A Charter for Citizens
of the Global Information Society
J. Cameron
Info.T.EC Solutions Pty Ltd
P.O. Box K21 Haymarket, SYDNEY, NSW 2000, AUSTRALIA
Telephone: +61 2-93269430 Fax +61 2-2181508 email: cameronj@acslink.aone.net.au
K. Geiselhart
Student, University of Canberra, CANBERRA, ACT 2600, AUSTRALIA
email: k.geiselhart@student.canberra.edu.au
Abstract
New ethical issues related to the global information society have emerged. Extraterritoriality and legal ambiguity are consequences of the global information society and cyberspace. This discussion paper summarises key ethical issues that need to be addressed in a 'Charter for Citizens of the Global Information Society'. For each issue the main implications for citizens of nations and of cyberspace are discussed and Statements of Principle are developed. These Principles, set out as a Charter for Citizens, are intended for use as: guidelines by law makers and decision-makers in government and industry; an ethical framework for possible future international legislation; and as benchmarks for citizens and cybercitizens in assessing their rights and obligations in relation to the global information society and cyberspace.
Keywords
Global Society, Information Society,
Charter, Principles, Democracy, Cyberspace
1 INTRODUCTION
The power of integrated information
and communication technologies to collect, store, combine, manipulate
and disseminate data to and from any part of the world now affects
every individual, regardless of their personal involvement with
cyberspace. Technologies like space-based surveillance, satellite
communication, direct broadcasting and portable equipment allow
information collection and flow to transcend national and geographical
borders.
High speed computers combined with
massive data storage capacity, an unparalleled ability to integrate
complex information systems and the power to digitise and analyse
data from audio, visual and other media provide the potential
for total mastery over the information of all people and all nations.
"Just as nuclear dominance was the key to coalition leadership
in the old era, information dominance will be the key in the information
age" (Nye and Owens 1996, p27).
A global information society affects the balance of power and
moves control from within nations.
In this new global information society
"cyberspace" is defined as "the electronic environment
established by and/or within the information and communications
technologies and infrastructure and associated peripheral equipment".
It is a non-specific, fluctuating, separate space where transactions
and events occur outside the jurisdiction of the laws of individual
nations. Individuals, organisations and governments increasingly
engage with this electronic environment and are affected by it
directly or indirectly. Indirect effects of cyberspace include
unjust denial of access for individuals to finance or employment
due to inaccurate electronic data, and threats to physical security
and well-being due to activities like "net stalking".
Interaction in cyberspace may involve citizens and technical infrastructure
from numerous nations concurrently. Global laws do not exist.
Global mechanisms for governing the "cyber realm" have
not been established. The result is extraterritoriality and legal
ambiguity.
"Society" in the Oxford
Dictionary means "a social mode of life, the customs and
organisation of a civilised nation or an association of persons
united by a common aim or interest or principle". Therefore
cyberspace has citizens - citizens that may be individuals, organisations
or governments. And citizenship of a nation and of cyberspace
can be concurrent. Rights and obligations relate to roles both
as citizens of a particular nation and of cyberspace, with an
over-riding responsibility to citizenship of the global society.
But, what is cybercitizenship in the global information society?
The Oxford Dictionary defines "citizen" as "a freeman
of a city or member of a state". Traditionally a citizen
is acknowledged by the law of a nation as a member of that particular
country and subject to its laws. When citizenship is a local,
physical concept the obligations and rights associated with being
in a defined geographical area are specified. But in the information
society individuals, organisations (including corporations) and
governments can act and interact outside geographical constraints.
Rights and obligations are not clearly defined either for individuals
or collectives. So far it is established only that cybercitizens
must pay suppliers of access services, obey the rules of their
geographic society related to the internet and global information
and observe "netiquette".
