant d’intégrer le Ministère des Affaires étrangères en 1979. Il a au cours de sa carrière diplomatique, jusqu’en 2002, occupé plusieurs postes, auprès de l’Ambassade de France en Italie, de la Présidence de la République (notamment comme porte-parole) et de l’UNESCO où il a représenté la France de 1997 à 2002, alors même que les Etats-parties à l’UNESCO convenaient des termes du mandat confié au Secrétariat général pour la négociation d’une Convention internationale sur la protection et la promotion de la diversité des contenus culturels. Il a également été président de l’Institut national du Patrimoine (jusqu’en 2008) et est, depuis 2007, Président de l’Autorité de régulation des mesures techniques (chargée de la bonne mise en œuvre de la législation européenne relative aux droits d’auteurs et aux droits voisins).

Son expérience en fait un des meilleurs spécialistes en Europe de la régulation de l’économie de la culture et de l’audiovisuel et un des plus brillants avocats du combat européen en faveur de la promotion de la diversité des contenus culturels.

2 - membre désignés par le premier président de la Cour de cassation

En tant que membre titulaire : Mme Marie-Françoise Marais.

Conseiller à la Cour de cassation, 1° chambre, en charge des affaires de propriété littéraire et artistique, Marie-Françoise MARAIS a antérieurement été Présidente de la 4° chambre de la Cour d’appel de Paris spécialisée en matière de propriété intellectuelle.

Mme MARAIS est également Vice- Présidente du CSPLA (Conseil Supérieur de la Propriété Littéraire et Artistique), Présidente de la CNIS (Commission Nationale des Inventions de Salariés) et membre de la CEPC (Commission d’Examen des Pratiques Commerciales).

En tant que membre suppléant :
M. Dominique Garban. Conseiller a la Cour de Cassation. Admis a la retraite maintenu en activite par Decret du 6 Novembre 2009

Parmi les personnaites 'qualifiées désignées', le député UMP Franck Riester (ancien rapporteur de la loi “Création et internet” à l’Assemblée), le sénateur UMP Michel Thiollière (ancien rapporteur de la loi “Création et internet” au Sénat), l’ancien ministre de la Culture Jacques Toubon, Philippe Bélaval (récemment nommé président du Conseil supérieur de la propriété littéraire et artistique), Chantal Jannet (Présidente de l’UFCS). Ainsi qu’une partie des responsables de l’Autorité de Régulation des Mesures Techniques(ARMT) qui doit disparaître pour laisser place à l’Hadopi : Jean Berbineau (actuel secrétaire général), Jean Musitelli (actuel président), Marie-Françoise Marais (conseillère à la cour de Cassation et membre de l’ARMT), et Patrick Bouquet (conseiller-maître à la Cour des comptes et et membre de l’ARMT).

Trois magistrats sont a la tete de la Commission de protection des droits (CPD) chargée de la mise en œuvre effective de la riposte graduée: Mireille Imbert-Quaretta (Conseiller d’Etat), Jean-Yves Monfort (Président du TGI de. Versailles) et Jacques Bille.


On attend toujours - une surprise? - le décret portant sur la création de l’Hadopi qui n’a pas encore été publié.


Thursday, 17 December 2009

Loi Hadopi 1 + 2 = 3 ?

Un excellent developpement sur les suites de la loi et HADOPI :
Droit et Technologies:
"Avec l'adoption d'Hadopi 2, le système initial prévu pour la protection des droits d'auteur sur Internet est désormais entré en vigueur. Une Hadopi 3 sera-t-elle nécessaire pour parfaire ce dispositif ? En effet, la loi ne donne pas de définition précise de la contrefaçon en ligne. Il faudra aussi, entre autres choses, préciser les modalités dans lesquelles les victimes de contrefaçon pourront demander réparation de leur préjudice."

http://www.droit-technologie.org/actuality-1282/loi-hadopi-1-2-3.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+droit-technologie%2FRnCH+%28Les+actus+du+Droit+des+Nouvelles+Technologies%29&utm_content=Google+International

Voir egalement sur Copyright et le Gouvernement Sarkozi:
UMP = Un Mouvement Pirate http://is.gd/5qSS7
Sarkozy -UMP a nouveau pris la main dans le sac, apres trois avertisements, on leur coupe la connection?http://bit.ly/6Ur9Rs
En anglais:
Three strikes Sarkozy's Party Found Violating Copyright Again http://bit.ly/6Ur9Rs
Doctorlaura: Third strike strike? Techdirt covers French UMP party violation of music copyright in political videohttp://bit.ly/6crr0S

Pour plus d'info sur le context, en anglais:
A piece of fun music copyright education by L Lessighttp://bit.ly/4WP8cy

Sur la 'tache d'huile' d'HADOPI dans le monde:
UK House of Lords Follow China and Australia, Propose Internet Censorship Bill http://bit.ly/68gDgO
UK House of Lords Follow China and ... http://bit.ly/8Wpi0E
New Zealand Reintroduces 3 Strikes Lawhttp://bit.ly/5GQM5R
ACTA : ce qu'on ne vous dit pas...http://bit.ly/5J6vjx

Tuesday, 15 December 2009

Google CEO Eric Schmidt says privacy isn't important

Google CEO Eric Schmidt says privacy isn't important, and if you want to keep something private, "maybe you shouldn't be doing it in the first place" (in other words, "innocent people have nothing to hide.")


Dr Eric Schmidt is very clever and wise. However, this hasn't always been Google's position. Has he changed his mind?


Google CEO On Privacy (VIDEO): 'If You Have Something You Don't Want Anyone To Know, Maybe You Shouldn't Be Doing It'

In July 2009, few months ago, he was wise enough to declare:

Eric Shmidt Interview July 2009: "I don't think anyone wants everything revealed. That's why we have doors and shades and so forth."

"..behavior of PPL online when they are teenagers. This isn't the sort of thing that they want to know when they are mature adults in leadership positions"

"...I have a specific suggestion that it should be common and legal to change your name at the age of twenty-one and say, "That wasn't me. It was a different person"'....

"I'm very strongly in favour of an individual's right of privacy but I'm very suspicious about Governments ..."

"...our Company makes a commitment to people to respect people's privacy and their personal information because it's central to the trust ..."

