Page 468 - Kaleidoscope Academic Conference Proceedings 2024
P. 468

2024 ITU Kaleidoscope Academic Conference




           sit between W3.0 interactions. However, without governance   5.1   Respect for human dignity
           structures  that  help  standardize  controls  and  measure
           accountability  against  a  set  of  design  principles  and   Technology  development  should  prioritize  and  respect
           expectations,  how  do  we  ensure  quality  control  across   human  dignity  in  all  its  forms  through  the  adequate
           development?  Is  developer  consensus  enough  to  ensure   protection  of  individuals  identities.  The  data  collected,
           standards are met? It could be argued volunteer developer   algorithms developed, and the platforms designed should not
           consensus has been successfully trialed in W2.0 with open-  allow for the degradation, dehumanization or discrimination
           source  systems  being  widely  adopted  and  maintained.  A   of  individuals  or  groups,  whether  those  individuals
           recent example however, demonstrated the risks around open   participate  in  the  service  provided  or  not.  Example:  Data
           source  when  a  ‘supply  chain’  hack  against  Linux   collected should only be for the minimum data points required to
           distributions saw a back door access point introduced by a   validate  the  security  of  a  service.  Collection  beyond  this
           ‘volunteer developer’.  The vulnerability was identified by   requirement has historically been used for surveillance, profiling,
                                                              or decisions that have led to discrimination, therefore additional
           another developer before it was rolled out across the public   data points should be fully transparent and optional for individuals.
           domain but it highlighted the risks associated with reliance
           on the good will of a few dedicated technicians [43].   5.2   Transparency and accountability

           4.7  Migration of Web 2.0 to Web 3.0               Technology developers must be transparent about how their
                                                              technologies work and why they require the data points they
           One key consideration is how W3.0 will connect to W2.0   request in a way that is considered informed consent. For
           applications to ensure continuity of services to users. If we   communication  to  be  transparent  developers  must  ensure
           consider  the  impact  moving  to  an  SSI  privacy  model  on   information regarding services is accessible to all regardless
           W3.0 will have for tech giants and government agencies, it   of education level, age, cognitive ability, language, disability,
           is easy to conclude there will not only be push back but a   or  any  other  distinction.  Example:  Clear  communication
           race to try to develop the same privacy models in W3.0 as   regarding the collection of data and the use of algorithms should
           we currently have in W2.0. Users may also find themselves   be provided to individuals before the service is engaged with and
           in  positions  whereby  they  have  to  opt  out  of  certain   should be in a language that is accessible to the user, and accounts
           community relationships or services because those providers   for age, cognitive variations, and potential disabilities.
           refuse to transition or bridge to the new SSI model. The risk
           to our overarching human rights as we push for SSI has the   5.3   Right to challenge
           potential to be vast and should not be underestimated simply
           because the current abuses are also great.         Technology providers will be held accountable via redress
                                                              and remediation frameworks, for any impact they have on
                               5.  HRDAT                      individuals and society through the misuse or loss of private
                                                              data. These frameworks will be designed to ensure that any
           This paper proposes that to ensure the human rights aligned   perpetuation of existing inequalities through the collection,
           ideology  and  integrity  of  W3.0,  there  needs  to  be  an   manipulation, profiling, and/or mishandling of private data
           overarching Human Rights Data and Technology framework   has a clear pathway for redress and remediation. Providers
           (HRDaT) that provides a privacy-focused design strategy.   will also be required to report on an open forum, the amount
           Figure 2 offers a process flow representing key modules and   and type of data processed and the purposes it has processed
           stakeholders that need to be accounted for in the HRDaT. For   that data for. Example: Existing frameworks such as GDPR and
           this framework to be designed the first step is to identify   governing bodies such as the Information Commissioners Office
           more specific and actionable technology privacy principles   (ICO) may be given stronger powers to govern and enforce punitive
           for  developers  as  they  relate  to  human  rights,  than  is   damages as well as fines. An open forum for data processors to
           currently offered by the UNESCO GGDP. Whilst the GGDP   report  annually  the  types  and  amount  of  data  being  processed
                                                              alongside the revenue generated from e.g. marketing, could assist
           has  made  great  strides  in  associating  technology   in transparency and oversight efforts.
           development  to  human  rights  and  provides  an  excellent
           source of guidance for UN States to understand their duties   5.4   Minimum standards of privacy
           in supporting those rights from a technology perspective, the
           principles for developers are more generally associated to   Technology developers must consider the collection of data
           content curation and moderation than focused on privacy. It   beyond  the  minimum  data  points  required  to  validate  the
           is  essential  that  we  refocus  attention  to  privacy  if  these   security  of  a  service,  as  a  privilege  and  not  a  right.  All
           governing  bodies  wish  to  embed  human  rights  into   platforms must prioritize individual users as their primary
           technology design. As we have seen in this paper, content   stakeholders considering their right to privacy as the number
           moderation  is  not  a  driver  for  freedom  of  expression  and   one driver within any business model. This is not limited to
           identity. Only by embedding privacy through decentralizing   security but also includes how the data is processed, for what
           W3.0 technologies can we hope to guarantee those rights.   purposes, who is the beneficiary of any processing outputs,
           Foundational  to  the  HRDaT  this  paper  offers  five  human   and  how  the  data  is  stored.  Example:  Technology  providers
           rights  and  privacy  focused  technology  design  principles   should ask whether the data being collected is for the well-being
           created to align to UDHR, ECHR, HRA, and GGDP.     and service of the user, or for the financial interests of the company
                                                              or its investors whether directly or indirectly. Whilst a company





                                                          – 424 –
   463   464   465   466   467   468   469   470   471   472   473