"Democracy" refers to the
right of individuals to influence by lawful means issues affecting
their lives and well-being. This paper assumes that electronic
information and cyberspace should empower citizens and increase
opportunities to influence and participate in the government of
nations and cyberspace. We need to avoid the creation of "cyberslaves"-
those who use cyberspace, but are unaware of the issues and risks
(eg. losing money if their cyberbank becomes insolvent) and have
no influence on decisions and events that impact on them. Cybercitizens
are powerless unless they are able to participate in the governing
of the global commons.
Options for setting out the rights and obligations of citizens can be listed in order of enforceability:
Because of problems related to establishing
a universal ethical regime in diverse cultures (Berleur and d'Udekem-Gevers
1996) and the nature of the global information society, the establishment
of "principles" is considered the most appropriate form
for setting out the rights and responsibilities of citizens.
The Principles set out in this paper
are intended to form the basis of a Charter for Citizens of the
Global Information Society. The Principles are intended for use
as: guidelines by law makers and decision-makers in government
and industry; an ethical framework for possible future international
legislation; and as benchmarks for citizens and cybercitizens
in assessing their rights and obligations in relation to the global
information society and cyberspace.
2. ASSUMPTIONS AND METHODOLOGY
Principles implicitly and explicitly
assume values. The values espoused in these Principles reflect
the experience of sophisticated users of integrated information
and communications technologies and cyberspace. Globalisation
and transborder data flow has occurred so fast that few nation
states have debated and/or understood the consequences. Maritime
nations developed laws of the high seas under similar circumstances.
The various declarations of the United
Nations and statements like the OECD Principles are based on the
premise that some values are universal. International Protocols
assume particular actions do not promote international well-being
(eg. actions degrading air quality). This paper assumes that all
individuals in all societies have the rights set out in the Declaration
of Human Rights. The Charter aims to enhance the well being of
all citizens throughout the world. The objectives of the Principles
are to promote "a social sustainable development" (Berleur
and d'Udekem-Gevers 1996, p11). It is acknowledged that despite
the precedents for statements of 'conviction' with international
relevance, if Principles are to be universal and applied internationally,
ethical and cultural diversity must be recognised. Situations
and circumstances vary. The Preamble to the Charter therefore
provides for "justification and exceptions".
This paper was prepared using the following methodology:
3 ISSUES
3.1 Justification and Exceptions
In a diverse, complex world it would
be unrealistic to establish a set of Principles relating to a
global information society that apply to all situations and are
acceptable to all nations. But in order to protect citizens, any
exceptions must be justified and reflect the level of risk to
society. Exceptions must not interfere with universally accepted
human rights. "Exceptions to the Principles must be clearly
stated, made in accordance with law, proportional to the necessities
giving rise to the exception, and compatible with the requirements
of a democratic society" (Australian Privacy Charter Council
1994, Principle 1). Not every law of every nation is a "just"
law. Not every nation is democratic.
Preamble to the Charter: Exceptions
to the Principles set out in this Charter must be justified, clearly
stated, made in accordance with law, proportional to the necessities
giving rise to the exception, and compatible with the requirement
to enhance human rights.
3.2 Ethics and Protection from Cybercrime
Cyberspace can obviously be used
for good or evil. Misuse and abuse of electronic information and
cyberspace ranges from 'unethical behaviours' to 'criminal activities'.
"Criminal exploitation is clearly a problem, and there are
other concerns too; for example, the norms of human interaction
are less likely to be observed in such environments.. Electronic
violence is in its infancy, but viruses, rumour-mongering, hate-mail
and mailbox bombardment are all describable phenomena, and may
graduate from art-forms to techniques" (Clarke 1996 WWWa).
Although it is recognised that currently
"an international agreement on ethics... is unachievable"
(Berleur and d'Udekem-Gevers 1996, pp4-5) the International Federation
for Information Processing (IFIP) Ethics Task Group's analysis
of 30 codes of member computer societies revealed "a consensus
on some shared principles" (Berleur 1996b, p242). Respect
for privacy, accuracy, property and accessibility is required
by most codes. To retain the credibility of information, integrity
and quality of digital data must be protected by individuals,
organisations and governments. Safeguarding the accuracy of information
is a core responsibility of individual and collective cybercitizens.