Read the entire interview transcript of Eric Schmidt for Marketplace in July 2009 http://bit.ly/EN1PB


Before that, in 2005, 'Google blackballed CNet's reporters after CNet published personal information about Schmidt's private life: ""Google representatives have instituted a policy of not talking to CNET News reporters until July 2006 in response to privacy issues raised by a previous story..."

A considerable amount of information is available through Google's applications and someone with access to Google's databases could find out about personal emails, locations, shopping, reading, preferences, travelling, etc...

The risk is that hackers, zealous government investigators, or even someone accessing this information using Google abuse that information. As Google, offering its services free of charge, processes a mountain of collected information, it has no liability to users.

It is a fact that if we directly paid Google we would be less vulnerable. At the moment, we pay a dangerous price with our privacy that is tremendously valuable.
Entering directly in contract with Google would make the company accountable.
As a free provider of services, Google inevitably lacks concern for our data: there have been incidents of data loss, human error (data sent out by mistake). We have no idea of how data are secured, what is done with our data and how it is processed. We need more transparency and maybe external audit of the mega giant activities.
Google is benefiting from a quasi monopolistic situation. Google just aggregates so much that it IS a serious threat to our privacy, reputation, identity, finances, career, health, etc…
We cannot trust Google any more. Don’t be evil when openly Google is under-estimating the value of our privacy.


Of course, Google is not immune from human mistakes, see:

The Rocky Mountain Bank’s customers private data revealed for random users because of humane mistake - Bank sues Google

http://blog.gwebs.com/index.php/2009/10/12/the-rocky-mountain-banks-customers-private-data-revealed-for-random-users-because-of-humane-mistake-bank-sues-google/

When Google Runs Your Life

http://www.forbes.com/forbes/2009/1228/technology-google-apps-gmail-bing.html

Google CEO Eric Schmidt Dismisses the Importance of Privacy

http://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy

Dan Solove: "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy" http://bit.ly/NtYuE answers E Schmidt

http://www.huffingtonpost.com/2009/12/07/google-ceo-on-privacy-if_n_383105.html

'

Google CEO says privacy doesn't matter. Google blacklists CNet for violating CEO's privacy.'

http://www.boingboing.net/2009/12/09/google-ceo-says-priv.htm

Tag: Google Privacy data Eric Schmidt user database

Wednesday, 2 December 2009

Letter to my MP

........

The reason of this email is to point out to you the importance of the impact of the Digital Economy Bill.

Today, you will be at the Parliament for the Oral Questions at 3pm, followed by the second reading of the this bill.

I would like you to consider the importance of this legislation in the light of my remarks and articles I am sending you to preserve the right balance between Copyright and free speech and the right to access to internet.

The 'Three Strikes' proposal cannot be operative as it is unpractical:

- Different users accessing from the same computer or same network in the community are exposed to punishement for an act allegedly committed by one individual. This creates a collective liability.

- IP snooping: someone could easily hack the IP address of an internet access user to download infringing materials,

- Computers can be infected by malicious software, spyware or become a member of a bootnet attack.

- it is not realistic to expect every user to be able to adequately secure its network access while this is not offered as a default setting. Therefore, it becomes easy for anyone to hack into private networks for illegal downloads.

This goes against the UK and EU E-commerce Regulations. See Professor Liliane Edwards reaction after a pub was fined £8K for an infringing download from the open Wifi hotspot.

- The notice letters have a good chance of ending up in the spam box and legitimately being ignored by account holders who won't be able to verify the authenticity of the warning. Remember many networks are accessed by several users (children, adults, friends, au-pairs, etc...) and many account holders are not tech-savvy.

- In our lives today, internet access is not a luxury anymore. Children need access for their study and this is the way it should go. Digital technologies are a great booster of knowledge and education. Workers need internet access. Consumers need internet access. Citizens need digital access and personal democracy. Promoting transparency and participation need to be the priority.
Instead, the new digital Economy Bill is opening the door to Deep Packet Inspection (as opposed to Net Neutrality) in the interest of the music industry. This represents a serious threat to our privacy. See: 'When Rights Clash Online: The Tracking of P2P copyright Infringement vs Ec Personal Data Directive.' by Okechukwu Benjamin Vincents, National University of Singapore http://works.bepress.com/okechukwu_vincents/4/
When Rights Clash Online: The Tracking of P2p Copyright Infringement vs. EC Personal Data Directive http://works.bepress.com/okechukwu_vincents/4/


- Often the internet service provider is also a provider of other primordial services such as telephone line or TV. What happens to the household when it is cut from the services? Should they maintain the monthly payments for an interrupted service?

I would also like to point out here the benefit of digital environment for the Music industry: No cost of premises, no shop, no print, no CD box, no staff, no shop cost etc... Instead fast music download with DRM (Digital Right Management protecting the re-production of the music in several support).

You can have a look at this graph : 'Do music artists fare better in a world with illegal file-sharing?'

Ultimately, I invite you to consider reading :

- From the Electronic Frontier Foundation:

A Pirate-Finder General for the UK?


'My Digital Economy Bill letter to the House of Lords Science and Technology Committee'

'Mandelson's Madness'
http://www.computerworlduk.com/community/blogs/index.cfm?blogid=14&entryid=2646

Wednesday, 18 November 2009

Cameras de surveillance

L’etat en charge des came ras de sur veillance ne fera jamais rien de mal, soyons confiants.

