{"id":265331,"date":"2017-07-19T10:30:54","date_gmt":"2017-07-19T14:30:54","guid":{"rendered":"https:\/\/policyoptions.irpp.org\/issues\/balancing-privacy-and-security-in-the-digital-age\/"},"modified":"2025-10-07T21:42:02","modified_gmt":"2025-10-08T01:42:02","slug":"balancing-privacy-and-security-in-the-digital-age","status":"publish","type":"issues","link":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/","title":{"rendered":"Balancing privacy and security in the digital age"},"content":{"rendered":"<p>In late June, members of the Five Eyes (Canada, the US, UK, Australia and New Zealand) intelligence alliance convened in Ottawa. Alongside their routine proceedings, <a href=\"https:\/\/globalnews.ca\/news\/3526274\/five-eyes-intelligence-alliance\/\">reports have suggested<\/a>, there were discussions about a proposal by the Australian government to force the tech industry to create \u201cback doors\u201d to smartphone and app encryption. Back doors are technical features that allow for the collection of intelligence and evidence from devices and sites without the user\u2019s explicit consent. The impacts on privacy are controversial; and although it\u2019s the police and intelligence agencies that are calling for them, back doors could be a boon to hackers, too, raising a whole other group of security concerns.<\/p>\n<p>Such proposals have been raised in the US and UK before but haven\u2019t gained the support needed to get acted upon. This time around, the proposal has probably picked up some momentum among the political masters who oversee national security agencies, because of the widely reported use of consumer technologies to recruit terrorists and carry out recent attacks around the world. Even when the authorities have court orders to get into phones and apps, they run up against built-in security features that they cannot break through.<\/p>\n<p>Unfortunately, the revelation of the clandestine discussions in Ottawa has resulted in another round of oversimplified analysis of this critical issue, with <a href=\"https:\/\/www.theglobeandmail.com\/opinion\/the-battle-over-encryption-and-what-it-means-for-our-privacy\/article35478817\/?lipi=urn%253Ali%253Apage%253Ad_flagship3_feed%253B5v4Nus0GRFaApjanGAPg5w%253D%253D\">hyperbolic commentary<\/a> based more in ideology than in sound understanding of the technology. Privacy advocates claim back doors would spell the end of privacy and wouldn\u2019t even deliver meaningful security results in the long run. Unsurprisingly, the revelations made by Edward Snowden, the US National Security Agency contractor who leaked classified information about his government\u2019s questionable collection of citizens\u2019 data, are again being cited as the primary proof point that no balance can be struck between privacy and security in the digital age.<\/p>\n<p>Such arguments are unhelpful as open societies come to grips with how connectivity is challenging the tenets of democracy. Legislatures in the Western world have largely failed to tackle the issue of balancing security and privacy while technology continues to evolve rapidly. Without direction from their governments, security agencies are left to negotiate with the technology industry in private about gaining access to encrypted data and, on rare occasions when talks stall, via the media.<\/p>\n<p>The lack of up-to-date legislation also means that courts must work with laws that were written well before the arrival of cloud computing, Internet of Things devices or military-grade encryption on millions of consumer devices and apps. The results are convoluted at best. In the US, one court ordered a key witness to unlock her iPhone using her thumbprint, but another court ruled that demanding a smartphone be unlocked by a suspect (via passcode, in that case) would be tantamount to requiring self-incrimination and thus unconstitutional.<\/p>\n<p>In democratic societies we generally accept that there is no absolute right to privacy, at least in the analogue world. Our social contract opens our homes to police for search and seizure under the supervision of the judicial system, if warranted to maintain public safety.<\/p>\n<p>However, in the digital world, we are going down a road where there are new kinds of \u201chomes\u201d (smart devices) and whole \u201cneighbourhoods\u201d \u2014 social media platforms, messaging applications, e-commerce sites and the dark Web \u2014 that are practically unpoliceable, regardless of what our courts deem to be reasonable limits on individual privacy.<\/p>\n<p>The magnitude of this challenge is vast: there are 7 billion connected devices today, and the total is estimated to grow to 50 billion by 2020. There are over 5 million apps in the Google and Apple app stores. And there are over 800 cryptocurrencies, with new ones coming on the market all the time.