False and inaccurate information in the information age can be
considered as equivalent to counterfeit currency.
Even though the laws of nations do
not keep pace with developments in criminal activity related to
the global information society and cyberspace, and the concepts
of ethics and instruments designed to deal with cybercrime vary
with culture and type of behaviour they are intended to encourage
or prevent, cybercitizens are aware of "right and wrong".
There appears to be broad consensus that actions that would be
crimes outside the electronic environment should be considered
as cybercrime (eg. sabotage, forgery, fraud, theft, espionage)
(Berleur and Brunnstein 1996b, p260-1). There are well recognised
statements of agreement related to information and communications
security (eg. OECD Guidelines for the Security of Information
Systems). The main risks to cyberspace security relate to insertion
of false data; release or insertion of harmful software programs;
destruction of valuable data and programs; manipulation and/or
disruption of computer and communication systems; and misuse by,
for example, information brokers, private detectives, foreign
embassies and organised crime. Cybercrime must be punished in
the same way as all other criminal activity and be subject to
the laws of nations.
In addition to ethics directly related
to electronic information and cyberspace, the information technology
and communication industries need to consider issues like the
environment (eg. manufacture and disposal of equipment, use of
electricity and other resources) and to promote sustainable economic
and social development.
Principle 1: Individual and collective
cybercitizens must protect the accuracy and integrity of digital
information, adhere to all relevant ethical principles, codes
and guidelines and uphold the legitimate laws of nations.
3.3 Equity of Access to Cyberspace and Electronic Information
Equity of access to cyberspace is
of international concern. The "information rich and information
poor" are familiar concepts that apply to individuals, communities,
organisations and nations. Access to cyberspace is determined
by access to technical infrastructure and electronic information.
Even if access to cyberspace is achieved, access to electronic
information is not guaranteed.
a. Access to technical infrastructure and technology
Access to cyberspace depends on the
availability and accessibility of technical infrastructure, access
to appropriate information and communication technology, and technical
skill. Some countries and groups within nations (eg. rural communities)
lack suitable technical infrastructure. Access by some individuals,
communities and organisations is limited because of the costs
of information technology and communications. Recognising these
facts, the United States Federal-State Board on Universal Service,
set up under the Telecommunications Act of 1996, developed draft
recommendations to support programs to ensure access to telecommunications
for low income consumers and discounts to key community groups
(Benton 1996 WWW). Verbal accounts of experiments indicate that
linking members of disadvantaged groups to the internet appears
to have positive affects on self-esteem.
Discrimination on grounds like sex,
age, race, religion or physical disability limits equality of
access to cyberspace technology. Equity of access to cyberspace
among all citizens should be a goal of education systems. Issues
like poverty and illiteracy have obvious relevance to access and
realistically other basic human rights may be more significant
in some countries (eg. freedom from hunger).
b. Access to electronic information
Information available on the internet
is voluminous, frequently difficult to find, peripatetic, transitory,
often fragmented and of varied quality. Equity of access to meaningful
electronic information depends on the acquisition and transfer
of sophisticated search skills including the ability to discriminate
among sources and knowledge of electronic conventions and practices.
"There is every danger that
pricing information services and placing information and its associated
technologies in the market place will ensure the development of
an information poor group within society who are unable to capitalise
on the benefits of freely available information" (Burton
1992, p89). The social impact of any "bit tax" (a tax
on information sent over the internet) needs to be carefully assessed.
Any trend to charging for access to information currently available
free of charge in the public domain, via the internet or published
in books that can be accessed free of charge through libraries
would exacerbate the disadvantage of those unable to pay.
Governments are major collectors
of information. As governments are funded by citizens, "Non-personal
government information should be freely available unless someone
in authority can show it should be restricted. Technology should
be used to distribute information to citizens not simply to record
information about them"(Burton
1992, p89). But the trend of governments to privatise functions
and outsource activities means that information formerly held
by government and available publicly is no longer accessible.