Vous revez de don ner VitamineD a Google StreetView? La nou velle gene ra tion de Google Street View came ras “immer sive 360 video’ (sphe ri cal video) est capable d’enregistrer des images videos et non plus sim ple ment des shots fixes, inter ac tives et navi gables a dis tance pour vision ner sous angles mutiples.
Cessons d’etre para noia, ‘omni veillance’ n’est qu’un mythe qui occupe quelques aca de­miques en mal de ‘Human Rights’ (Voir Josh Blackman du George Mason University School of Law ‘Omniveillance, Google, Privacy in Public and the Right to Your Digital Identity: A Tort for Recording and Disseminating and Individual’s Image Over the Internet’).
Les came ras de sur veillance et des pro cedes comme celui de EarthCam avec INTERNET video sur veillance 24/24 existent deja. StreetView n’en est qu’une exten sion a plus grande echelle.
Grace aux pro grammes de recon nais sance faciale (facial soft ware recog ni tion) et l’aide de com pa nies comme Everyscape (qui cherche a etendre la video-surveillance dans des zones rurales) et Earthmine (qui deve loppe des tech no lo gies per met tant d’enregistrer les maga sins, res tau rants et autres lieux publics) nous serons bien tot en pleine ‘secu rite’. Ces nou velles techn lo gies vont per mettre une dif fu sion elec tro nique la plus large jamais vu. Nous allons droit vers ce que Berners-Lee, l’inventeur du Web, avait pre dit comme etant l’avenir du net: le ‘web seman tic’ ou les don nees indi vi duelles seront expo sees sous toutes les cou tures en ligne.
Avec les pro cedes de ‘tag ging’ et les pro cedes de ‘recon nais sance faciale’ comme Google Picasa, les sujets peuvent etre auto ma tique ment indexes et tages sur l’image. Le pro cede Polar Rose est capable de scan ner le web regrou pant ainsi toutes les pho tos dis po nibles et iden ti fiees sur le web. Toujours selon Berners-Lee le tag ging serait une des clefs du ‘web seman tic’ vers lequel nous nous diri geons.
Grace au moteur de recherche Google, il devient aise de retrou ver l’identite de la per sonne pho to gra phiee, d’y asso cier ses don nees per son nelles, ses pre fe rences, amis et autres don­nees dis po nibles et eparses dans le web. Google s’est dit deve lo per un pro gramme de ‘visual craw ling’ pour les ana lyses faciales et ana lyses sceniques.

Quelle avan cee!!
Oui mais tout ceci se passe de l’autre cote de l’Atlantique?

Detrompez-vous, la France n’a rien a envier aux ame ri cains. C’est une com pa nie fran caise, Quividi, qui a ins talle a New York des pan neaux publi ci taires equipes de came ras et d’ordinateurs puis sants capables d’analyser les visages de pas sants devant les came ras pour leur ser vir une publi cite sur-mesure adap tee a leur age et sexe detre mi nee par le logi­ciel. Le pro cede qui devait etre uti lise a la sta tion Charles de Gaulle Etoile a Paris.
Dan Solove, un autre aca de mique ame ri cain qui a beau coup tra vaille sur le sujet, met l’accent sur le dan ger de rendre public les moments intimes d’autant que sorti hors contexte, les sujets n’ont pas la pos si bi lite de rec ti fier leur image sur inter net. Ces enre gis tre ments, dif fu­sions et archi vages des don nees enlevent aux indi vi dus le droit de reha bi li ta tion. Comme un ele phant, l’internet n’oublie jamais dit Blackman (voir ega le ment Bernhard Warner: ‘How To Be UnGoogleable’ Times Online 28 Mai 2008). Ce que d’autres ont appele la theo rie de la conser va tion de la matiere, ce qui est dif fuse sur inter net, meme repris, ne s’efface jamais et ne laisse aucune chance au repenti. C’est dif fuse a grand echelle, a grande vitesse et sou­vent sans seconde lec ture et ne laisse aucune seconde chance. La ‘dog poop girl’ et le ‘star wars boy’ n’en sont que les vic times les plus celebres.

Mais, pas de para noia, ne crai gnons rien, tout va bien Madame la Marquise, dans le meilleur des mondes sur veilles a la moelle!!


VOIR: La vidéo surveillance de demain s’invente aujourd’hui

http://fr.readwriteweb.com/2009/11/18/a-la-une/la-video-surveillance-demain/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+readwriteweb-france+%28ReadWriteWeb+France%29

Friday, 2 October 2009

Le respect de la Loi pour tous et par tous

This time, I am writing in French, not only because it's easier for me but because it's in reaction to articles published in French about the HADOPI law combined with what is now called 'l'affaire Polanski'. I hope to bring an English version later, please be patient or try to translate.

Un parallele trop facile a ne pas manquer avec l'HADOPI, me ramene a une mathematique tres simple:

On s'emeut du dommage cause a l'industrie de la musique, on invente une belle loi - a l'ere du numerique ou l'Europe s'acharne a reduire la division digitale pour donner un acces plus large a l'internet et au savoir libre. Cette belle loi passe d'abord inappercue par les deputes absents de l'hemicycle pour raisons estivales. Finalement, apres un petit passage au Conseil Constitutionel, on decide qu'apres deux alertes au titulaire d'une connection internet - alerte par email qui risquera de s'egarer dans la boite spam, puis par courrier, s'il n'est pas optempere, la connection sera interrompue POUR UNE ANNEE ENTIERE et le titulaire du compte N'AURA PAS D'AVANTAGE LE DROIT DE MIGRER VERS UN AUTRE SERVICE, pour le service internet pas plus que les services annexes tel que telephone ou television pendant toute cette periode!!!! LA LOI EST L'ORDRE et on exige un stricte respect des droits des artistes maisons de disques.

L'enjeu est trop important pour s'egarer avec des considerations de respect de la vie privee - surveillance et lynchage - ou les difficultes techniques qui se presentent:

- de plus en plus l'acces a internet est devenu un passage oblige pour des inscriptions, pour des enregistrements, pour des devoirs a la maison etc....

- la possibilite de se faire exturper son numero d'adresse IP est loin d'etre negligeable. Ce qui veut dire que pour commettre la haute infraction de telechargement illegal, des tiers utiliseront l'adresse IP d'un innocent utilisateur pour qui la charge de la preuve est renversee et devra, avec beaucoup de peine se battre pour essayer de prouver son innocence!!!

- comment veut-on contraindre tous les internautes connectes, y compris les non- professionels avec des connaissances techniques limites, d'etre responsables de la surveillance de leur connection, gardien de toute intrusion exterieure sur le reseau? ET je pense ici a beaucoup de pere ou mere de famille mais aussi a beaucoup de cafes ou restaurants en France qui ont bien voulu mettre gratuitement a disposition de leur clientele des acces hot spot ou wifi. Que va-t-il se passer lorsque des criminels malfaisants se seront empares de ces connections pour commettre le crime que je ne rappelerai pas??

ON COUPE!!!

Solution pour le moins radicale.

