This basic research oriented project analysed both, the basics for the protection of and future threats for privacy. Special attention was devoted to new developments and the international scientific and political discourse on privacy. The research focus included new phenomena like “social sorting“ as a consequence of profiling as well as technical developments which are increasingly turning the visions of ubiquitous computing into realities. These developments raise the question whether the basic right to privacy will and can survive in a global Information society and how it can be protected in a sustainable manner. For this purpose up-to-date concepts of technical protection like “privacy by design approaches” as well as new schemes of (self-) regulation and their performance were analysed and observed.
The emerging paradigm of ubiquitous computing promises unprecedented levels of support of human activities by information technologies working invisibly in the background and provid-ing their services in an unobtrusive and effortless manner. At the same time, these systems will bring about so far inconceivable levels of surveillance, collection of personal data, their merging and continuous transfer and processing, creating unprecedented threats to privacy and data protection. As a consequence ubiquitous computing is also challenging central human values that are affiliated to privacy, embracing items like individual autonomy, democracy or societal sustainability. The inherent threats to privacy have been recognised from the very beginning of the develop-ment of this vision and numerous attempts have been undertaken to reconcile the obviously conflicting objectives of ubiquitous computing and the principles of current data protection. The core of contemporary data protection is based on a general limitation of the generation, processing and use of personally identifiable data, supplemented by sets of rules which define exceptions from the general prohibition and regulate these specific cases. A major stream of efforts to preserve privacy under the new technological regime focused on the integration of privacy protection principles into ubiquitous computing technologies; in more recent times, the suitability of current regulatory framework for the emerging new paradigm of information technologies moved closer to the centre of attention. Both directions, the development of pri-vacy enhancing, ubiquitous computing technologies and adaptations of legislation to accom-modate the enormous threats for privacy possess certain mitigating potentials, but are either insufficient or incompatible with the core objectives of the new technical paradigm. Measures that are sufficient to confront the vision of ubiquitous computing with more than an illusion of privacy will probably a
12/2008 - 11/2011