Data Security 1011 A

Total Page:16

File Type:pdf, Size:1020Kb

Data Security 1011 A ASPEN CASEBOOK SERIES INFORMATION PRIVACY LAW Seventh Edition Daniel J. Solove John Marshall Harlan Research Professor of Law George Washington University Law School Paul M. Schwartz Jefferson E. Peyser Professor of Law U.C. Berkeley School of Law Faculty Director, Berkeley Center for Law & Technology Copyright © 2021 CCH Incorporated. All Rights Reserved. Published by Wolters Kluwer in New York. Wolters Kluwer Legal & Regulatory U.S. serves customers worldwide with CCH, Aspen Publishers, and Kluwer Law International products. (www.WKLegaledu.com) No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or utilized by any information storage or retrieval system, without written permission from the publisher. For information about permissions or to request permissions online, visit us at www.WKLegaledu.com, or a written request may be faxed to our permissions department at 212-771-0803. To contact Customer Service, e-mail [email protected], call 1-800-234-1660, fax 1-800-901-9075, or mail correspondence to: Wolters Kluwer Attn: Order Department PO Box 990 Frederick, MD 21705 Printed in the United States of America. 1 2 3 4 5 6 7 8 9 0 ISBN 978-1-5438-1372-2 Library of Congress Cataloging-in-Publication Data Names: Solove, Daniel J., 1972- author. | Schwartz, Paul M., 1959- author. Title: Information privacy law / Daniel J. Solove, John Marshall Harlan Research Professor of Law, George Washington University Law School; Paul M. Schwartz, Jefferson E. Peyser Professor of Law, U.C. Berkeley School of Law, Faculty Director, Berkeley Center for Law & Technology. Description: Seventh edition. | New York : Wolters Kluwer, [2021] | Series: Aspen casebook series | Includes bibliographical references and index. | Summary: "Cases, exposition, and materials for the law school course on information privacy law or information and technology"-- Provided by publisher. Identifiers: LCCN 2020044521 | ISBN 9781543813722 (hardcover) | ISBN 9781543827262 (ebook) Subjects: LCSH: Privacy, Right of--United States. | Data protection--Law and legislation--United States. | Confidential communications--United States. | Personality (Law)--United States. | LCGFT: Casebooks (Law) Classification: LCC KF1262 .S66 2021 | DDC 342.7308/58--dc23 LC record available at https://lccn.loc.gov/2020044521 SUMMARY OF CONTENTS Contents xiii Preface xxvii Acknowledgments xxix 1 INTRODUCTION 1 A. Information Privacy, Technology, and the Law 1 B. Information Privacy Law: Origins and Types 10 2 PERSPECTIVES ON PRIVACY 41 A. The Philosophical Discourse about Privacy 41 B. The Definition and the Value of Privacy 43 C. Critics of Privacy 60 D. The Feminist Perspective on Privacy 68 E. The Civil Rights Perspective on Privacy 77 F. Privacy, Poverty, and Social Class 83 3 PRIVACY AND THE MEDIA 87 A. Information Gathering 89 B. Disclosure of Truthful Information 114 C. Dissemination of False Information 183 D. Appropriation of Name or Likeness 220 E. Privacy Protections for Anonymity and Receipt of Ideas 248 4 PRIVACY AND LAW ENFORCEMENT 267 A. The Fourth Amendment and Emerging Technology 270 B. Information Gathering About First Amendment Activities 361 C. Federal Electronic Surveillance Law 374 D. Digital Searches and Seizures 389 5 NATIONAL SECURITY AND FOREIGN INTELLIGENCE 437 A. The Intelligence Community 438 B. The Fourth Amendment Framework 439 ix x SUMMARY OF CONTENTS C. Foreign Intelligence Gathering 447 D. NSA Surveillance 473 6 HEALTH PRIVACY 497 A. Confidentiality of Medical Information 499 B. Constitutional Protection of Medical Information 564 C. Genetic Information 603 7 GOVERNMENT RECORDS 623 A. Public Access to Government Records 624 B. Government Records and Use of Personal Data 683 C. Identification Records and Requirements 740 8 FINANCIAL DATA 755 A. The Fair Credit Reporting Act 755 B. The Gramm-Leach-Bliley Act 792 C. Federal and State Financial Privacy Laws 796 9 CONSUMER DATA 809 A. The U.S. System of Consumer Data