Maintenant, revenons a notre grand realisateur, couvert d'honneur avec un talent immense qui a souffert l'holocaust et a vu sa femme enceinte sauvagement assasinee.

J'ai une grande sympathie pour cet homme dont ma jeunesse a ete remplie par ces realisations. Je me souviens m'etre precipitee lorsque j'etais etudiante a Paris a aller le voir au theatre sur scene, quel acteur et quelle sensibilite!! Qui n'a pas vu Tess et n'a pas admire cette vague de photographies et de cartes postables de jeune filles embrumees qui l'ont suivie!!!

Aujourd'hui, je decouvre que ce grand talent a une tache dans sa vie!

J'entends Mr Bernard Kouchner me dire que tout ceci est 'un peu sinistre' alors qu'un mendat d'arret international est lance contre le genie et qu'il est arrete en Suisse. Je fais ma recherche - grace a ma connection haut debit internet - et decouvre que l'histoire n'est pas si claire que nos ministres francais veulent nous le presenter.

En quelques coups de clicks, j'apprends:

1- Monsieur Roman Polanski, citoyen francais, a eu des rapports sexuels avec une jeune fille de 13 ans en 1977 dans la maison de Jack Nicholson - un autre de mes idoles du cinema - durant son absence.

2-quatre chefs d'inculpation avaient ete retenus contre lui a l'origine pour avoir penetre oralement et par sodomie, sans consentement, la jeune fille qu'il avait au prealable fait denuder pour une petite trempette dans un jacuzzi, a qui il a fait boire du champagne et du Quaadrule, que je comprends etre un barbiturique. De plus, on a trouve en sa possession des photos 'topless' de la jolie jeune fille - dont il n'a pas nie savoir qu'elle n'avait que 13 ans - eh oui Monsieur Scorcez, il en savait plus que vous!!

S'il avait du jouer le role pour un film au cinema, il lui aurait fallu jouer le cliche type du pervers qui promet monts et merveilles a une jeune fille en mal de celebrite dont la mere n'avait pas trop le temps de penser a quoi sa petite fille de 13 ans allait bien pouvoir jouer dans cette belle maison hollywoodienne avec un homme de 42 ans lorsqu'elle l'a laissee seule avec (Ok d'accord, la compagne de Jack Nickolson etait au depart presente, mais je voulais eviter toute speculation mal venue sur ce que le TRIO aurait pu avoir gigote).

3- Face aux degats, Monsieur Polanski, probablement sur les conseils de ses avocats, decide de plaider coupable pour rapports sexuels avec mineur de 13 ans mais, nous dit-on, apres 42 jours d'expertise psychiatrique, il decide que l'incarceration n'est pas pour lui et s'envole pour son pays natal, qui l'acceuil a bras ouverts. Il y mene une vie pleine de succes, decide de limiter ses voyages dans les pays limitophes sachants respectes les droits des artistes de talents - evite bien sur la Grande Bretagne et s'achete un beau Chalet a Gstaadt en Suisse ou il a sejourne plusieurs mois cette annee.

4 - en bon gentelman il verse une compensation financiere a sa victime qui lui est reconnaissante et a meme ete jusqu'a demander a la justice de cesser les poursuites a son encontre.

5 - en 2008, un documentaire cinematographique Roman Polanski: Wanted and Desired, vient a sa rescousse argumentant entre autres que les regles de procedures n'avaient pas ete respectees. Que le juge avait discute de l'affaire avec un procureur qui l'aurait influence. On apprend aujourd'hui qu'un temoignage important du documentaire etait en realite mensonger, son auteur s'etant repenti. On sent la les efforts pour essayer de sauver le grand genie qui echouent.

6- depuis plus de trente ans, Monsieur Polanski est en vadrouille et la justice americaine tente de le repecher pour le faire juger car s'il a avoue et les faits ont ete reconnus par lui-meme, il doit etre juge pour decider de son emprisonnement et faire son temps en prison.

Et voila que mon heros realisateur/acteur genie du cinema se revele etre un evade de la justice pour des faits aussi graves commis non pas il y a trente ans et donc oublie comme veulent nous faire croire Messieurs Mitterand et Kouchner mais des FAITS RESTES IMPUINIS DEPUIS plus de trente ans, la nuance n'est pas faible!

Le Monde d'hier a publie une lettre ouverte d'un ancien confrere de Monsieur Polanski - non pas un cinesate mais un confrere en matiere de relations sexuelles avec mineure, bien que ce dernier avait lui beneficie du consentement de la jeune fille. Dans sa lettre, l'homme temoigne de son repenti apres avoir ete ecroue pour deux annees de prisons fermes (ou du moins avoir ete incarcere pour deux ans car il doit y avoir du preventif). Il a compris et paye pour le mal qu'il a cause a sa victime et 20 ans apres il est rehabilite. A lui, car rappelez-vous, il n'est pas un homme de talent avere, on lui demande deux fois par an de faire une retrospective 20 ans en arriere pour se rendre a un bureau ou il devra declamer son identite d'ancien pervers et justifier de sa residence!!!

C'est la, que je sorts de mon gong, IL Y A DEUX POIDS DEUX MESURES ET CE N'EST PAS JUSTICE.

Nous vivons dans un etat de droit ou le respect de la justice est POUR TOUS sans consideration de talent ou de fortune.

Je trouve aussi mal place - ou 'sinistre' comme aime le dire Monsieur Kouchner - d'envoyer Monsieur Polanski derriere les barreaux que tout autre pervers sexuels qui sont des hommes ou des femmes - car il y en a aussi.

Mais alors que faire? suivre la logique HADOPI?

C'etait la solution que ma grand mere pronait: 'les violeurs, on leur coupera le sexe. ca les fera reflechir' disait-elle.

La simple mathematique empreinte a HADOPI devient: 1 + 2 + 3 + 4 + 5 + 6 = ON COUPE

Mon dieu que d'hommes sans queue!!!

