Coronavirus Tracing Apps Conflict With Privacy

Smartphone apps designed to trace people at risk of Covid-19 infection have attracting criticism in Europe and the US for their potential as surveillance and spying tools to be used by governments.  

Scientists and researchers from more than 25 countries have published an open letter urging governments not to abuse such technology to spy on their people and warning of risks in an approach championed by Germany.

More than a hundreds of the British researchers and scientists have expressed concern over privacy and security resulting from 'mission creep' as the UK's government plans for using smartphones to trace and combat coronavirus slowly get going.

Much of our pre-coronavirus lives may be reclaimable with some modifications around how we work, socialise and travel, however in one crucial way the post-pandemic landscape will be very different as an individual’s autonomy and data privacy may be lost as mobile telephones are used for surveillance.

This will have important consequences for the relationship not just between citizens and governments, but also between consumers and businesses.

The risk of the coming end of privacy is attributable to the success of virus tracing apps in South Korea and Taiwan which have both been effective in flattening the Covid-19 curve by digitally tracking infected persons. No government was using dispersed databases as extensively to fight the spread of the disease as South Korea. Before an explosive outbreak in its worker dormitories, Singapore earned praise for TraceTogether, which claims to be the first Bluetooth contact-tracing app covering an entire nation. The 1.4 million users represent roughly a fourth of the island’s population.

Governments want access to phones, with or without informed consent and turning the clock back will be difficult, if not impossible. Where boundaries between private and public are thin to begin with, a pandemic can make them disappear. 

There have been assurances from various governments, including those in France, India and Singapore, that tracing  Apps will go away once the outbreak is contained, but no legal guarantees.  

  • The Singaporean app records physical proximity in an anonymised form on smartphones. Minimal data is stored on servers. The national TraceTogether’s App building blocks are in the public domain although he source code of  is yet to be disclosed.
  • As India reopens after a 43-day lockdown, it’s mandatory, first for public-sector employees and now for private-sector workers and company bosses are liable to ensure their workers download the app, though nobody is accountable for misuse of data.  The Indian government recently denied a French security researcher’s claim that the privacy of ninety million Indians is at stake. 

An analysis of China’s Alipay Health Code software, which uses various data sources of data to categorise a person’s health status with a colour code, found that some information is shared with the police.

One consequence of Covid-19 will be to erode privacy in the name of public health. European data protection laws will try to ensure that the emergency collection and processing of personal information is legally accountable and for a limited purpose but the British parliament’s human rights committee says it isn’t convinced that the National Health Service’s tracing App protects privacy.

Where they exist, robust institutions could will offer resistance to surveillance but  in many places the individual’s autonomy has already become a virus casualty. Poorer countries where consumers have only recently started going online will see states insist on devices that come with pre-loaded tracking apps. 

Whether sensitive data will be kept safely on devices or stored on a central server in a way that might allow a bad actor to reconstruct a person’s social activity, keeping a record of where they have been and when and who they meet. will become an urgent question as efforts to control the Coronavirus extend around the world.  

Bloomberg:      ZDNet:     SCMP:       LA Times:   

You Might Also Read: 

Incompatible: Privacy & The Internet of Things:

Coronavirus Track & Trace Apps On A Deadline:

 

« Hacked Vehicle Owner Database For Sale
Vehicle Cyber Crime Attacks Double »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

GrammaTech

GrammaTech

GrammaTech is a leading developer of software-assurance tools and advanced cyber-security solutions.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Quatrro Business Support Services (QBSS)

Quatrro Business Support Services (QBSS)

QBSS is a tech-enabled outsourcing firm that’s changing the way companies think about finance, accounting, human resources and technology services.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Credo AI

Credo AI

Credo have pioneered a Responsible AI platform that enables context driven, comprehensive and continuous governance, oversight and accountability of AI.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.