Ekonomi politik açıdan kişisel verilerin korunması

Post-fordist üretim tarzı ve enformasyon teknolojileri, kişisel verileri sermaye birikimine katkıda bulunan meta haline getirmiştir. Enformasyon teknolojilerinin kullanımıyla, kişisel veriler kolaylıkla toplanıp, depolanıp, üçüncü taraflara aktarılmakta ancak gizliliğin korunması sorun olmaktadır. Kâr amacıyla hareket eden firmalar, gizliliğin korunmasını ikinci plana atarken, yasalar ve uluslararası düzenlemeler de tek başlarına etkin olamamaktadır. Teknoloji iki taraflı kullanılmakla birlikte, ticari baskılarla verileri korumaktan çok toplayıp, saklama yönünde tasarlanmıştır. Tüm bu sorunlar bağlamında bu makalenin amacı, yasa, piyasa ve teknolojinin birbirine geçtiği kişisel veri korumasını ekonomi politik açıdan ele alarak 2003 yılından itibaren bekleyen yasa tasarısıyla ilgili tartışmalara katkıda bulunmaktır.

Personal data protection from the political economy perspective

The Post-Fordist mode of production and information technologies have turned personal data into commodities. Thanks to the information technologies, personal data can be easily compiled, stored, and transferred to third parties. Yet, the protection of privacy constitutes a problem. While firms, acting on profit making motives, tend not to prioritize privacy protection, laws and international regulations fail to maintain efficacy by themselves. Although technology is utilized to both ends, it is designed more for compiling and storing data due to commercial concerns rather than protecting them. Within the context of all the aforementioned issues, this article aims to contribute to the ongoing debate about the draft law awaiting enactment since the year 2003 by elaborating with a political economy approach on personal data protection where the law, market, and technology commingle.

