SlideShare uma empresa Scribd logo
1 de 26
Privacy Law and Policy
Bryce Newell, J.D.
Ph.D. student, UW iSchool
Jan. 13, 2012
eReader Privacy
• Librarians Weigh Kindle Ebook Lending against
  Reader Privacy

• EFF's take on CA's newly enacted E-Reader
  Privacy Law

• Privacy Rights Re-―Kindled‖: eBook Reader
  Privacy
What is privacy?
Privacy: a Fundamental Right, or not?
• Fundamental Right
 ▫   Europe
 ▫   Canada
 ▫   Australia
 ▫   New Zealand
• Sectored Protection
 ▫ United States (except in some narrow constitutional
   areas)
Types of Privacy Protections
• Tort Privacy (common law / state law)
• Informational Privacy (largely guided by
  statutory law – i.e. federal legislation)

• Freedom from unreasonable search and
  seizure (4th Am.)
• Free speech (1st Am.)
• Fundamental decision (14th Am.)
US Privacy Milestones
• 1890 – right to privacy
  ▫ promoted in article by Warren and Brandeis (tort-based privacy)
• 1928 -- ―the right to be let alone‖
  ▫ (Brandeis dissent in Olmstead -- search and seizure)
• 1958 – nexus of anonymity and speech
  ▫ (NAACP v. Alabama) (disclosure of member list)
• 1960 – Prosser’s Torts
  ▫ based on Warren and Brandeis’s ideas
• 1967 – ―reasonable expectation‖
  ▫ (Katz v. US -- search and seizure)
• 1977 – no ―zone of privacy‖ where data is protected
  and used within broad police powers of state
  ▫ (Whalen v. Roe -- disclosure of prescription data)
Warren & Brandeis (1890)
• ―…now that modern devices afford abundant
  opportunities for the perpetration of such
  wrongs without any participation by the injured
  party, the protection granted by the law must be
  placed upon a broader foundation."
Warren & Brandeis
• The ―right to be let alone‖
• Elements of privacy from:
  ▫   defamation law
  ▫   IP law
  ▫   Contract law
  ▫   Property

  ▫ Olmstead v. US (1928)
Warren & Brandeis to Prosser
• Dean Prosser’s four torts (1960):
 ▫ appropriating the plaintiff's identity for the
   defendant's benefit
 ▫ placing the plaintiff in a false light in the public
   eye
 ▫ publicly disclosing private facts about the
   plaintiff
 ▫ unreasonably intruding upon the seclusion or
   solitude of the plaintiff
International Privacy Conventions
• Article 8 of the European Convention on Human
  Rights
 ▫ ―Everyone has the right to respect for his private
   and family life, his home and his correspondence.‖
• Article 17 of the International Covenant on Civil
  and Political Rights (UN)
Nissenbaum (2004): Cases
• Public Records Online
 ▫ Concerns? The info is already public…
• Consumer Profiling and Data Mining
 ▫ One view: targeted advertising is the most
   consumer friendly form of advertising
 ▫ Is the data really sensitive?
• RFID Tags and Surveillance
Surveillance
• US v. Jones (US v. Maynard)
• Toll roads, video cameras in public spaces, facial
  recognition (e.g. Google and PittPatt), GPS
  tracking….
• DC Police
• PATRIOT Act
  ▫ Lessens requirements for obtaining Wiretap
    warrants
  ▫ Sneak and Peak Warrants
Nissenbaum (2004): Principles
Three principles that dominate public deliberation

• 1) Protecting Privacy of Individuals Against
  Intrusive Government Agents
• 2) Restricting Access to Intimate, Sensitive, or
  Confidential Information
• 3) Curtailing Intrusions into Spaces or Spheres
  Deemed Private or Personal
Nissenbaum: Contextual Integrity
• Presiding norms of
  ▫ Appropriateness
  ▫ Distribution / Norms of information flow

• Considers the context, nature of information in
  relation to context, the roles of those receiving the
  info, their relationships to info subjects, terms of
  sharing, and terms of further dissemination.