J'ai lu un jour, lorsque j'etais etudiante en droit, vers cette meme periode ou 'Tess' etait sur les ecrans, un livre intitule 'cris moins fort, les voisins vont t'entendre', dans ce livre on parlait de l'importance des violences sexuelles et familiales et l'auteur suggerait de faire le test de demander autour de soi combien de personnes avaient ete victimes de violences ou d'atouchements sexuels dans leur enfance. Depuis toutes ces annees, le nombre de reponses que j'ai entendu est effarant. J'en arrive a la conclusion que c'en est presqu'une pulsion naturelle. Heresie! Non, desolee, elle n'est pas naturelle cette pulsion, elle est perverse et doit etre controlee. C'est a la societe d'en trouver la solution pour aider ces individus a controler leurs faits et gestes pour proteger d'innocents enfants. Demandez aux psychologues ou aux psychanalistes les effets ravageux que de telles relations peuvent avoir sur des jeunes enfants. Souvenez-vous, beaucoup de ces enfants abuses, pouront a leur tour devenir des adultes abusifs a l'egard d'autres enfants. Ce qu'il nous faut s'est trouver le moyen d'interompre cette chaine de perversion et la prison et l'humiliation ne fera rien pour les guerir de ce mal si rependu.

Parents, apprenez a surveiller vos enfants, je me bats pour le faire dans le monde reel mais aussi, pour faire rappeler que le danger existe aussi dans le monde digital. Il faut apprendre a surfer en securite et rester vigilent.

J'ai dit.

Merci de me signaler les erreurs eventuelles.

NOTE: informations regroupees a partir d'articles parus sur:

http://en.wikipedia.org/wiki/Roman_Polanski:_Wanted_and_Desired

http://www.swissinfo.ch/eng/front/Polanski_arrest_cues_mixed_emotions.html?siteSect=108&sid=11279980&ty=st

http://prempanicker.wordpress.com/2009/09/30/wtf-is-rape-rape/

http://www.latimes.com/news/local/la-me-lopez30-2009sep30,0,1671827,full.column

Wednesday, 29 July 2009

Amazon Burns Orwell's E-Books

In reply to by Ryan Calo, post on July 17, 2009 - 2:04pm following Amazon' move in Kindle books:

http://cyberlaw.stanford.edu/node/6226#comments

I think I start to understand what ebooks can be :
They are like borrowing but with the price of a purchase. They are not a purchase, as neither can't they be resold nor given away, but they can easily be retracted by Amazon. With the advantage of 'traceability' as purchases via Amazon can be tracked down.

Now with regard to these two titles sudden 'overnight' evaporation :
1- I'm wondering how many people are possessing a kindle;
2- How many of these people have actually purchased the '1984' book of George Orwell. I have actually recently read that very few people had read this book!
3 - Knowing the high professionalism of the work of Amazone's lawyers, I'm very surprised that the contract binding publishers to Amazon would have allow them to retroactively 'decide to pull their content from the Kindle store'

Finally, I can only honor the way consumers and the press have reacted to make their voice heard and contest against an abusive decision.
One more positive of internet voice!!

Still need to understand how the story builds up at first. Reacting shortly after that happened, I was wondering how many people had been affected and how the information could have been circulated. I am amazed how quick the reaction started and the internet community could express its opposition,

Friday, 17 July 2009

Is TechCrunch going too far?

Trying to answer the questions I have received about the issue of TechCrunch publishing information about Twitter, I will make few remarks:

1- First, not being a techy expert, I cannot see how anyone needed to hack the Twitter website, hacking users' accounts in order to get into Twitter's employees account - by the way, who's names an accounts are openly published by Twitter - to guess the email account passwords to steal informations to send to the inbox of TechCrunch.

See : 'The guy (”Hacker Croll”) who claims to have accessed hundreds of confidential corporate and personal documents of Twitter and Twitter employees, is releasing those documents publicly and sent them to us earlier today.'

2- Eventually, after few hours of announcements, TechCrunch, having consulted their Lawyers, decided to publish SOME of these information. They expressly mention:
'the vast majority of these documents aren’t going to be published, at least by us.'

My question here is : what have they done with the rest of the documents, monetized?

3- Their final decision to publish the document is :

'a few of the documents have so much news value that we think it’s appropriate to publish them.'

Which is a legal justification to limit the right to privacy and confidentiality that benefits to Journalists and news reporters, the public interest to disclosure of news and comments.

4- Ultimately, TechCrunch publishes the information backing itself by a 'twitter' agreement, that is immediately questioned:

RT @ev @TechCrunch... "we have been given the green light by Twitter to post this information" What?! By whom? That's not our understanding


5- The jurisdiction applicable being the US, I would recommend this excellent legal analyze by Sam Bayard
Harvard's Citizen Media Law Project examines Twitter leaked doc case ...http://bit.ly/197Lwm
I fully agree with Sam that this is a question of ethic, judging if the publication of these 'stolen' documents - although there is no robbery as the information is not a property - is newsworthy enough to encourage hackers to pursue these sort of 'intrusions' in the future.



Monday, 13 July 2009

  1. IP Addresses and User Privacy


In Europe, experience with totalitarian governments has justified the search for stronger laws and policies for the protection of personal information. On the other hand, Google grew up in the US which has a rather liberal approach, emphasizing the First Amendment, and Freedom of Speech and information. There is no data protection commission or commissioners in the US equivalent to those in Europe. These two divergent approaches create uncertainty regarding what can be expected from a company like Google operating from the US but reaching EU users.


There has been ongoing discussion between EU authorities and Google since 2007 over the issue of collecting private information, which relates in particular to the issue of IP addresses and cookies.

Eventually Google consented to limiting the retention of personal data communicated by its users to nine months. However, there is still wide controversy as to whether Internet Protocol (“IP”) Addresses are, or are not, personal data that is subject to protection by the EU regulations. There is a significant divergence of privacy laws across the 27-member European Union complicating the regulation of an internet that has no frontiers.



Recently a Swedish Court has ruled that IP addresses are personal data.

On the other hand, a German Court has ruled that IP addresses are not personal data.

Under the latter interpretation storing IP addresses without additional information doesn't violate data protection legislation because they are not personal data - when stored by publishers they cannot be easily used to determine a person's identity and this lacks the 'necessary quality of determinability’ to be personal data. The identity cannot be determined without disproportionate burden using normally available knowledge and tools. They could be personal data in some cases but they are not generally.