<\/p>\n<p>Each one of these is a new home, community or currency that now operates as a parallel jurisdiction to our towns, provinces and countries. Each runs with its own rules, its own governance or a lack thereof, and many operate with complete impunity because the data they run on rest in servers in a foreign country, or multiple countries.<\/p>\n<p>This dichotomy \u2014 of great technological transformation and legislative paralysis \u2014 has created a context empowering criminals who can leverage digital devices and connectivity. Their reach goes well beyond the realm of terrorism. Crimes like <a href=\"https:\/\/www.theglobeandmail.com\/opinion\/the-crime-rate-is-falling-but-are-we-really-safer\/article25771329\/\">child exploitation, fraud, bullying and extortion<\/a> are multiplying at an explosive rate in the digital age. Even a back door for police and national security agencies cannot magically solve all of these emerging challenges overnight.<\/p>\n<p>To its credit, the <a href=\"https:\/\/startouch.thestar.com\/screens\/aee82a65-6e46-4d1d-8094-a1007439f73f%7C_0.html\">RCMP<\/a> has begun to lift the curtain on its digital challenges and is acknowledging the need for a rethink of both legislative measures and cooperation with the technology sector, with the hope of sparking a broader societal debate. Leading technology companies, such as Google, have also started to reconsider their positions. In a speech in June in Washington, <a href=\"https:\/\/www.nationallawjournal.com\/id=1202790888319\/Googles-Top-Lawyer-Says-DigitalEvidence-Law-Needs-Fundamental-Realignment\">Google\u2019s general counsel, Kent Walker<\/a>, called for a fundamental review of the laws that govern how police and security agencies investigate e-crimes. Walker said they are \u201cdue for a fundamental realignment in light of the rapid growth of technology that\u00a0relies on the cloud [and] the very real security threats that face people and communities.\u201d<\/p>\n<p>If we are to balance security and privacy, all stakeholders \u2014 including our security and policing agencies, the technology sector, privacy advocates and the victims of crimes enabled by the Internet \u2014 must come together for a reasonable and open public debate on this subject. We must focus on practical challenges and tangible solutions. The best solutions will allow citizens to enjoy technological innovation without wondering if their civil liberties are being infringed upon, while empowering police agencies to serve their societal function.<\/p>\n<p>The entrenched, extreme positions on this important subject that we have seen so far have clearly not yielded meaningful results in the form of public policy and technology that strike a reasonable equilibrium. Technology at its best is the manifestation of the society we want. It\u2019s high time we started talking about the balance we want between our security and our privacy in the digital age.<\/p>\n<p><span class=\"image-caption\">Photo: Shutterstock, by Iaremenko Sergii<\/span><\/p>\n<hr \/>\n<p><em>Do you have something to say about the article you just read? Be part of the<\/em><em>\u00a0<\/em>Policy Options<em>\u00a0<\/em><em>discussion, and send in your own submission. Here is a<\/em><em>\u00a0<\/em><a href=\"https:\/\/policyoptions.irpp.org\/article-submission\/\"><em>link<\/em><\/a><em>\u00a0<\/em><em>on how to do it. |\u00a0Souhaitez-vous r\u00e9agir \u00e0 cet article ?\u00a0<\/em><em>Joignez-vous aux d\u00e9bats d\u2019<\/em>Options politiques<em>\u00a0<\/em><em>et soumettez-nous votre texte en suivant ces<\/em><em>\u00a0<\/em><a href=\"https:\/\/policyoptions.irpp.org\/fr\/article-submission\/\"><em>directives<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In late June, members of the Five Eyes (Canada, the US, UK, Australia and New Zealand) intelligence alliance convened in Ottawa. Alongside their routine proceedings, reports have suggested, there were discussions about a proposal by the Australian government to force the tech industry to create \u201cback doors\u201d to smartphone and app encryption. Back doors are [&hellip;]<\/p>\n","protected":false},"featured_media":254105,"template":"","meta":{"_acf_changed":false,"content-type":"","ep_exclude_from_search":false,"apple_news_api_created_at":"2025-10-08T01:42:04Z","apple_news_api_id":"838eb316-c235-4b51-954f-ae6b5bdce6be","apple_news_api_modified_at":"2025-10-08T01:42:04Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/Ag46zFsI1S1GVT65rW9zmvg","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false},"categories":[9359,9358,9372],"tags":[8547,8569,8543],"article-status":[],"irpp-category":[4339,4295,4337,4385],"section":[],"irpp-tag":[7102],"class_list":["post-265331","issues","type-issues","status-publish","has-post-thumbnail","hentry","category-loi-droits","category-politique","category-recent-stories-fr","tag-cybersecurite-fr","tag-securite-nationale","tag-privacy-fr","irpp-category-loi-et-justice","irpp-category-politique","irpp-category-science-et-technologie","irpp-category-securite-nationale","irpp-tag-cybersecurite"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Balancing