• Is this practical?
• Is it a better way to visualize/protect privacy?
Nehf (2005)
• FTC history – law/industry self-regulation
• Market driven solutions led to widespread
  adoption of privacy policies
• But policies don’t protect information, only
  disclose how it is being sold, used, etc
• ―encouraging posting of privacy policies without
  regulating their content‖ = less info privacy for
  consumers ―than an efficient market would
  produce‖
Nehf (2005)
• ―Until privacy becomes a salient attribute
  influencing consumer choice, Web site operators
  will continue to take and share more personal
  information than consumers would choose to
  provide in a more transparent exchange.‖
Facebook
Facebook (2)
• ―Many of the most popular applications, or "apps,"
  on the social-networking site Facebook Inc. have
  been transmitting identifying information—in effect,
  providing access to people's names and, in some
  cases, their friends' names—to dozens of advertising
  and Internet tracking companies…
• ―The issue affects tens of millions of Facebook app
  users, including people who set their profiles to
  Facebook's strictest privacy settings. The practice
  breaks Facebook's rules, and renews questions
  about its ability to keep identifiable information
  about its users' activities secure.‖
                      - Wall Street Journal, Oct 18, 2010
Facebook (3)
• Who can see what?
 ▫ Public
 ▫ Friends
 ▫ Apps

• Facebook settles with the
  FTC: http://www.nytimes.com/2011/11/30/tech
  nology/facebook-agrees-to-ftc-settlement-on-
  privacy.html
Online Behavioral Advertising
• ABC News Story [link]

• For discussion of someof the recently proposed
  "Do Not Track" legislation in Congress look here,
  here, and here.
Problems
• ―…there is no single definition of what it means to be
  tracked, so expressing a preference does not
  guarantee users that they will be able to block all
  web sites and content that they may view as being
  associated with tracking behavior.‖
                                      - From Microsoft.com



• Industry self-regulation does not provide for any
  enforcement mechanism beyond current FTC
  powers (e.g. to prosecute for engaging in deceptive
  practices)
What Do “They” Know?
• The Open Data Partnership allows a glimpse
  into what information is being collected and by
  whom.
 ▫ http://www.evidon.com/partners/open_data_par
   tnership - contains list of 1021 companies that
   engage in online behavioral advertising, many of
   which also have multiple advertising products.
Who Knows?


   * Ghostery results from NAI’s
   Opt-Out page.
FTC Report
• FTC report calls for ―browser based do-not-track
  mechanism‖ in December 2010
• Industry self-regulation
 ▫ Browsers build in do not track options
 ▫ Industry groups set up opt-out mechanisms (DAA,
   NAI)
 ▫ BUT self-regulation has no teeth (enforcement
   mechanism) and may only mean you don’t see
   targeted ads, not that you won’t be tracked.
• FTC sues Chitika, reaches settlement
AdChoices Evolution
Recent Legislation
• Europe
  ▫ 2009 amendments to the EU ePrivacy Directive
    require member states to implement by May 25, 2011
• United States
  ▫   S. 913: Do-Not-Track Online Act of 2011
  ▫   S. 799: Commercial Privacy Bill of Rights Act of 2011
  ▫   H.R. 1528: Consumer Privacy Protection Act of 2011
  ▫   H.R. 654: Do Not Track Me Online Act
  ▫   H.R. 1895: Do Not Track Kids Act of 2011
  ▫   California: S.B. 761

Mais conteúdo relacionado

Mais de Brian Rowe

Privacy Culture
Privacy CulturePrivacy Culture
Privacy CultureBrian Rowe
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismBrian Rowe
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101Brian Rowe
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureBrian Rowe
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipenBrian Rowe
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy IgniteBrian Rowe
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentBrian Rowe
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Brian Rowe
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012Brian Rowe
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thBrian Rowe
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Brian Rowe
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Brian Rowe
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Privacy for Libraries
Privacy for LibrariesPrivacy for Libraries
Privacy for LibrariesBrian Rowe
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair useBrian Rowe
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 

