ijalr

Trending: Call for Papers Volume 6 | Issue 3: International Journal of Advanced Legal Research [ISSN: 2582-7340]

TELECOMMUNICATION IDENTIFIER USER ENTITY (TIUE): PRIVACY, SURVEILLANCE, AND LEGAL ACCOUNTABILITY IN MODERN COMMUNICATIONS – Shabnam Saleem

Introduction

The surge of digital communication has revolutionized telecommunications as no longer being a strictly technical service, but as a space subject to legal regulation where identity, privacy and accountability collide. Under modern communication systems, user identification is now the focal point of mobile network, internet-based communication systems and the state regulatory systems. All subscribers are usually associated with one or more identifiers, either as a result of a SIM registration procedure, as a mobile number, as a device-based identifier, or account-bound credentials held by a mobile service provider. In this regard, we can think of the term of the Telecommunication Identifier User Entity (TIUE), which can be perceived as the legally and functionally identifiable user of the telecommunications system, whose existence is identified by data points that allow performing authentication, traceability, regulation, and delivery of services. The term as such is not a commonly used legal term, but it summarizes a growing concern of telecommunications law: the legal status of the identity of the user in digitally mediated communications.

TIUE is important because the telecommunication systems would not run in darkness with respect to anonymity. In many instances, current regulatory frameworks provide that the service providers gather, authenticate, store and in certain cases hand over the information associated with subscribers to the government. This legal framework is usually defended based on national security reasons, fraud prevention, authorized interception of the law, consumer protection, and market control. Simultaneously, though, legal collection and utilization of telecommunication identifiers also concern some profound issues of privacy, informational autonomy, data protection, and the potential threat of surveillance. This puts the law in a tricky situation: the law needs to allow identifying methods that are needed to conduct legitimate state and business activities and avoid misuse, overreaching, and unwarranted intrusion into the rights of individuals. This strain has now become one of the characteristics of telecommunications regulation in the digital age.[1]

TIUE is most effectively studied not only as a technical issue of network administration, but as a legal issue of the classification, ownership, management, and allowable application of communications-related identity information. A telecommunication identifier can take the form of a neutral one but in reality, it can mention trends of movement, associations, habits of the person and digital behavior. The user party to such identifiers is thus not just a subscriber in the contractual sense, but also a party to the law, whose constitutional, statutory and human rights can be impacted by data collection and access activities.[2] The study of law has come to understand that secrecy is not the sole source of information privacy. Instead, the main question concerns whether the personal information is gathered, processed, and shared beyond the legitimate expectations or is a violation of human dignity, which is particularly acute in the telecommunications sphere since user identifiers tend to operate on a continuous, invisible, and massive scale.

TIUE has become increasingly relevant in the legal context with the introduction of compulsory SIM registration policies, cross border data retention policies, biometric authentication schemes and 4G, 5G and eSIM data systems. These advancements have ensured that user identification is more accurate, unrelenting and valuable to individual players as well as the governments. Meanwhile, they have subjected people to novel types of legal vulnerability, such as identity theft, SIM swap fraud, unlawful profiling, unnecessary data retention, and disproportionate surveillance. There has been a growing demand that judicial and regulatory bodies establish the appropriate boundaries of state and corporate access to communications information.[3] Through the example of Europe, again and again the courts have stressed that traffic and location data can easily disclose highly personal details about personal life, and thus must be subject to a high level of safeguards, access requirements based on necessity, and proportionality.

The reason TIUE should be given special attention in the law study is because it borders with a number of disciplines of law. The telecommunications law deals with licensing, network access, and service-provider requirements; data protection law deals with the gathering and usage of personal data; constitutional and human rights law deals with privacy, dignity, and expression; and criminal law deals with interception, computer-crime, fraud, and the use of communications records as evidence. Consequently, there is no unified legal system that describes the identity of telecommunication users. The meaningful analysis should consequently take an integrated approach. It needs to question, who is in charge of the identifier, and what are some legal obligations surrounding its collection, when, and under what circumstances it can be revealed, and what forms of redress are available in the event of abuse of this kind of information. This is particularly significant in legal frameworks whereby the growth of regulation has preceded the creation of transparency, consent and accountability protections.

This study supports the argument that TIUE is a conceptual metaphor that can be relied upon to analyze how telecommunication legal governance addresses the identification of users. It will allow an organized discussion of how the telecom systems turn people into identifiable entities to be used in operation and regulation and how the law reacts to the ensuing privacy and liability issues. The legal nature and structure of telecommunication user identification will be first discussed in the paper. It will subsequently examine how TIUE impacts privacy, data protection and human rights. Lastly, it will determine the regulatory and liability concerns that emerge due to misuse, unauthorized access and the developing technologies of identification. By doing so, the paper will attempt to show that the future of the telecommunications law is not just centered on effective identification tools, but also on the creation of protective measures that can maintain the equilibrium between security, regulation, and personal freedom.[4]

[1]Daniel J. Solove, A Taxonomy of Privacy, 154 U. Pa. L. Rev. 477 (2006). https://scholarship.law.gwu.edu/faculty_publications/892/

[2]Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life 127–57 (2010). https://www.sup.org/books/title/?id=8862

[3]Joined Cases C-293/12 & C-594/12, Digital Rights Ir. Ltd. v. Minister for Commc’ns, Marine & Nat. Res. and Kärntner Landesregierung v. Seitlinger, 2014 E.C.R. I-238. https://curia.europa.eu/juris/liste.jsf?num=C-293/12

[4]Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016, 2016 O.J. (L 119) 1 (General Data Protection Regulation). https://eur-lex.europa.eu/eli/reg/2016/679/oj