It is argued that some databases held by private sector organisations
should be freely accessible due to the "public interest"
(eg. toxic emissions and chemical 'hot spots'). But the World
Intellectual Property Organisation has prepared a Treaty that
proposes new property rights to database owners. If adopted, this
Treaty may restrict access to information currently available
in the public domain (World Intellectual Property Organization
1996 WWW).
Principle 2: Nations should aim
at equity of access to electronic information and cyberspace for
all their citizens without discrimination.
3.4 Freedom from Surveillance and Rights to Privacy
Principle 3 of the Australian Privacy Charter states that people have a right to privacy and "the right to conduct their affairs free from surveillance or fear of surveillance". Rights to privacy are well established in the OECD Privacy Principles, national laws, ethical statements and Codes of Practice. Surveillance is defined as "the systematic observation or recording of one or more people's behaviour, communications or personal information" (Australian Privacy Charter Council 1994). The use of technology for surveillance has three aspects:
a. Surveillance through information.
b. Surveillance of communications in cyberspace.
c. Mass surveillance using information
and communication technologies.
a. Surveillance through information
"One stop shopping" and
integration of data obtained by large entities, including government
and commercial conglomerates, encourages merging of information
provided for different purposes. Examples include marketing agreements
like "fly buy" schemes and "loyalty cards"
that offer discounts as rewards in return for details of purchases
being recorded to provide customer profiles. Efficiency benefits
may flow from exchange of data and integration of databases but
it is essential that exchange of personal information takes place
only with the informed consent of individuals. Individuals must
have the option of continuing to deal separately with organisations
and business units if they prefer. A key privacy principle is
that information should generally not be used for purposes other
than those for which it was collected (Australian Privacy Charter
Council 1994, Principle 15). Great care needs to be taken if information
is used for secondary purposes (eg. definitions used by various
government agencies may differ and data provided by individuals
may alter for legitimate reasons). Data-matching schemes have
experienced a range of difficulties due to issues like data accuracy,
integrity, administrative errors and much lower cost-benefit ratios
than claimed at the outset.
Multimedia and convergence of new
technologies allow unprecedented opportunities for invasion of
individual privacy and surveillance of populations or target groups.
When data items held in various formats are combined highly intrusive
personal information is easily assembled and disseminated. Even
if informed consent is given each time personal data is collected
by individual agencies it is unlikely that citizens will be fully
informed about or aware of the detailed profiles that can be obtained
from combined data (eg. linkages of visual images - photo licences,
personal relationships - CCTV, and transactional data - non-anonymous
payment of tolls and transport fares with computer records of
addresses, health and financial data). Surveillance of individuals
through the use of information is not compatible with human rights.
b. Surveillance of communications in cyberspace
Electronic communications can be
monitored electronically using techniques and technology available
in the public domain. Software programs can monitor and trigger
recording of verbal and electronic communications. Powerful search
engines allow internet searches that monitor activities of individuals
including those using news groups. "Cookies" (small
pieces of data that a web server can store with a web browser)
allow tracking of internet users' visits to sites.
There is debate about the right of
government and law enforcement agencies to intercept electronic
communications and monitor internet activities. Some enforcement
agencies are concerned about the use of electronic money (e-cash)
and its potential for money laundering and tax evasion; others
need to intercept communications among criminal groups. The need
to balance law enforcement requirements with rights to privacy
and freedom from surveillance is acknowledged, provided the response
is commensurate with the level of risk to the community. Law enforcement
agencies in most countries already have powers to tap telephone
communications of individuals under certain conditions which are
usually set out in law and clearly defined. Interception is usually
justified during the process of obtaining a warrant or approval
from an independent body. Monitoring private communications at
random, or in accordance with pre-established automated triggers,
is not conducive to freedom or democracy. Interferences with privacy
must be justified.