Mais de Brian Rowe (20)

Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
Ecc 2013
Ecc 2013 Ecc 2013
Ecc 2013
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information Classism
 
WLA Lecture
WLA LectureWLA Lecture
WLA Lecture
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free Culture
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipen
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy Ignite
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managment
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9th
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
LSNTAP on RSS
LSNTAP on RSSLSNTAP on RSS
LSNTAP on RSS
 
Privacy for Libraries
Privacy for LibrariesPrivacy for Libraries
Privacy for Libraries
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair use
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Privacy law and policy

  • 1. Privacy Law and Policy Bryce Newell, J.D. Ph.D. student, UW iSchool Jan. 13, 2012
  • 2. eReader Privacy • Librarians Weigh Kindle Ebook Lending against Reader Privacy • EFF's take on CA's newly enacted E-Reader Privacy Law • Privacy Rights Re-―Kindled‖: eBook Reader Privacy
  • 4. Privacy: a Fundamental Right, or not? • Fundamental Right ▫ Europe ▫ Canada ▫ Australia ▫ New Zealand • Sectored Protection ▫ United States (except in some narrow constitutional areas)
  • 5. Types of Privacy Protections • Tort Privacy (common law / state law) • Informational Privacy (largely guided by statutory law – i.e. federal legislation) • Freedom from unreasonable search and seizure (4th Am.) • Free speech (1st Am.) • Fundamental decision (14th Am.)
  • 6. US Privacy Milestones • 1890 – right to privacy ▫ promoted in article by Warren and Brandeis (tort-based privacy) • 1928 -- ―the right to be let alone‖ ▫ (Brandeis dissent in Olmstead -- search and seizure) • 1958 – nexus of anonymity and speech ▫ (NAACP v. Alabama) (disclosure of member list) • 1960 – Prosser’s Torts ▫ based on Warren and Brandeis’s ideas • 1967 – ―reasonable expectation‖ ▫ (Katz v. US -- search and seizure) • 1977 – no ―zone of privacy‖ where data is protected and used within broad police powers of state ▫ (Whalen v. Roe -- disclosure of prescription data)
  • 7. Warren & Brandeis (1890) • ―…now that modern devices afford abundant opportunities for the perpetration of such wrongs without any participation by the injured party, the protection granted by the law must be placed upon a broader foundation."
  • 8. Warren & Brandeis • The ―right to be let alone‖ • Elements of privacy from: ▫ defamation law ▫ IP law ▫ Contract law ▫ Property ▫ Olmstead v. US (1928)
  • 9. Warren & Brandeis to Prosser • Dean Prosser’s four torts (1960): ▫ appropriating the plaintiff's identity for the defendant's benefit ▫ placing the plaintiff in a false light in the public eye ▫ publicly disclosing private facts about the plaintiff ▫ unreasonably intruding upon the seclusion or solitude of the plaintiff
  • 10. International Privacy Conventions • Article 8 of the European Convention on Human Rights ▫ ―Everyone has the right to respect for his private and family life, his home and his correspondence.‖ • Article 17 of the International Covenant on Civil and Political Rights (UN)
  • 11. Nissenbaum (2004): Cases • Public Records Online ▫ Concerns? The info is already public… • Consumer Profiling and Data Mining ▫ One view: targeted advertising is the most consumer friendly form of advertising ▫ Is the data really sensitive? • RFID Tags and Surveillance
  • 12. Surveillance • US v. Jones (US v. Maynard) • Toll roads, video cameras in public spaces, facial recognition (e.g. Google and PittPatt), GPS tracking…. • DC Police • PATRIOT Act ▫ Lessens requirements for obtaining Wiretap warrants ▫ Sneak and Peak Warrants
  • 13. Nissenbaum (2004): Principles Three principles that dominate public deliberation • 1) Protecting Privacy of Individuals Against Intrusive Government Agents • 2) Restricting Access to Intimate, Sensitive, or Confidential Information • 3) Curtailing Intrusions into Spaces or Spheres Deemed Private or Personal