Privacy Regulation 810 B. Tort Law 843 C. Contract Law 852 D. Property Law 865 E. FTC Section 5 Enforcement 868 F. Statutory Regulation 907 G. State Statutory Regulation 970 H. First Amendment Limitations on Privacy Regulation 977 10 DATA SECURITY 1011 A. Introduction 1011 B. Data Security Breach Notification Statutes 1013 C. Civil Liability and Standing 1018 D. FTC Regulation 1043 11 EDUCATION PRIVACY 1065 A. School Searches and Surveillance 1065 B. Drug Testing 1071 C. School Records 1081 12 EMPLOYMENT PRIVACY 1091 A. Workplace Searches 1094 B. Workplace Surveillance 1102 C. Workplace Drug Testing 1105 D. The Issue of Consent 1117 E. Testing, Questionnaires, and Polygraphs 1123 F. Telephone Monitoring 1137 SUMMARY OF CONTENTS xi G. Computer Monitoring and Searches 1144 13 EU AND INTERNATIONAL PRIVACY LAW 1169 A. The OECD Privacy Guidelines 1172 B. Privacy Protection in Europe 1176 C. International Transfers of Data 1259 D. Privacy Protection Worldwide 1295 Index 1307 CONTENTS Preface xxvii Acknowledgments xxix 1 INTRODUCTION 1 A. INFORMATION PRIVACY, TECHNOLOGY, AND THE LAW 1 • Sidis v. F-R Publishing Corp. 3 B. INFORMATION PRIVACY LAW: ORIGINS AND TYPES 10 1. Common Law 10 (a) The Warren and Brandeis Article 10 • Samuel D. Warren and Louis D. Brandeis, The Right to Privacy 13 (b) The Recognition of Warren and Brandeis’s Privacy Torts 26 • William Prosser, Privacy 27 • Lake v. Wal-Mart Stores, Inc. 29 (c) Privacy Protection in Tort Law 32 (d) Privacy Protection in Evidence Law 33 (e) Privacy Protection via Property Rights 33 (f) Privacy Protection in Contract Law 34 (g) Privacy Protection in Criminal Law 34 2. Constitutional Law 34 3. Statutory Law 36 4. International Law 40 2 PERSPECTIVES ON PRIVACY 41 A. THE PHILOSOPHICAL DISCOURSE ABOUT PRIVACY 41 1. The Concept of Privacy and the Right to Privacy 41 2. The Public and Private Spheres 42 xiii xiv CONTENTS B. THE DEFINITION AND THE VALUE OF PRIVACY 43 • Daniel J. Solove, Conceptualizing Privacy 44 • Julie E. Cohen, Examined Lives: Informational Privacy and the Subject as Object 50 • Anita L. Allen, Coercing Privacy 53 • Paul M. Schwartz, Privacy and Democracy in Cyberspace 55 • Spiros Simitis, Reviewing Privacy in an Information Society 57 C. CRITICS OF PRIVACY 60 • Richard A. Posner, The Right of Privacy 60 • Fred H. Cate, Principles of Internet Privacy 65 D. THE FEMINIST PERSPECTIVE ON PRIVACY 68 • State v. Rhodes 68 • Reva B. Siegel, “The Rule of Love”: Wife Beating as Prerogative and Privacy 70 • Danielle Keats Citron, Sexual Privacy 74 E. THE CIVIL RIGHTS PERSPECTIVE ON PRIVACY 77 • Alvaro M. Bedoya, Privacy as Civil Right 77 F. PRIVACY, POVERTY, AND SOCIAL CLASS 83 • Khiara M. Bridges, Privacy Rights and Public Families 83 3 PRIVACY AND THE MEDIA 87 A. INFORMATION GATHERING 89 1. Intrusion upon Seclusion 89 • Restatement (Second) of Torts § 652B: Intrusion upon Seclusion 89 • Nader v. General Motors Corp. 90 • Dietemann v. Time, Inc. 95 • Desnick v. American Broadcasting Co., Inc. 97 • Shulman v. Group W Productions, Inc. 102 2. Paparazzi 106 • Galella v. Onassis 107 • California Anti-Paparazzi Act 108 3. Video Voyeurism 111 • Video Voyeurism Prevention Act 112 B. DISCLOSURE OF TRUTHFUL INFORMATION 114 1. Public Disclosure of Private Facts 114 (a) Introduction 114 • Restatement (Second) of Torts § 652D: Publicity Given to Private Life 114 SUMMARY OF CONTENTS xv (b) Private Matters 116 • Gill v. Hearst Publishing Co. 116 • Daily Times Democrat v. Graham 121 (c) The Newsworthiness Test 128 • Sipple v. Chronicle Publishing Co. 128 • Shulman v. Group W Productions, Inc. 139 • Bonome v. Kaysen 142 2. First Amendment Limitations 148 • Cox Broadcasting Corp. v. Cohn 150 • The Florida Star v. B.J.F. 158 • Bartnicki v. Vopper 173 C. DISSEMINATION OF FALSE INFORMATION 183 1. Defamation 183 (a) Introduction 183 (b) Defamation and the Internet 185 • Zeran v. America Online, Inc. 186 (c) First Amendment Limitations 195 • New York Times Co. v. Sullivan 195 • Gertz v. Robert Welch, Inc. 198 2. False Light 206 (a) Introduction 