There is debate about the responsibility
of internet service providers to monitor the content of material
in cyberspace and to prevent certain transactions (eg. theft of
data and risks to security) and transfer of "unacceptable"
material (eg. child pornography). It is argued that making internet
providers responsible for content is like making telephone service
providers responsible for all voice and data carried on their
networks. Will the internet industry, as a whole, develop meaningful
methods of self regulation which clearly allocates responsibility
for content? Will this be acceptable to all governments and to
all citizens? A draft Internet Code of Practice prepared by the
Internet Industry Association of Australia aims "to establish
general standards of behaviour for those involved in the Internet
industry" (Internet Industry Association of Australia 1996
WWW).
c. Mass surveillance using information and communication technologies
Mass surveillance incorporates the
concept of data capture and storage of information about citizens
on a random basis. Mass surveillance creates a culture of fear
among citizens. The use of information and communications technology
for surveillance of individuals not involved in or suspected of
illegal activities should not be permitted. Satellite surveillance
of citizens of sovereign countries without approval or justification
can be considered as a form of invasion. Video cameras used in
public areas without warning and storage of images of citizens
obtained without justification should not be permitted. The growing
use of CCTV in many countries on the grounds of providing security
and protection against crime may tempt operators to store images
- "just in case". Mass surveillance using techniques
like automatic streaming through databases is very difficult to
justify.
Principle 3: Citizens have the
right to privacy and the right to conduct their affairs free from
surveillance or fear of surveillance.
3.5 Freedom of Expression and Opinion
Cyberspace ignores national boundaries.
"Cyberspace is a place where the denizens are knowledgeable,
independent and uppity. Found there is a new type of non-organisation...cybertribes:
like-minded citizens linked electronically by their key interest.
They empower one another. They validate one another. Eager to
find one another and communicate, they are also eager to influence
real events.." (Draper 1995 p730). It is important that cybertribes
be permitted to develop. The concept of planet earth requires
the free exchange of information, expression and opinion.
Individuals have a moral responsibility
to be tolerant and honest in representing their personal views
and the opinions of others (Merel 1996 WWW). Ideally, honest political
opinions should be able to be expressed freely, without fear.
But this may not be possible in all societies. For this reason
the right to anonymous transactions is sometimes advocated particularly
to protect whistle blowers and witnesses (Clarke 1996 WWWa). Freedom
of expression and free flow of information are required to support
democracy and human rights. (Clarke 1996 WWWa) (Durango
Declaration, 1995 WWW) (Merel 1996 WWW) (Berleur and Brunnstein
1996, p259). There is, however, a need to balance the right to
freedom of expression with the responsibility not to cause harm
to other citizens.
Principle 4: Cybercitizens have
the right to freedom of expression and opinion and the responsibility
to ensure the democratic rights and well-being of all citizens
are protected.
3.6 Democracy
Cyberspace can be used to facilitate
citizens' involvement in the government of their own country and
to influence world events. The ability to distribute material
widely, cheaply and quickly allows issues to be discussed and
feedback to be returned to the initiator swiftly. Information
and communications technology can be used to facilitate participative
democracy within nations and cyberspace. Electronic 'forms' and
computer analysis allow the responses of large numbers of citizens
to be collated. The Durango Imperatives include calls for designers
and applied research to develop infrastructure, architectures
and technical interfaces that support democratic participation
(Durango 1995 WWW).
If governments and decision-makers
are willing to share power and utilise the internet to allow direct
input by citizens or stakeholders a radical redistribution of
power could occur. In the United States "A national initiative
and referendum movement already underway will allow people to
bypass the Congress, to propose new laws and vote on them directly."
It is predicted that "With secure lines and positive electronic
identification established, ultimately we will see on-line legislative
initiatives and electronic voting, a return to direct democracy"
(Draper 1995, p730). It is particularly important in a period
of significant change that policy development takes place in "the
highest level of participation and (that we)...avoid the emergence
of a two-tier society, (so that)..the information society addresses
the needs of citizens (Laopodis and Fernandez 1995, p2). Unlike
TV and mass media, cyberspace is interactive, provided there is
no interference to prevent free access and distribution of information.
