National Academies Press: OpenBook

Realizing the Information Future: The Internet and Beyond (1994)

Chapter: APPENDIX B Sample Principle Sets

« Previous: APPENDIX A Federal Networking: The Path to the Internet
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 254
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 255
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 256
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 257
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 258
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 259
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 260
Suggested Citation:"APPENDIX B Sample Principle Sets." National Research Council. 1994. Realizing the Information Future: The Internet and Beyond. Washington, DC: The National Academies Press. doi: 10.17226/4755.
×
Page 261

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

APPENDIX B 254 APPENDIX B Sample Principle Sets NII PRINCIPLES AND OBJECTIVES • Promote private-sector investment through appropriate tax and regulatory policies. • Extend the ''universal service" concept to ensure that information resources are available to all at affordable prices. • Act as catalyst to promote technological innovation and new applications. • Promote seamless, interactive, user-driven operation of the NII. • Ensure information security and network reliability. • Improve management of the radio frequency spectrum, an increasingly critical source. • Protect intellectual property rights. • Coordinate with other levels of government and with other nations. • Provide access to government information and improve government procurement. SOURCE: Information Infrastructure Task Force (NTIA). 1993. The National Information Infrastructure: Agenda for Action. NTIA, U.S. Department of Commerce, September 15.

APPENDIX B 255 SEVEN PRINCIPLES FROM THE TELECOMMUNICATIONS POLICY ROUNDTABLE • Universal access — In our information age, everyone has a right to affordable news, education and government information. Information that is essential to the functioning of citizens in a democracy should be free. • Freedom to communicate — Information is a two-way street. The design of the new networks should aid two-way audio and video communication from anyone to any individual, group or network. • Vital civic sector — The new networks should allow all groups and individuals to freely express their ideas and opinions. The new networks should include a way for us to build communities. • Diverse and competitive marketplace — No one should ever control both the wire or wires into our home and the content of the programs that go over those wires. • Equitable workplace — Workers must be valued and protected in the new electronic workplace. Nondiscriminatory practices must form the core of the new information marketplace. • Privacy protection — Privacy should be carefully protected and extended. • Democratic policy making — Every American deserves to be heard on this complex set of issues. SOURCE: Telecommunications Policy Roundtable. 1993. New Coalition Unveils Public Interest Blueprint for America's 21st Century Telecommunications Highway. Center for Media Education, Washington, D.C., via electronic mail news release October 26.

APPENDIX B 256 Electronic Frontier Foundation on Principles • Diversity of Information Sources: Promote a fully interactive infrastructure in which the First Amendment flourishes, allowing the greatest possible diversity of view points; • Universal Service: Ensure a minimum level of affordable information and communication service for all Americans; • Free Speech and Common Carriage: Guarantee infrastructure access regardless of the content of the message that the user is sending; • Privacy: Protect the security and privacy of all communications carried over the infrastructure, and safeguard the Fourth and Fifth Amendment rights of all who use the information infrastructure; • Development of Public Interest Applications and Services: Ensure that public interest applications and services which are not produced by the commercial market are widely available and affordable. SOURCE: Electronic Frontier Foundation. 1993. New EFF Infrastructure Policy Statement: The Open Platform Campaign. Electronic Frontier Foundation, Cambridge, Mass., November 3, via electronic mail from Daniel J. Weitzner, Senior Staff Counsel.

APPENDIX B 257 FUNDAMENTAL PRINCIPLES FROM THE COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY • Universal access. All people should have affordable access to the information infrastructure. • Freedom to communicate. The information infrastructure should enable all people to effectively exercise their fundamental right to communicate. • Vital civic sector. The information infrastructure must have a vital civic sector at its core. • Diverse and competitive marketplace. The information infrastructure should ensure competition among ideas and information providers. • Equitable workplace. New technologies should be used to enhance the quality of work and to promote equity in the workplace. • Privacy. Privacy should be carefully protected and extended. • Democratic policy-making. The public should be fully involved in policy- making for the information infrastructure. • Functional integrity. The functions provided by the NII must be powerful, versatile, well-documented, stable, reliable, and extensible. SOURCE: Computer Professionals for Social Responsibility (CPSR). 1993. Serving the Community: A Public Interest Vision of the National Information Infrastructure. CPSR, Palo Alto, Calif.

APPENDIX B 258 DRAFT: APRIL 21, 1994 Principles for Providing and Using Personal Information Preamble The United States is committed to building a National Information Infrastructure (NII) to meet the information needs of its citizens. This infrastructure, essentially created by advances in technology, is expanding the level of interactivity, enhancing communication, and allowing easier access to services. As a result, many more users are discovering new, previously unimagined uses for personal information. In this environment, we are challenged to develop new principles to guide participants in the NII in the fair use of personal information. Traditional fair information practices, developed in the age of paper records, must be adapted to this new environment where information and communications are sent and received over networks on which users have very different capabilities, objectives and perspectives. Specifically, new principles must acknowledge that all members of our society (government, industry, and individual citizens) share responsibility for ensuring the fair treatment of individuals in the use of personal information, whether in paper or electronic form. Moreover, the principles should recognize that the interactive nature of the NII will empower individuals to participate in protecting information about themselves. The new principles should also make it clear that this is an active responsibility requiring openness about the process, a commitment to fairness and accountability, and continued attention to security. Finally, principles must recognize the need to educate all participants about the new information infrastructure and how it will affect their lives. These "Principles for Providing and Using Personal Information" recognize the changing roles of government and industry in information collection and use. Thus they are intended to be equally applicable to public and private entities that collect and use personal information. However, these Principles are not intended to address all information uses and protection concerns for each segment of the economy or function of government. Rather, they should provide the framework from which specialized principles can be developed. I. General Principles for the National Information Infrastructure A. Information Privacy Principle 1. Individuals are entitled to a reasonable expectation of information privacy.