206 • Restatement (Second) of Torts § 652E: Publicity Placing Person in False Light 206 (b) First Amendment Limitations 209 • Time, Inc. v. Hill 209 3. Infliction of Emotional Distress 213 • Hustler Magazine v. Falwell 213 • Snyder v. Phelps 216 D. APPROPRIATION OF NAME OR LIKENESS 220 1. Introduction 220 • Restatement (Second) of Torts § 652C: Appropriation of Name or Likeness 220 2. Name or Likeness 223 • Carson v. Here’s Johnny Portable Toilets, Inc. 223 3. For One’s Own Use or Benefit 231 • Raymen v. United Senior Association, Inc. 231 4. Connection to Matters of Public Interest 235 • Finger v. Omni Publications International, Ltd. 236 5. First Amendment Limitations 240 • Zacchini v. Scripps-Howard Broadcasting Co. 240 xvi CONTENTS • De Havilland v. FX Networks, LLC 242 E. PRIVACY PROTECTIONS FOR ANONYMITY AND RECEIPT OF IDEAS 248 1. Anonymity 248 (a) Anonymous Speech 249 • Talley v. State of California 249 • McIntyre v. Ohio Elections Commission 250 • Doe v. Cahill 254 (b) Reporter’s Privilege 260 2. Privacy of Reading and Intellectual Exploration 262 • Stanley v. Georgia 262 4 PRIVACY AND LAW ENFORCEMENT 267 A. THE FOURTH AMENDMENT AND EMERGING TECHNOLOGY 270 1. How the Fourth Amendment Works 270 (a) Applicability: Searches and Seizures 270 (b) Reasonable Searches and Seizures 271 (c) Enforcement: The Exclusionary Rule and Civil Remedies 273 (d) Subpoenas and Court Orders 274 2. Wiretapping, Bugging, and Beyond 277 • Olmstead v. United States 278 • Lopez v. United States 286 • Katz v. United States 288 • United States v. White 295 3. The Reasonable Expectation of Privacy Test 299 (a) The Third Party Doctrine 299 • Smith v. Maryland 299 (b) Items Abandoned or Exposed to the Public 310 • California v. Greenwood 310 (c) Surveillance and the Use of Sense Enhancement Technologies 317 • Florida v. Riley 317 • Dow Chemical Co. v. United States 325 • Kyllo v. United States 328 • United States v. Jones 336 • Carpenter v. United States 346 B. INFORMATION GATHERING ABOUT FIRST AMENDMENT ACTIVITIES 361 • Stanford v.
Recommended publications
  • Reconciling Data Privacy and the First Amendment
    RECONCILING DATA PRIVACY AND THE FIRST AMENDMENT Neil M. Richards This Article challenges the First Amendment critique of data privacy regulaion- the claim that data privacy rules restrict the dissemination of truthful information and thus violate the FirstAmendment. The critique, which is ascendant in privacy discourse, warps legislative and judicial processes and threatens the consti- tutionalization of information policy. The First Amendment critique should be rejected for three reasons. First, it mistakenly equates privacy regulation with speech regulation. Building on scholarship examining the boundaries of First Amendment protection, this Article suggests that "speech restrictions" in a wide variety of commercial contexts have never triggered heightened First Amendment scru- tiny, refuting the claim that all information flow regulations fall within the First Amendment. Second, the critique inaccurately describes current First Amendment doctrine. To demonstrate this point, this Article divides regulations of information flows into four analytic categories and demonstrates how, in each category, ordinary doctrinal tools can be used to uphold the constitutionality of consumer privacy rules. Third, the critique is normatively unpersuasive. Relying on recent intellectual histories of American constitutional law, this Article argues that fundamental jurisprudentialreasons counsel against acceptance of the First Amendment critique. From the perspective of privacy law, there are striking parallels between the critique's advocacy of "freedom of information" and the discredited "freedom of contract" regime of Lochner. More importantly, from the perspective of First Amendment law, the critique threatens to obliterate the distinction between economic and political rights at the core of post-New Deal constitutionalism. Rejecting the FirstAmendment critique thus has real advantages.