However, Germany's Data Protection Commissioner, Peter Scharr has been leading research assessing the privacy policies of internet search engines operated by Google, Yahoo Microsoft and others and their compliance with the EU privacy law. Scharr told a European Parliament hearing on online data protection that when someone is identified by an IP 'then it has to be regarded as personal data'.



The UK Information Commissioner Office (ICO) Guidance of 2007 stipulates that IP Addresses, in isolation, will not be considered Personal Data unless and when used to build a profile on an individual or in the hands of an ISP. According to the guidance this is not technically an easy task. It adds that many IP addresses, particularly those allocated to individuals, are ‘dynamic’. Therefore, the allocated IP address is not permanent, although with the spread of the broadband, more and more connections are constantly maintained and the IP address is not often renewed. As for static IP Addresses, these can in the same way as some cookies be linked to a particular PC which may then be traced to an individual user. So, where a link is established to a static IP Address, the addresses and the profiles could be personal information.


Spain’s Data Protection Regulator, Artemi Rallo Lombarte, has criticized search engine operators for not trying to make their privacy policies accessible to normal people.

He said their policies "could very well be considered virtual or fictional... because search engines do not sufficiently emphasize their own policies on their home pages, nor are they accessible to users". He described the policies as "complex and unintelligible to users". Accessibility of terms of use and services is a common issue on the internet. An effort is certainly needed for the use of more plain language and better visibility. However, with limited choice and user knowledge accepting the standard terms is likely to be something of a formality.



The approach of the French Courts is indicated by the following. On 27 April 2007 the Paris Court of Appeal considered a case involving person to person computer networks and ruled that “the IP address does not allow the identification of the persons who used this computer since only the legitimate authority for investigation may obtain the user identity from the ISP. It should also be remembered that each computer connected to the Internet is identified by a unique number called an ‘Internet address’ or IP address that allows it to be found among connected computers or to find the sender of the message”. In a similar ruling on 15 May 2007, the Court argued that “this series of numbers indeed constitutes by no means indirect nominative data of the person in that it only relates to a machine, and not to the individual who is using the computer in order to commit a counterfeit.” The Court concluded that the collection of IP addresses does not constitute processing of personal data, and therefore there was no need for NIL prior authorization, as required by the French Data Protection Act.


These rulings do not seem to be fully consistent with the applicable European legal framework. The concept of “personal data” in Directive 95/46/EC does not require that an IP address allow identification of the user, but only that it relates to an identifiable natural person. The argument that an IP address only relates to a machine and not to the individual who is using it, is not convincing either.


On 6 September 2007, the Court of First Instance of Saint-Brieuc, came to the opposite conclusion.

According to the court, “The IP Address, is, strictly speaking, an identifier of a machine when the latter is connected to the internet, and not that of a person. However in the same way as a telephone number it is, strictly speaking, none other than a line for which a subscription has been made by a given person. An IP number associated with an internet access provider necessarily corresponds to the connection of a computer for which a given person has entered into a subscription with an access provider.”



On 12 December 2007 the Paris Court of Appeal issued a decision on the legal obligation of Google Inc., as a blog hosting provider, to retain data identifying a blog user. The court stated, inter alia, that “the user profile” that Google Inc. holds does not meet its obligation of user identification. The court was using this opportunity to require that the IP address be held by the hosting provider, even if it constitutes personal data that makes it possible to identify a computer.


However, in a similar case on 23 June 2008, the court of first instance of Paris ruled that the retention of IP addresses fulfills the above mentioned legal obligation of the host provider, because an IP address allows the identification of a blog user: “But given that, following the obligation in question, a web host has the duty to hold and retain data enabling the identification in question: that which the company JFG Networks sent in its mail of 23 April 2008 and that the technical intermediary” was able to provide the relevant services, it cannot be accused therefore of failing to fulfill its obligations in respect of the electronic address provided during its registration by the blog administrator.


The view of the US Courts is also uncertain. The Supreme Court of the State of New Jersey stated in its unanimous decision "We now hold that citizens have a reasonable expectation of privacy ... in the subscriber information they provide to internet service providers--just as New Jersey citizens have a privacy interest in their bank records stored by banks and telephone billing records kept by phone companies"


Admitting that IP addresses are private, the Supreme Court ruled that for the police to access an ISP’s log of surfing users a municipal court subpoena was not enough. They need a grand jury subpoena from higher court than usual. This case was an important step towards the recognition of IP addresses and the need to protect privacy in the digital world where so much can be easily collected. The Electronic Frontier Foundation, ACLU, EPIC Center and others, had filed a friend of the court brief in the case.



It’s important to note that in addition to the information collected via IP addresses there are expectations of privacy regarding clickstream data associated with it. "With a complete listing of IP addresses, one can track a person's Internet usage", the opinion reads. The court referred to a law review article by privacy expert Daniel Solove for the proposition that clickstream data can allow the government to learn "the names of stores at which a person shops, the political organizations a person finds interesting, a person's ... fantasies, her health concerns, and so on." The court went on to hold that users only disclose information to internet service providers for the limited purpose of being able to access the Web "and not to promote the release of personal information to others." "Under our precedents, users are entitled to expect confidentiality under these circumstances," the court wrote.


Surprisingly, more recently a Federal Judge in Seattle has held that IP addresses are not personally identifiable information.

According to U.S. District Court Judge Richard Jones: “In order for ‘personally identifiable information to be personally identifiable it must identify a person. But an IP address identifies a computer.” In this case, Microsoft was accused of violating user agreement by collecting IP addresses in the course of the updates. It is not technically impossible for Microsoft as well as Google to track the IP address to the user’s identity if the user is at the same time a client of their other services such as MSN mail services or Googlemail for Google. This is the reason why the EFF advises users at least not to search Google while connected to their Googlemail account.


Marc Rotenberg, executive director of the Electronic Privacy Information Center, criticized the Microsoft ruling as “a silly decision.” “The judge didn’t understand the significance of the IP address or the reason that it was collected,” he says.


He had also said that it was "absurd" for Google to claim that stripping out the last two figures from the stored IP address made the address impossible to identify by making it one of 256 possible configurations.


"It's one of the things that make computer people giggle. The more the companies know about you, the more commercial value is obtained." Privacy activists argue that IP addresses should count as a Personal data under the Data protection legislation.