APPENDIX B 259 B. Information Integrity Principles Participants in the NII rely upon the integrity of the information it contains. It is therefore the responsibility of all participants to ensure that integrity. In particular, participants in the NII should, to the extent reasonable: 1. Ensure that information is secure, using whatever means are appropriate; 2. Ensure that information is accurate, timely, complete, and relevant for the purpose for which it is given. II. Principle for Information Collectors (i.e. entities that collect personal information directly from the individual) A. Collection Principle Before individuals make a decision to provide personal information, they need to know how it is intended to be used, how it will be protected, and what will happen if they provide or withhold the information. Therefore, collectors of this information should: 1. Tell the individual why they are collecting the information, what they expect it will be used for, what steps they will take to protect its confidentiality and integrity, the consequences of providing or withholding information, and any rights of redress. III. Principles for Information Users (i.e. Information Collectors and entities that obtain, process, send or store personal information) A. Acquisition and Use Principles Users of personal information must recognize and respect the stake individuals have in the use of personal information. Therefore, users of personal information should: 1. Assess the impact on personal privacy of current or planned activities before obtaining or using personal information; 2. Obtain and keep only information that could reasonably be expected to support current or planned activities and use the information only for those or compatible purposes; 3. Assure that personal information is as accurate, timely, complete and relevant as necessary for the intended use.

APPENDIX B 260 B. Protection Principle Users of personal information must take reasonable steps to prevent the information they have from being disclosed or altered improperly. Such users should: 1. Use appropriate managerial and technical controls to protect the confidentiality and integrity of personal information. C. Education Principle The full effect of the NII on both data use and personal privacy is not readily apparent, and individuals may not recognize how their lives can be affected by networked information. Therefore, information users should: 1. Educate themselves, their employees, and the public about how personal information is obtained, sent, stored, and protected, and how these activities affect others. D. Fairness Principles Because information is used to make decisions that affect individuals, those decisions should be fair. Information users should, as appropriate: 1. Provide individuals a reasonable means to obtain, review, and correct their own information; 2. Inform individuals about any final actions taken against them and provide individuals with means to redress harm resulting from improper use of personal information; 3. Allow individuals to limit the use of their personal information if the intended use is incompatible with the original purpose for which it was collected, unless that use is authorized by law. IV. Principles for Individuals who Provide Personal Information A. Awareness Principles While information collectors have a responsibility to tell individuals why they want information about them, individuals also have a responsibility to understand the consequences of providing personal information to others. Therefore, individuals should obtain adequate, relevant information about: 1. Planned primary and secondary uses of the information;

APPENDIX B 261 2. Any efforts that will be made to protect the confidentiality and integrity of the information; 3. Consequences for the individual of providing or withholding information; 4. Any rights of redress the individual has if harmed by improper use of the information. B. Redress Principles Individuals should be protected from harm resulting from inaccurate or improperly used personal information. Therefore, individuals should, as appropriate: 1. Be given means to obtain their information and be provided the opportunity to correct inaccurate information that could harm them; 2. Be informed of any final actions taken against them and what information was used as a basis for the decision; 3. Have a means of redress if harmed by an improper use of their personal information. SOURCE: National Information Infrastructure Task Force, Information Policy Committee, Working Group on Privacy in the NII. 1994. "Request for Comments on the Draft Principles for Providing and Using Personal Information and Their Commentary." Washington, D.C., May 4. The draft Principles for Providing and Using Personal Information and the associated Commentary are the first work product of the Information Infrastructure Task Force's Work Group on Privacy. They are intended to update the Code of Fair Information Practices that was developed in the early 1970s. While many of the Code's principles are still valid, the Code itself was developed in an era when paper records were the norm.

Next: APPENDIX C User Support Services »
Realizing the Information Future: The Internet and Beyond Get This Book
×
Buy Paperback | $55.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The potential impact of the information superhighway—what it will mean to daily work, shopping, and entertainment—is of concern to nearly everyone. In the rush to put the world on-line, special issues have emerged for researchers, educators and students, and library specialists.

At the same time, the research and education communities have a valuable head start when it comes to understanding computer communications networks, particularly Internet. With its roots in the research community, the Internet computer network now links tens of millions of people and extends well into the commercial world.

Realizing the Information Future is written by key players in the development of Internet and other data networks. The volume highlights what we can learn from Internet and how the research, education, and library communities can take full advantage of the information highway's promised reach through time and space.

This book presents a vision for the proposed national information infrastructure (NII): an open data network sending information services of all kinds, from suppliers of all kinds, to customers of all kinds, across network providers of all kinds.

Realizing the Information Future examines deployment issues for the NII in light of the proposed system architecture, with specific discussion of the needs of the research and education communities.

What is the role of the "institution" when everyone is online in their homes and offices? What are the consequences when citizens can easily access legal, medical, educational, and government services information from a single system? These and many other important questions are explored.

The committee also looks at the development of principles to address the potential for abuse and misuse of the information highway, covering:

  • Equitable and affordable access to the network.
  • Reasonable approaches to controlling the rising tide of electronic information.
  • Rights and responsibilities relating to freedom of expression, intellectual property, individual privacy, and data security.

Realizing the Information Future includes a wide-ranging discussion of costs, pricing, and federal funding for network development and a discussion of the federal role in making the best technical choices to ensure that the expected social and economic benefits of the NII are realized.

The time for the research and education communities to have their say about the information highway is before the ribbon is cut. Realizing the Information Future provides a timely, readable, and comprehensive exploration of key issues—important to computer scientists and engineers, researchers, librarians and their administrators, educators, and individuals interested in the shape of the information network that will soon link us all.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!