privacy and security in the digital age<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Balancing privacy and security in the digital age\" \/>\n<meta property=\"og:description\" content=\"In late June, members of the Five Eyes (Canada, the US, UK, Australia and New Zealand) intelligence alliance convened in Ottawa. Alongside their routine proceedings, reports have suggested, there were discussions about a proposal by the Australian government to force the tech industry to create \u201cback doors\u201d to smartphone and app encryption. Back doors are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/\" \/>\n<meta property=\"og:site_name\" content=\"Policy Options\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IRPP.org\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-08T01:42:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@irpp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/\",\"name\":\"Balancing privacy and security in the digital age\",\"isPartOf\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg\",\"datePublished\":\"2017-07-19T14:30:54+00:00\",\"dateModified\":\"2025-10-08T01:42:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#primaryimage\",\"url\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg\",\"contentUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg\",\"width\":2000,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/policyoptions.irpp.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Balancing privacy and security in the digital age\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/\",\"name\":\"Policy Options\",\"description\":\"Institute for Research on Public Policy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Balancing privacy and security in the digital age","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/","og_locale":"fr_FR","og_type":"article","og_title":"Balancing privacy and security in the digital age","og_description":"In late June, members of the Five Eyes (Canada, the US, UK, Australia and New Zealand) intelligence alliance convened in Ottawa. Alongside their routine proceedings, reports have suggested, there were discussions about a proposal by the Australian government to force the tech industry to create \u201cback doors\u201d to smartphone and app encryption. Back doors are [&hellip;]","og_url":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/","og_site_name":"Policy Options","article_publisher":"https:\/\/www.facebook.com\/IRPP.org","article_modified_time":"2025-10-08T01:42:02+00:00","og_image":[{"width":2000,"height":700,"url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@irpp","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/","url":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/","name":"Balancing privacy and security in the digital age","isPartOf":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#primaryimage"},"image":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#primaryimage"},"thumbnailUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg","datePublished":"2017-07-19T14:30:54+00:00","dateModified":"2025-10-08T01:42:02+00:00","breadcrumb":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#primaryimage","url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg","contentUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Desai-cover.jpg","width":2000,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/policyoptions.irpp.org\/fr\/2017\/07\/balancing-privacy-and-security-in-the-digital-age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/policyoptions.irpp.org\/fr\/"},{"@type":"ListItem","position":2,"name":"Balancing privacy and security in the digital age"}]},{"@type":"WebSite","@id":"https:\/\/policyoptions.irpp.org\/fr\/#website","url":"https:\/\/policyoptions.irpp.org\/fr\/","name":"Policy Options","description":"Institute for Research on Public Policy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues\/265331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues"}],"about":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/types\/issues"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media\/254105"}],"wp:attachment":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media?parent=265331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/categories?post=265331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/tags?post=265331"},{"taxonomy":"article-status","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/article-status?post=265331"},{"taxonomy":"irpp-category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-category?post=265331"},{"taxonomy":"section","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/section?post=265331"},{"taxonomy":"irpp-tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-tag?post=265331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}