LEGAL MEASURES FOR PROTECTING THE RIGHT TO PRIVACY IN CASE OF SHARING PERSONAL DATA VIA ONLINE COMMUNICATION

Main Article Content

Kanathip Thongraweewong

Abstract

The users of internet and online communication such as Social Network Websites and Chat applications on mobile phone, deliberately or inadvertently share data in every aspect of life. The data shared include images, telephone numbers, mailing addresses, workplaces, etc. which are considered "personal data" of the individuals. Not only personal information of users of online communication, but also that of non-users' has been exposed online without their consent. This research has classified the sharing of personal data online into two main categories. First is the sharing of one's own data which is associated with "self disclosure" behavior that becomes a popular trend online. Second is the sharing of others' personal data without consent which affects the right to privacy of the data owners. Such right is regarded as a fundamental or human right. Thus, this research aims to study the application of laws relating to data protection in the context of personal data sharing online. The results indicated that, by using qualitative method and comparative analysis of Thai laws with related foreign laws, there were no specific laws in the recent Thai legal system that protected the privacy and personal data. Although there are currently various laws which can be applied to protect the right of person whose personal data have been shared online, this research indicated that the problems of content, element, and scope of such laws made them inappropriate and insufficient to protect personal data from being shared online. Consequently, the amendment of laws is proposed to mitigate the negative impact of such sharing as well as to protect the right to privacy appropriately.

Article Details

How to Cite
Thongraweewong, K. (2019). LEGAL MEASURES FOR PROTECTING THE RIGHT TO PRIVACY IN CASE OF SHARING PERSONAL DATA VIA ONLINE COMMUNICATION. Southeast Bangkok Journal (Humanities and Social Sciences), 2(1), 56–72. retrieved from https://so05.tci-thaijo.org/index.php/SB_Journal/article/view/196223
Section
Research Article

References

Alderma, Ellen & Kennedy, Caroline. (1997). The right to privacy. US: Vintage.

Barker, K. J., D'Amato, J., & Sheridon, P. (2008). Credit card fraud: awareness and prevention. Journal of Financial Crime, 15(4), 398-410.

Benton, M., Blair, K., Crowe, M. & Schuh, S. (2007). The Boston Fed study of consumer behavior and payment choice: a survey of Federal Reserve System employees. Retrieved May 7, 2015, from http://www.bostonfed.org/economic/ppdp/2007/ppdp0701.htm

Birkinshaw, Patrick. (2001). Freedom of Information : The law, the practice and the Ideal. US: Butterworths.

Caudill, Edward. (1992, December). E. L. Godkin and his view of 19th century journalism. Journalism & Mass Communication Quarterly, 1039–1049.

Conkey, C. (2007). Assessing Identity-Theft Costs. The Wall Street Journal - Eastern Edition, (250), 3.

Culnan, M. J. & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust. An empirical investigation, Organization Science, 10(1),
104-115.

Donnelly, Jack. (1982, June). Human Rights and Human Dignity: An Analytic Critique of Non-Western Conceptions of Human Rights. American Political Science
Review, (76), 303-316.

Gavison, Ruth. (1980, January). Privacy and the Limits of law. The Yale Law Journal, 89(3), 421-471.

Gutwirth, S. (2002). Privacy and the Information Age. Oxford, UK: Rowman & Littlefield. Haag, Van Den, Ernest. (1971). On Privacy. In J. Pennock & J. Chapman (Eds.), Nomos XIII: Privacy. (pp.149-168). New York: Atherton Press.

Hendricks E, Hayden T & J. D. Novik. (1990). Your right to Privacy: A Basic Guide to Legal Rights in an information Societ. US: Southern Illinois University Press.

Homans, G. C. (1958, May). Social Behavior as Exchange. American Journal of Sociology, 63, 597-606.

Joinson, A. N. & Paine, C. B. (2007). Self-Disclosure, Privacy and the Internet, Oxford handbook of internet psychology. Oxford, UK: OUP.

Jonker, N. (2007). Payment instruments as perceived by consumers - Results from a household survey. De Economist, 155(3), Retrieved May 14, 2015, from
http://www.dnb.nl/binaries/Working%20Paper%2053_tcm 46-146710.pdf

Kanathip Thongraweewong. (2012, May). Legal Measures for protecting the right to privacy: A study of invasion of privacy through the use of social network
websites. APHEIT Journal, 18(1), 39-51.

Kanathip, Thongraweewong. (2014). State Telecommunication Surveillance: A Comparative Study of the US and Thai Telecommunication Privacy Laws, Conference Proceedings of the Forth International Conference on Digital Information and Communication Technology and its applications. Retrieved June 16, 2015, from
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6821709

Listerman RA, Romesberg J. (2009). Are We Safe Yet?. Strategic Finance, 91(1), 27-33.

Organization for Economic Cooperation and Development. (2008). OECD Policy Guidance on Online Identity theft. Retrieved May 15, 2015, from http://www.oecd.org/dataoecd/49/39/40879136.pdf

Posner, Richard. (1998). Economic analysis of law, (fifth edition). U.S. : Aspen Law & Business.

Prosser, William. (1960, August). Privacy. California Law Review, 48(3), 383-423.

Rosen, P. & Sherman, P. (2006). Hedonic Information Systems: Acceptance of Social Networking Websites, in Americas Conference on Information Systems, Mexico:
Acapulco.

Solove, Daniel J. (2003, Fall/Winter). Identity Theft, Privacy, and the Architecture of Vulnerability. Hastings Law Journal, 1227-1275.

Spiekermann, Sarah, Krasnova, Hanna, Koroleva, Ksenia & Hildebrand, Thomas. (2010). Online Social Networks: Why We Disclose. Journal of Information Technology,
25(2), 109-125.

Sproule S, Archer N. (2010, November). Measuring identity theft and identity fraud. International Journal of Business Governance and Ethics, 5, 51-63.