Control of communications and media is frequently an aim of dictatorships.
It is important that the unrestrained characteristics and complex
matrices of the internet are protected.
Principle 5: Cyberspace should
be used to enhance opportunities for democracy within nations
and across national boundaries.
3.7 Diversity of Culture and Ideology
Culture, defined as "the way
we shape our own destiny and make it understandable and practicable
through all the institutions, rituals, means, etc., by which we
regulate our violence" (Corfu97 Call for Papers, 1996) makes
human thinking robust by providing options. Multiculturalism is
a way of understanding, respecting and retaining cultural diversity.
Cultural diversity is as important as biodiversity. Just as we
need access to data from numerous sources to provide perspective
and an opportunity to glean our "truth", we need diversity
in ways of thinking about events.
Technology usage is not neutral.
Information and communication technologies can be used not only
to control information about physical entities, including economically
valuable objects and individuals, it can be used to influence
thinking and behaviours. During the Gulf war dissemination/handling
of news and access of the media to the military was very different
to that during the Vietnam war! Monopolistic ownership and control
of electronic information, cyberspace and the associated information
and communications technology and infrastructure must be avoided.
Principle 6: Cyberspace should
be used to support diversity of culture and ideology.
3.8 Equitable Distribution of Benefits
As in the industrial revolution,
enormous shifts in economic benefit and distribution of wealth
are occurring as the global information society emerges. Obvious
impacts include workforce displacement, continued automation of
information processing and manufacturing, and creation of a new
elite with wealth and power based on ownership of electronic information
and information and communications technology and infrastructure.
"Our new high-tech economy has almost no need for unskilled
workers and it is forcing de-massification of the labour force"
(Draper 1995, p729). To prevent deskilling, equality of access
to knowledge about information and communications technology must
be available. The total time required from the human workforce
to produce a specified quantity of goods and level of services
has reduced. In many nations some labour longer hours while unemployment
increases. Time savings, earning potential and opportunities for
leisure need to be shared among all citizens so that wealth and
quality of life can be distributed more evenly.
The industrial revolution led to
enormous social upheaval in many countries. Social inequalities
and denial of access to the benefits of industrial technology
destabilised some societies and political systems. We must learn
from history. The wealth and benefits of the global information
society should be distributed equitably within and among nations.
Principle 7: All participants
in the global information society, individual, corporate and government,
should aim to distribute the wealth and benefits equitably.
3.9 Ownership of Data
Ownership of data in cyberspace relates
to issues of copyright and intellectual property, rights to acquire,
access and sell data about people, objects and transactions and
transborder flows of data.
a. Copyright and intellectual property.
Ownership of copyright of electronic
material and of intellectual property are issues of international
concern being addressed currently. Protection and rights in cyberspace
should be equivalent to those existing within the country of origin
for non-electronic material, publications and broadcasts.
b. Rights to acquire, access and sell data about people, objects and transactions.
It is argued that computerised data
owned by an organisation belongs to that organisation which has
the right to sell or exchange that data, unless prohibited by
law. The European Commission Directive related to the processing
and movement of personal data (European Directive, 1995) will
help protect EC citizens in some circumstances but it does not
address the issue of ownership rights internationally. Money is
made from the sale of personal information despite the concern
of individuals who believe their privacy has been invaded. If
it was clearly stated in law that personal data is the property
of the data subject, and this person has the sole right to permit
an organisation to use that data for authorised purposes, this
trade in personal information would at least be reduced and at
best cease.
Ownership of information about objects
and transactions pertaining to a country is a vexed question.
Burton summarises the issue by asking whether information is a
resource or commodity that can be bought and sold on the international
market. The treatment of information as a commodity derives from
"the high visibility of IT costs and the increasing degree
to which information is created and manipulated by IT systems...Third
world countries claim that information is a resource which can
be used for development and that they have a right to control
their individual information resources" (Burton 1992, p59).
Rights to acquire, access and sell data about objects and transactions
within a nation should be determined by the laws of that country.
c. Transborder flows of non-personal data.