    [Show full text]
  • Law, Technology, and Public Health in the COVID-19 Crisis
    Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M.
    [Show full text]
  • Privacy As Privilege: the Stored Communications Act and Internet Evidence Contents
    PRIVACY AS PRIVILEGE: THE STORED COMMUNICATIONS ACT AND INTERNET EVIDENCE Rebecca Wexler CONTENTS INTRODUCTION .......................................................................................................................... 2723 I. THE INTERNET AND THE TELEGRAPH ....................................................................... 2730 A. The Puzzle ........................................................................................................................ 2731 B. The Stored Communications Act .................................................................................. 2735 C. Telegraph Privacy Statutes ............................................................................................. 2741 II. PRIVACY AS PRIVILEGE .................................................................................................... 2745 A. Statutory Privileges ........................................................................................................ 2745 1. Defining Statutory Privileges ................................................................................... 2745 2. Common Features of Privileges ............................................................................... 2748 3. Confidentiality Without Privilege ........................................................................... 2750 4. The Current Stored Communications Act Privilege ............................................. 2753 B. The Rules that Govern Statutory Privilege Construction .........................................
    [Show full text]
  • Anonymity, Faceprints, and the Constitution Kimberly L
    University of Baltimore Law ScholarWorks@University of Baltimore School of Law All Faculty Scholarship Faculty Scholarship Winter 2014 Anonymity, Faceprints, and the Constitution Kimberly L. Wehle University of Baltimore School of Law, [email protected] Follow this and additional works at: http://scholarworks.law.ubalt.edu/all_fac Part of the Constitutional Law Commons, Fourth Amendment Commons, and the Privacy Law Commons Recommended Citation Anonymity, Faceprints, and the Constitution, 21 Geo. Mason L. Rev. 409 (2014) This Article is brought to you for free and open access by the Faculty Scholarship at ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. 2014] 409 ANONYMITY, FACEPRINTS, AND THE CONSTITUTION Kimberly N. Brown' INTRODUCTION Rapid technological advancement has dramatically expanded the war­ rantless powers of government to obtain information about individual citi­ zens directly from the private domain. Biometrics technology I-such as voice recognition, hand measurement, iris and retinal imaging, and facial recognition technology ("FRT")-offers enormous potential for law en­ forcement and national security. But it comes at a cost. Although much of the American public is complacent with government monitoring for securi­ ty reasons,2 people also expect to go about daily life in relative obscurity­ unidentifiable to others they do not already know, do not care to know, or are not required to know-so long as they abide by the law. The reality is quite different. The government and the private sector have the capacity for surveillance of nearly everyone in America.
    [Show full text]
  • Anonymity, Obscurity, and Technology: Reconsidering Privacy in the Age of Biometrics
    ANONYMITY, OBSCURITY, AND TECHNOLOGY: RECONSIDERING PRIVACY IN THE AGE OF BIOMETRICS JONATHAN TURLEY ABSTRACT For decades, cinematic and literary works have explored worlds without privacy: fishbowl societies with continual, omnipresent surveillance. For those worried about a post-privacy world, facial recognition technology and other biometric technology could well be the expanding portal to that dystopia. These technologies are rapidly transforming a society predicated on privacy into a diaphanous society where identity and transparency are defining elements. Biometric technology is perfectly suited to evade current privacy protections and doctrines because it presents new challenges to the existing legal framework protecting privacy. The greatest threat of this technological shift is to democratic activities—the very reason that countries such as China have invested so heavily into biometric surveillance systems. This Article explores how our traditional privacy notions fit into a new age of biometrics. It seeks to frame the debate on what values society’s notions of privacy protect, and how to protect them. After exploring prior approaches and definitions to privacy, it proposes a shift from an emphasis on anonymity to a focus on obscurity. The truth is that we now live in a “nonymous” world where our movements and associations will be made increasingly transparent. This Article concludes by recommending a comprehensive approach to biometric technology that would obscure increasingly available images and data while recasting privacy protections to fit a new and unfolding biometric reality. This obscurity will allow participation in society to continue unimpeded by the chilling effects created by the new technology. Without it, our democratic society will never be the same.