The Hong Kong Privacy Commissioner has held a more conservative view, stating that An IP Ad per se does not meet the requirement of Personal Data.



For the record Microsoft has declared that it does not record IP Addresses that identify an individual PC.


The European Regulatory Perspective


The Committee of Europe's Privacy watchdog has said that an IP Address should be treated as Personal Data by ISPs and search engines even if they are not always Personal Data. 'Unless the ISP is in a position to distinguish with absolute certainty that the data correspond to users that cannot be identified it will have to treat all IP information as Personal Data to be on the safe side. These considerations apply equally to search engine operators'.


Ultimately, the EU regulator considers that 'IP addresses, strings of numbers that identify computers on the internet, should generally be regarded as Personal Information.' Most E.U. and national law that describes how personal data is handled was developed in the 1970s and a comprehensive overhaul is needed to meet the challenges of the Internet age. The new regulations need to take account of the development of Web 2.0 and Web 3.0.


A European Commission advisory panel, called the Article 29 Working Group, has worked to better understand the issue. The Panel found it useful to understand how the IP address operates. The latter are ‘series of digits (four digits comprised between 0 and 255). Every time that an individual goes onto the Internet using an Internet access device, for example to surf the Web, the Internet Service Provider (ISP) attributes an IP address to the device that he is using. But access providers know who is behind an IP address, and it is possible for a third party to correlate the information and determine to whom a profile corresponds.



This is how the search engine identifies a user and continually records the clicked links, the sites visited, ads viewed, as well as the key word searches made, frequency of use or visits to a given site. It correlates all of this information to the user IP’s address thanks to cookies placed on that person’s computer whenever he or she logs on to the Internet. Cookies are connection logs; they enable the websites to identify the users and record their “itinerary”.’ This is why the Electronic Privacy Information Center: finds it 'it is "absurd" for Google to claim that stripping out the last two figures from the stored IP Ad made the address impossible to identify by making it one of the 256 possible configurations'. ‘For a better traceability, many commercial websites make use of "ID cookies" which are stored on the visitor's computer in order to enable a unique recognition on the next visit. ‘In the case of search engines, the searching behavior is often recorded and retained for a certain period’ .


What is a Personal Data under the EU regulations:


95/46/EC, also known as the "Data Protection Directive", offers protection against the processing of private data. Article 2 sub (a) of the Directive reads as follows: "Personal data shall mean any information relating to an identified or identifiable natural person ("data subject"); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity".


The Article 29 Working Party issued its Opinion 1/2008 on data protection issues related to search Engines in April 2008.

The opinion concluded that the Data Protection Directive generally applies to the processing of personal data by search engines, even when their headquarters are outside the European Economic Area:

“Search engine providers must delete or irreversibly anonymize personal data once they no longer serve the specified and legitimate purpose they were collected for and be capable of justifying retention and the longevity of cookies deployed at all times…. The Working Party recalls the obligation of search engines to clearly inform the users upfront of all intended uses of their data and to respect their right to readily access, inspect or correct their personal data in accordance with Article 12 of the Data Protection Directive” (Executive Summary, Para. 5).


C.f. further the Opinion, par. III.3, especially, p. 12:

"In general, a natural person can be considered as "identified" when, within a group of persons, he or she is "distinguished" from all other members of the group".

See also Recital 26 of Directive 95/46/EC:

".... whereas, to determine whether a person is identifiable, account should be taken of all the means likely reasonably to be used either by the controller or by any other person to identify the said person; ..."


The next International Conference of Data Protection and Privacy Commissioners will be hosted by the Spanish Data Protection Authority in November this year in Madrid.

The Spanish Data Protection Director, Artemi Rallo Lombarte stated:

"the challenge we face as the organizers of the 31st International Conference is that of achieving the approval of a joint proposal on "International Standards for the Protection of Privacy and Personal Data," allowing the development of a universal, binding legal document."


Protection of Personal Data On-Line: IP Addresses - personal identifier or personal data?


A name is undoubtedly a personal identifier. However a person can still change his or her name by marriage, by special request or by fraud. More frequently, an IP address is changed or renewed, specifically when dynamic, mostly automatically and without human interference. In both cases the identifier does NOT define the person but is a link that POINTS TO that person. Nothing identifies a person with certainty. Maybe his or her teeth unless they have been extracted or never recorded.


What is important is the link created between the person and the identifier. The key that creates the link is available to ISPs and some site owners and search engines such as Google. A postal address in itself is not an identifier. However it becomes so when associated to a particular individual or family domiciled at the address. Even a diary is not a personal identifier but becomes personal data when a link can lead to its author.



According to Opinion 1/2008 of the Article 29 Data Protection Working Party on data protection issues related to search engines, ‘when a cookie contains a unique user ID, this ID is clearly personal data.’ Also, ‘cookies deployed by search engines typically contain information about the user’s operating system and browser, and a unique identification number for each user account: “When a computer has a dynamic and variable IP address, and cookies are not erased at the end of a session, such a cookie makes it possible to trace the user from one IP address to the next.” Cookies that collect information about how people use the internet can automatically expire after 2 years or continue for 30 years.



The Electronic Frontier Foundation (EFF) In its online document ‘Six Tips to Protect Your Search Privacy’ shows how search engines can connect different user collected information to identify them.

It is stipulated:

1. Don't put personally identifying information in your search terms (easy)


2. Don't use your ISP's search engine (easy)


3. Don't login to your search engine or related tools (intermediate). In particular it recommends: f you have accounts with services like Google GMail or Hotmail, do not search through the corresponding search engine (Google or MSN Search, respectively), especially not while logged in.


4. Block "cookies" from your search engine (intermediate)


  1. Vary your IP address (intermediate)


  1. Use web proxies and anonymizing software like Tor (advanced) ‘to hide your IP address from the web sites you visit or the other computers you communicate with on the Internet, ...’


Additionally, the document mentions :

  • “Mail.google.com and google.com leave some additional cookies that will identify you while searching, but which Customize Google (and GoogleAnon) will not anonymize. Unless you remember to quit your browser, some of those cookies persist even if you logout of Gmail. Future versions of these privacy-protection tools may help fix this problem.’



Privacy Implications for Google : Should users yield control over their personal information to Google?