  • 14. Nissenbaum: Contextual Integrity • Presiding norms of ▫ Appropriateness ▫ Distribution / Norms of information flow • Considers the context, nature of information in relation to context, the roles of those receiving the info, their relationships to info subjects, terms of sharing, and terms of further dissemination. • Is this practical? • Is it a better way to visualize/protect privacy?
  • 15. Nehf (2005) • FTC history – law/industry self-regulation • Market driven solutions led to widespread adoption of privacy policies • But policies don’t protect information, only disclose how it is being sold, used, etc • ―encouraging posting of privacy policies without regulating their content‖ = less info privacy for consumers ―than an efficient market would produce‖
  • 16. Nehf (2005) • ―Until privacy becomes a salient attribute influencing consumer choice, Web site operators will continue to take and share more personal information than consumers would choose to provide in a more transparent exchange.‖
  • 18. Facebook (2) • ―Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies… • ―The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. The practice breaks Facebook's rules, and renews questions about its ability to keep identifiable information about its users' activities secure.‖ - Wall Street Journal, Oct 18, 2010
  • 19. Facebook (3) • Who can see what? ▫ Public ▫ Friends ▫ Apps • Facebook settles with the FTC: http://www.nytimes.com/2011/11/30/tech nology/facebook-agrees-to-ftc-settlement-on- privacy.html
  • 20. Online Behavioral Advertising • ABC News Story [link] • For discussion of someof the recently proposed "Do Not Track" legislation in Congress look here, here, and here.
  • 21. Problems • ―…there is no single definition of what it means to be tracked, so expressing a preference does not guarantee users that they will be able to block all web sites and content that they may view as being associated with tracking behavior.‖ - From Microsoft.com • Industry self-regulation does not provide for any enforcement mechanism beyond current FTC powers (e.g. to prosecute for engaging in deceptive practices)
  • 22. What Do “They” Know? • The Open Data Partnership allows a glimpse into what information is being collected and by whom. ▫ http://www.evidon.com/partners/open_data_par tnership - contains list of 1021 companies that engage in online behavioral advertising, many of which also have multiple advertising products.
  • 23. Who Knows? * Ghostery results from NAI’s Opt-Out page.
  • 24. FTC Report • FTC report calls for ―browser based do-not-track mechanism‖ in December 2010 • Industry self-regulation ▫ Browsers build in do not track options ▫ Industry groups set up opt-out mechanisms (DAA, NAI) ▫ BUT self-regulation has no teeth (enforcement mechanism) and may only mean you don’t see targeted ads, not that you won’t be tracked. • FTC sues Chitika, reaches settlement
  • 26. Recent Legislation • Europe ▫ 2009 amendments to the EU ePrivacy Directive require member states to implement by May 25, 2011 • United States ▫ S. 913: Do-Not-Track Online Act of 2011 ▫ S. 799: Commercial Privacy Bill of Rights Act of 2011 ▫ H.R. 1528: Consumer Privacy Protection Act of 2011 ▫ H.R. 654: Do Not Track Me Online Act ▫ H.R. 1895: Do Not Track Kids Act of 2011 ▫ California: S.B. 761

Notas do Editor

  1. Do-Not-Track Online Act of 2011 – possible amendment to Kerry act belowPros:provisions would apply to mobile phone network operators as well as Websites and online advertising networksSupported by Consumers Union, the Electronic Frontier Foundation, Consumer Action, the Center for Digital Democracy and the American Civil Liberties Unionwould force companies to respect a consumer’s decision to opt out of data collectionsupports a mandatory browser-based “Do Not Track” mechanism would allow the Federal Trade Commission to define the rules within a year of the bill being signed into law.Cons:Blanket opt-out is not ideal for advertising companies, who would prefer selective opt outProhibits gathering info from minors, but how is this to be accomplished?Commercial Privacy Bill of Rights Act of 2011Pros:would require companies to informusers up-front what data was being collected and to provide a clear way to opt out of the collection. Cons:does not explicitly address “do not track”