    [Show full text]
  • Fighting Cybercrime After United States V. Jones David Gray
    Journal of Criminal Law and Criminology Volume 103 | Issue 3 Article 4 Summer 2013 Fighting Cybercrime After United States v. Jones David Gray Danielle Keats Citron Liz Clark Rinehart Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons Recommended Citation David Gray, Danielle Keats Citron, and Liz Clark Rinehart, Fighting Cybercrime After United States v. Jones, 103 J. Crim. L. & Criminology 745 (2013). https://scholarlycommons.law.northwestern.edu/jclc/vol103/iss3/4 This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/13/10303-0745 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 103, No. 3 Copyright © 2013 by David Gray, Danielle Keats Citron & Liz Clark Rinehart Printed in U.S.A. FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES DAVID GRAY,* DANIELLE KEATS CITRON** & LIZ CLARK RINEHART*** In a landmark nondecision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible.
    [Show full text]
  • Paul M. Schwartz
    PAUL M. SCHWARTZ Jefferson E. Peyerser Professor of Law U.C. Berkeley School of Law email: Boalt Hall # 7200 [email protected] Berkeley, California 94720-7200 Website: www.paulschwartz.net EDUCATION: Yale Law School, J.D., June 1985 Yale Law Journal, Volume 94, Senior Editor Brown University, B.A. 1981, magna cum laude Honors in history and English, Phi Beta Kappa PUBLICATIONS BOOKS: PRIVACY LAW FUNDAMENTALS 2015 (IAPP, 2015) (Daniel J. Solove, co- author) PRIVACY LAW FUNDAMENTALS 2013 (IAPP, 2013) (Daniel J. Solove, co- author) PRIVACY LAW FUNDAMENTALS (IAPP, 2011) (Daniel J. Solove, co- author) INFORMATION PRIVACY LAW (ASPEN PUBLISHERS, 5th ed., 2014) (Daniel J. Solove, co-author) CONSUMER PRIVACY & DATA PROTECTION (ASPEN PUBLISHERS, 1st ed., 2015)(Daniel J. Solove, co-author). Abridged, paperback version of INFORMATION PRIVACY LAW. PRIVACY, LAW ENFORCEMENT & NATIONAL SECURITY (ASPEN PUBLISHERS, 1st ed., 2015)(Daniel J. Solove, co-author). Abridged, paperback version of INFORMATION PRIVACY LAW. PRIVACY AND THE MEDIA AND PRIVACY LAW (ASPEN PUBLISHERS, 2d Paul M. Schwartz Page 2 ed., 2015)(Daniel J. Solove, co-author). Abridged, paperback version of INFORMATION PRIVACY LAW. PRIVACY, INFORMATION, AND TECHNOLOGY (ASPEN PUBLISHERS, 3d ed., 2011)(Daniel J. Solove, co-author). Abridged, paperback version of INFORMATION PRIVACY LAW. INFORMATION PRIVACY STATUTES AND REGULATIONS, 2010-2011 (ASPEN PUBLISHERS, 2008) (Daniel J. Solove, co-editor) ON-LINE SERVICES, DATA PROTECTION LAW AND PRIVACY: REGULATORY RESPONSES (Official Pub.of the European Union, Brussels, 1998)(Joel R. Reidenberg, co-author). Study carried out for the Commission of the European Communities (DGXV) regarding on- line privacy in Belgium, France, Germany, and the United Kingdom.
    [Show full text]
  • The Pii Problem: Privacy and a New Concept of Personally Identifiable Information
    \\jciprod01\productn\N\NYU\86-6\NYU603.txt unknown Seq: 1 28-NOV-11 15:01 THE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION PAUL M. SCHWARTZ† & DANIEL J. SOLOVE‡ Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved. The basic assumption behind the applicable laws is that if PII is not involved, then there can be no privacy harm. At the same time, there is no uniform definition of PII in information privacy law. Moreover, computer science has shown that in many circumstances non-PII can be linked to individuals, and that de-identified data can be re-identified. PII and non-PII are thus not immutable categories, and there is a risk that information deemed non-PII at one time can be transformed into PII at a later juncture. Due to the malleable nature of what consti- tutes PII, some commentators have even suggested that PII be abandoned as the mechanism by which to define the boundaries of privacy law. In this Article, we argue that although the current approaches to PII are flawed, the concept of PII should not be abandoned. We develop a new approach called “PII 2.0,” which accounts for PII’s malleability. Based upon a standard rather than a rule, PII 2.0 utilizes a continuum of risk of identification. PII 2.0 regulates informa- tion that relates to either an “identified” or “identifiable” individual, and it estab- lishes different requirements for each category.