___

  • A Face is Exposed for AOL Searcher No.4417749, The New York Times, 09/08/2006.
  • Acquisti, Alessandro (2010),”The Economics of Personal Data and the Economics of Privacy”, OECD Privacy Guidelines.
  • Advantage 75 Milyon Dolara HSBC Bank’ın, Hürriyet Gazetesi (09/08/2002).
  • Aglietta, Michel (2000), A Theory of Capitalist Regulation, New York: Verso Amaç Devleti Şeffaf Hale Getirmek, C: Documents and SettingsUser1DesktopAmaç Devleti şeffaf hale getirmek - Yorum - Radikal İnternet.htm 26/06/2008.
  • Amin, Ash (2000), “Post-Fordism, Models, Fantasies and Phantoms of Transition”, Post- Fordism: A Reader, (der), s.4-40. Amin, Ash., U.K: Blackwell Publishing ?
  • Baker, Jennifer (2011), “Web Paths are Personal Data Says Consumer Group”.www.pcworld.com/businesscenter/article/239741/web_paths_are-personal-data-says-consumer-group.html (19/05/2012).
  • Bennett, Colin. J. (2011), “In Defence of Privacy: the Concept ad the Regime”, Surveillance & Society 8(4), s. 485-496.
  • Bergkamp, Lucas, Hunton - Williams (2002), “EU Data Protection Policy: The Privacy Fallacy: Adverse Effects of Europe’s Data Protection Policy in an Information-Driven Economy”. Computer Law & Security Report 18: 31-47.
  • Birnhack, Michael D.(2008),“The EU Data Protection Directive: An Engine of a Global Regime”, Computer Law & Securitu Report, 24, s. 508-520.
  • Campbell, John Edward - Carlson, Matt (2010), “Panopticon.com: Online Surveillance and the Commodification of Privacy”, Journal of Broadcasting & Electronic Media. 46: 4, s.586-606. Connecticut Attorney General's Office Press Release, http: //www.ct.gov/ag/ cwp/ view.Asp?A=2341&Q=462754
  • Electronic Frontier Foundation (2011), “Data Protection Regulation and the Politics of Interoperability” www.eff.org/deeplinks/2011/12/data-protection-regulation-and politics-interoperability ( 16/05/2012).
  • EU Directive, http: //www.cdt.org/privacy/ eudirective/ EU_Directive html
  • Hesmondhalgh David (2010). “User-generated content, free labour and the cultural industries”, Ephemera,10 (3/4): 267-284.
  • Fuchs, Christian (2010), “Labour inInformational Capitalism and on the Internet”, TheInformation Society, 26, s. 179-196.
  • Fuchs, Christian (2011), “The Political Economy of Google”, http://english.unak.is/ static/files/Nordmedia2011/Fuchs_Christian.pdf (25/05/2012)
  • Fuchs, Christian (2011a), “Web 2.0, Prosumption, and Surveillance”, Surveillance & Society, 8 (3), s. 288-309.
  • Fuchs, Christian (2011b), “An Alternative View of Privacy on Facebook”, Information, s. 140-165.
  • Fuchs, Christian (2011c), “New Media, Web 2.0 and Surveillance”, Sociology Compess, 5/2, s. 134-147.
  • Gandy, Oscar, H. (1996), Coming to Terms with the Panoptic Sort, D.Lyon ve E.Zureick (Der), “Computers, Surveillance, and Privacy”, s. 132-155. Minneapolis: University of Minnesota Press.?
  • Gima’dan Müşterilere Garanti, http: //www.haberpan.com/gimadan-musterilere-garanti-haberi / (30/05/2006).
  • Hladjk, Jörg (2004), “The Protection of Databases Under EU and US Law-the SuiGeneris Right as an Appropriate Concept?”, Computer Law &SecurityReport, Vol. 20 No: 5. s. 377-383.
  • Ian Kerr Admits Selling Secret Information on Workers, The Sunday Times, 27/05/2009.
  • Jessop, Bob (2003),”The State and the Contradiction of the Knowledge DrivenEconomy”, http: //www.lancs.ac.uk/fass/sociology/papers/ jessop -state-and-contradictions.pdf (20/02/2011).
  • Karlıdağ, Serpil - Eser, Zeliha (2011), “Who is the Owner of Personal Data Base : Consumers’ Feelings and Concerns about Data Privacy in Turkey”., Challenges in Communication (der) içinde s. 163-173. Kefalaki, Margarita ve Pasedeos, Yorgo.Greece: Atiner.
  • King, Nancy, J - Jessen Pernille Wegner (2010), “Profiling the Mobile Customer- Is Industry Self –Regulation Adequate to Protect Consumer Privacy When Behaviroul Advertisers target Mobile Phones?-Part II, Computer Law and Security Review, 26(6), s. 595-612.
  • Kişisel Verilerin Korunması Projesi, http: //www.bilgiedinmehakki.org/tr/index.php? option =com _content&task=view&id=83&Itemid=24 (13/06/2011)
  • Kişisel Verilerin Korunması Yasası Hala Bekliyor, http: //www.haberpan.com/haber/ kisisel-verilerin-korunmasi-yasasi-hala-bekliyor (22/06/2011).
  • Kuner, Christopher, (2009),”An International Legal Framework for Data Protection: Issues and Prospects”, Computer Law &Security Review, 25, s. 307-317.
  • Küzeci, Elif (2010), Kişisel Verilerin Korunması, Ankara: Turhan Kitabevi. Lyon, David (2008), “Surveillance Society”, Talk for Festival del Dritto, Piacenza, İtalia.
  • Marlin - Bennett, R. (2004), Knowledge Power : Intellectual Property, Information & Privacy. USA: Lyne Rinner Publishers.Inc.
  • Medosch, Armin (2010), Post-Privacy or the Politics of Labour, Intelligence and Information, : Documents and SettingsUser1Local SettingsTemporary Internet C FilesContent.IE5EBXPN1NZPost-Privacy or the Politics of Labour, Intelligence and Information The Next Layer.mht.?
  • Meehan, Eileen R. (1988), “Technical Capability Versus Corporate Imeratives: Toward a Political Economy of Cable television and Information Diversity”, The Political Economy of Information(der) içinde, Mosco Vincent ve Wasko Janet. ABD: The University of Wisconsin Pres, s. 167-187
  • Mosco, Vincent (1996), The Political Economy of Communication: Rethinking and Renewal. London: Sage.
  • Movius Lauren B. - Krup Nathalie (2009), “US and EU Privacy Policy: Comparision of Regulatory Approaches”, International Journal of Communication, (3), 169-187.
  • Ook Lee - Seung – Wainwright, Joel (2010), “Revisiting Regulation Theory for the Analysis of South Korean Capitalism”, Journal of the Economic Geographical Society of Korea. Vol. 13 No: 4 s. 562-583.
  • Özdemir, Hayrunnisa (2009a), Elektronik Haberleşme Alanında Kişisel verilerin Özel Hukuk Hükümlerine Göre Korunması, Ankara: SeçkinYayıncılık ve Tic. A.Ş.
  • Özdemir, Hayrunnisa (2009b), “Türkiye’de Kişisel Verilerin Korunması”,http: //inet-tr.org.tr/inetconf14/bildiri/81.doc . 23702/2011’de erişildi.
  • Özel Hayatı Fişleme Tasarısına Tepki, http: //www.haber10.com/haber/123763 (27/05/ 2008)
  • Purtova, Nadezhda (2009), “Property Rights in Personal Data: Learning From the American Discourse”. Computer Law & Security Review 25, s. 507-521.
  • Reidenberg, Joel. R. (2000), “Privacy protection and the Interdependence of Law, Technology and Self-Regulation”, http: //reidenberg.home.sprynet.com/ Interdependence. htm (12/06/2011).
  • Skandal! Kimlik Bilgileri Satılıyor, http: //www.tumgazeteler.com/?a=5786133 (11/12/2009).
  • Samuelson, Paul, A. - Nordhouse, William D. (1989), Economics, USA: McGraw-Hill Book Company.
  • Stratford Jean Slemmons - Stratford Juri (1998), “Data Protection and Privacy in the United States band Europe”, Iassist Quartetl., Fall, Vol. 223, s. 17-20.
  • Studer, Matthias U. (2005) “The Quest for Legal Protection of Databases in the Digital Age”, The Journal of World Intellectal Property” Vol. 4. İssue 5, s. 653-752.
  • Tehlike “beğen”, Birgün gazetesi (09/06/2011).
  • Tehlike “beğen”, Birgün gazetesi (23/06/2011).
  • Türk hukuk sitesi, http: //www.turkhukuksitesi. com/showthread .php? t = 19586 (25/06/2011)
  • UN Guidelines, 1990, http: //www.unhcr.org/refworld/ publisher,UNGA, THEMGUIDE, 3 ddcafaac ,0.html (03/02/2011).
  • Varian, Hal. R. (1996), “Economic Aspect of Personal Privacy”, Technical Report, University of California.
  • Zwick, Detlev. (2009), “Manufacturing Consumers, The database as new means of production”, Journal of Consumer Culture.