This issue has various facets, some of which are discussed below :


A. Retaining IP Addresses


Google insists that an IP Address merely identifies the location of a computer, not who the individual user is. The law firm Pinsent Masons LLP in its website “Out-Law” responds: “that is true but does not take into consideration that many people regularly use the same computer and IP Addresses.” 'Whois' internet sites allow users to link an IP address to the user's name or company linked to it.



According to Google's Global Privacy Counsel, Peter Fleischer:

'Google collects IP Adresses to give customers a more accurate service because it knows what part of the world a search result comes from and what language is used -- and that was not enough to identify an individual user....'


An issue here is that users are not aware of which information is collected from them. The opt out option will give them a choice.



B. Addressing ‘Click Fraud’

There are legitimate reasons why Google should wish to track IP Addresses. For example, Google claims that internet "click fraud" can be tracked by showing that the same IP Address is jumping repeatedly to the same address. Advertisers pay each time a different person views the Ad, so dozens of views by the same person can rack up costs without giving the company the publicity it wanted.


C. Surveillance and Targeted Advertising


As indicated above a key competitive advantage for Google, with the world’s largest search engine and suite of complementary applications, is information about the search preferences of its users, enabling it to sell more targeted advertising services to its clients.


The new Federal Trade Commission Chairman Jon Leibowitz, appointed in February this year, has made behavioral targeting his first priority.

Behavioral targeting delivers ads to individuals based on the Web pages they visit and searches they carry out. In the EU, Meglena Kuneva, the European consumer affairs commissioner, has argued that basic consumer rights are being violated by companies that profile and target consumers.

According to the EU Eight Data Protection Principles, data should not be collected without data subjects’ consent and only for a specific use.


The Code of Fair Information Practices developed in the US in 1973 for the US Department of Health, Education & Welfare presents five principles: openness, disclosure, secondary use, correction, and security. They are similar to the EU requirement but expressed differently and not as extensive as the EU principles. The latter include minimization (only information relevant to the task at hand is gathered), restoration (those altering the privacy status quo should bear the cost of restoring it), safety net or the equity principle (minimum privacy available to all), timelines (data are expected to be current and old data destroyed), the principle of joint ownership of transactional data and the obligation of common share of any gains, the principle of consistency and ultimately, the principle of accountability for any breach including mechanisms for victims to discover and be compensted for breaches.


‘Why should privacy matter?’ users might ask, not grasping why they should fear the collection of their data for targeted advertising. Two main reason are suggested by Hal Roberts: firstly, Google could lose our data. If that has happened to credit card companies, government bureaus and other organizations why not Google? Recently Google was victim of human mistake releasing data. Secondly, data stored by Google could be accessed by governments as was the case in the law suit opposing Viacom to Google’s subsidiary, YouTube.



The privacy scholar, Daniel Solove has done extensive research on privacy. Facing the ‘I’ve got nothing to hide argument’, he asked the reader of his blog, Concurring Opinions, to bring good responses to the argument.

People give out bits of information in different settings, only revealing a small part of themselves in each context. The pieces of data spread around throughout daily activities give the expectation individually that relatively little is revealed. However, when these pieces are consolidated together like a piece of puzzle the aggregator acquires much greater knowledge about the person’s life. Financial institutions have a major interest in collecting data such as credit reports to evaluate lending risks. In the same way future employers or education admissions tend to refer to digital footprints left behind by candidates to help their decision makings. This is not without the risk of false ‘extrapolation’ from information taken out of its context and losing its significance.



By indexing web content Google is continually compiling user information. It also actively pulls out users’ information from other Social Networking Sites like Facebook or Twitter without users’ acknowledgment or consent. Taken out of context this information can cause prejudice. It can be wrongfully interpreted or harmful for users’ reputations. Hal Roberts from the Berkman Center of Internet and Society researched surveillance of the internet as reported by Ethan Zuckerman.

The statistics he reveals, dating from the end of 2008, show that each of Google’s advertising entities - Adwords and Double Click - own 35% of the online market.


In an interview with KAI RYSSDAL in July 7, 2009, Google’s Chairman and CEO, Eric Schmidt admitted that 97% of Google’s revenues come from advertising. Randal Stross

recalls in his book how two Google employees found the process for targeted advertising by simply “downloading semantic analysis software from the internet that could analyze any block of text, identifying the grammatical function of every word in every sentence, and then figuring out the sentence meaning into a few keywords.” They initially feared a negative reaction from the co-founders, Sergey Brin and Larry Page, regarding the privacy impact of the new tool. Stross also reported in 2000 that when Sergey Brin, still student at the Stanford University, was interviewed, he had declared ‘deliberately following a different path from Yahoo, which offered a complete set of information services that were intended to keep users from having any reason to go to another web site’ claiming “all we do is search”. The original intention was to stick to search delivery, not wanting to enter into competition with companies to whom they would deliver search services.


Less than a decade later the company has dramatically expanded. Google launched gmail with a powerful search engine. And if this is not enough, Google desktop helps users search their own desktops. Eric Schmidt said in his recent interview talking about advertising that “we think that we can build much more sophisticated advertising products. Ones which are even more personal, more mobile, more interactive, tell the story better.”



These types of information flows are not without the risk of leakage or human errors.

Organizations such as Electronic Frontier Foundation (EFF) have expressed concerns about the scale of information manipulated by Google.

Google’s technology becomes more penetrating and intrusive while our society becomes more transparent and porous. Modern types of surveillance, says Hal Roberts, have become more sophisticated than the Orwellian Big Brother model where the Ministry of Love watched you while you watched it. They are closer in character to the Jeremy Bentham Panoptican model also referred to by Benett & Raab in ‘Governance of Privacy’. There is an assumption that individuals placed in a position where they are constantly watched will enforce their own behavior.



This is in the case of conscious surveillance but Google’s surveillance is surreptitious. In the internet age the information is broadly delivered by data subjects themselves. As noted by Benett & Raab ‘information collection often occurs invisibly, automatically and remote - being built into routine activities.’ Importantly, ‘awareness and genuine consent of the part of the subject may be lacking.’


In summary, uncertainty remains about the effect of surveillance, supposedly made for targeted advertsing services, on individuals’ behavior and the effect of surveillance on free speech.