Transborder flows of non-personal data include:
"..Information transfer...forms
a significant part of all the international transactions taking
place: it contributes considerably to the operational efficiency
of multinationals and to export earnings..." (Burton 1992,
p59). Some information held by private organisations is important
to local national governments for understanding their economy.
Who owns the data and who benefits?
National sovereignty and resource
utilisation are affected by transborder collection. (eg. Who owns
remotely sensed data relating to physical resources collected
by satellite surveillance?) Third world countries argue that they
need access to these databases and databanks located primarily
in first world countries as a source of expertise and information
for economic and social development. "Systems are in place
and are transferring and handling information on an international
scale before third world governments (and some of those in the
first world) have an opportunity to react: when they are able
to consider policy, they are faced with entrenched situations
and attitudes which are difficult to change, not least when these
attitudes are held by multinational corporations backed overtly
or covertly by national governments" (Burton 1992, p58).
It is argued that data about the
economy and resources of a country, and data originating in a
country, is owned by that nation and continues to be subject to
its law. Agreement about transborder collection and use of this
data should be negotiated by the collecting/receiving nation or
organisation. Nations should have the right to access and use
data about its economy and resources regardless of where it is
stored.
Principle 8: Ownership of personal
data resides with the data subject. Rights to acquire, access
and sell data about objects and transactions within a nation should
be determined by the laws of that country. Agreement about transborder
collection and use of data about the natural, economic and social
resources of a nation should be negotiated by the collecting/receiving
nation or organisation. Nations should have the right to access
and use data about their economy and resources regardless of where
it is stored.
4. CONCLUSIONS
The global information society is
a threat to old social and economic patterns at local and international
levels. Langdon Winner told the Durango Conference "..the
move to computerise and digitise means that many pre-existing
cultural forms have suddenly gone liquid, losing their former
shape as they are retailored for computerised expression. As new
patterns solidify, both useful artefacts and the texture of human
relations that surround them are often much different from what
existed previously" (Durango Declarations 1996 WWW). And
at the international level "The clash between the real and
the virtual realities is rendering ineffectual the edifice of
national implementations of internationally agreed human rights"
(Clarke WWW 1996a). The opportunity for reshaping inequitable,
dysfunctional social and economic patterns has arrived. Faced
with the power of information and communications technology and
the political, economic, social and cultural impact of its use,
a Charter for Citizens relevant to the global society and cyberspace
is essential.
The Charter for Citizens of the Global
Information Society aims to promote the well being of all citizens
of all nations and of cyberspace. Its Principles aim to establish
the rights and responsibilities of all citizens and those using
electronic information and cyberspace. Although these Principles
are only a beginning, each is designed to address a key issue
arising from the global information society and cyberspace. They
require debate, addition and refinement. But they are a beginning.
THE CHARTER FOR CITIZENS OF THE GLOBAL INFORMATION SOCIETY
This Charter assumes that all individuals of all societies have the rights set out in the United Nations Declaration of Human Rights. It aims to enhance the well being of all citizens throughout the world. The objectives of the Charter are to reduce the vulnerability of individuals and societies, and to promote socially sustainable development of the Global Information Society. Exceptions to the Principles set out in this Charter must be justified, clearly stated, made in accordance with law, proportional to the necessities giving rise to the exception, and compatible with the requirement to enhance human rights.
Principle 1 - Individual and collective cybercitizens must protect the accuracy and integrity of digital information, adhere to all relevant ethical principles, codes and guidelines, and uphold the legitimate laws of nations.
Principle 2 - Nations should aim at equity of access to electronic information and cyberspace for all their citizens without discrimination.
Principle 3 - Citizens have the right to privacy and the right to conduct their affairs free from surveillance or fear of surveillance.
Principle 4 - Cybercitizens have the right to freedom of expression and opinion and the responsibility to ensure the democratic rights and well-being of all citizens are protected.
Principle 5 - Cyberspace should be used to enhance opportunities for democracy within nations and across national boundaries.
Principle 6 - Cyberspace should be used to support diversity of culture and ideology.
Principle 7 - All participants in the global information society, individual, corporate and government, should aim to distribute wealth and benefits equitably.
Principle 8 - Ownership of personal
data resides with the data subject. Rights to acquire, access
and sell data about objects and transactions within a nation should
be determined by the laws of that country. Agreement about transborder
collection and use of data about the natural, economic and social
resources of a nation should be negotiated by the collecting/
receiving nation or organisation. Nations should have the right
to access and use data about their economy and resources regardless
of where it is stored.
5. REFERENCES
Published documents
Australian Privacy Charter Council (1994) Australian Privacy Charter, Australian Privacy Charter Council, December 1994
Berleur, J. (1996a) "Culture and Democracy Revisited in the Global Information Society - Summary of a WG9.2 Position Paper in "Corfu97 - First Announcement and Call for Papers"
Berleur, J. (1996b) Final Remarks: Ethics, Self-Regulation and Democracy. Ethics of Computing (eds Berleur, J. and Brunnstein, K.) Chapman & Hall 1996 pp241-253
Berleur, J. and Brunnstein, K. Editors (1996) Ethics of Computing, Chapman & Hall 1996
Berleur, J. and d'Udekem-Gevers, M. (1996) Codes of Ethics Within IFIP and Other Computer Societies. Ethics of Computing (eds Berleur, J. and Brunnstein, K.) Chapman & Hall 1996 pp3-15
Burton, P.F. (1992) Information Technology & Society Library Association Publishing, London, 1992
Cameron, J., Clarke, R., Davies, S., Jackson, A., Prentice, M., Regan, B. (1992) Ethics, Vulnerability & Information Technology. Information Processing 92 Vol. 11 Education and Society (ed. Aitken, R.) Proceedings of the IFIP 12th World Computer Congress North Holland, 1992 pp344-350
Draper, M (1995) Beyond Cyberspace: the Real Promise of Virtual Reality. Vital Speeches of the Day vol. 61 issue 23 Sept. 15, 1995 pp726-733
European Directive (1995) "Directive 95/-/EC of the European Parliament and the Council On the Protection of Individuals with regard to the Processing of Personal Data and On the Free Movement of such Data". 2 February 1995
Laopodis, V. and Fernandez, F. (1995) Enhancing Citizens Participation in an Information Society. Proceedings 5th Informatics Conference Greek Computer Society December 1995
Nye, J. S. and Owens, W. A.
(1996) America's Information Edge. Foreign Affairs Journal
March/ April 1996 vol. 75, no. 2. Pp23-28
Electronic Sources - World Wide Web Sites & Email Contacts (as at 30 November 1996)
Benton Foundation (1996 WWW) United States Universal Service Provision www.benton.org
Clarke Roger (1996, WWWa) Speech to Victorian Council of Civil Liberties www.anu.edu/people/ Roger.Clarke/II/VicCCL.html
Clarke Roger (1996, WWWb) Netethiquette References (on the Web) www.anu.edu/ people/ Roger.Clarke/II/ Netethiquetterefs.html
Durango Declarations (1995 WWW) www.lanl.gov/SFC/95/declaration.html
Internet Industry Association of Australia - Email:conduct@intiaa.asn.au, 1996
Kling, R. The Information Society: Letter from Rob Kling for TIS, Issue 12(1) Jan-May 1996. Email:kling@binky.ICS.UCI.EDU
Merel, Peter (1996 WWW) The Expectations of Electronic Communities - A Bill of Electronic Rights and Responsibilities, V0.15 www.usyd.edu.au/~pete/err.html
World Intellectual Property
Organization Treaty (1996) www.public-domain.org/database/database.
html
Acknowledgements
The authors acknowledge the comments, contributions and assistance from Roger Clarke, Diane Whitehouse, Patsy Segall, Margaret McEvoy, Graham Greenleaf, Philip Argy and Andrew Freeman.
return to KG's home page