    [Show full text]
  • Justin Brookman
    3/25/2019 Senate Commerce testimony 3.26.19 - Google Docs Statement of J ustin Brookman Director, Privacy and Technology Policy Consumer Reports Before the Senate Subcommittee on Manufacturing, Trade, and Consumer Protection on Small Business Perspectives on a Federal Data Privacy Framework March 26, 2019 On behalf of Consumer Reports, I want to sincerely thank you for the opportunity to testify here today. We appreciate the leadership of Chairman Moran and Ranking Member Blumenthal not only for holding this important hearing, but also for working in a constructive, bipartisan fashion to develop smart and effective comprehensive privacy legislation for American consumers. Consumer Reports is an independent, nonprofit organization that works side by side with consumers to create a fairer, safer, and healthier world. Consumer Reports has more than 6 million members and has been protecting consumers since 1936. We evaluate approximately 2,800 products and services each year, including testing for privacy and information security. Comprehensive Privacy Legislation is Long Overdue in the United States As an initial matter, it is important to keep in mind the fundamental reason we are debating this issue: the United States lacks any sort of comprehensive framework to protect personal privacy. The Federal Trade Commission has brought a number of important privacy and security cases over the past twenty years under its general purpose consumer protection authority, but its legal authority and resources are extremely limited. The considerable majority of its privacy cases have been under its d eception authority, meaning the company had to affirmatively mislead consumers about their privacy practices. As a result, privacy policies tend to be extremely expansive and vague, providing very little in the way of meaningful information.
    [Show full text]
  • Understanding the Data Privacy Divide Between the European Union and the United States
    FACULTY OF LAW LUND UNIVERSITY MAXIMIN ORSERO UNDERSTANDING THE DATA PRIVACY DIVIDE BETWEEN THE EUROPEAN UNION AND THE UNITED STATES SUPERVISOR: XAVIER GROUSSOT JAEM03 MASTER THESIS 30 HIGHER EDUCATION CREDITS EUROPEAN BUSINESS LAW TERM: SPRING 2019 ABSTRACT This Thesis seeks to give its reader the tools to understand the data privacy divide between the EU and the US. It explains the crucial notions, historical and jurisprudential factors and regulatory frameworks underlying and constituting it. First, it answers why regulating data privacy is paramount to our democratic societies on both sides of the Atlantic. The growing importance of the data driven economy, whose raw material is our personal data, creates challenges to basic democratic values, for example privacy and the freedom of speech. This Thesis explores the darker side of the digital economy, sometimes referred to as a form of surveillance capitalism. It describes how the advertisement-based business model of some of the most successful internet companies may, if left unregulated, render citizens vulnerable to enhanced forms of influence and manipulation, and weaken essential counter-powers such as dissidents, whistle-blowers and the press. Second, it answers how the EU and US approaches to regulating data privacy differ. In essence, different historical roots and economic incentives on both sides of the Atlantic explain the difference. The EU has had a painful experience with government surveillance and invasions of privacy, in particular in the former German Democratic Republic. On the contrary, the US does not have such history and its economy has enormously benefited from lax data privacy regulations, allowing it to grow internet giants.
    [Show full text]
  • Who Should Be Liable for Online Anonymous Defamtion
    Perry and Zarsky: Who Should Be Liable for Online Anonymous Defamtion Who Should Be Liable for Online Anonymous Defamation? Ronen Perryt and Tal Z. Zarskytt INTRODUCTION The advent of Web 2.0 technologies and applications has en- abled average people-who were previously mere consumers of online content-to publish their own content on various websites, such as blogs, consumer-evaluation platforms (such as Amazon, eflay, and TripAdvisor), news websites (through reader com- ments), social networking services (such as Facebook, Twitter, and Linkedln), media-sharing websites (such as Instagram and YouTube), and collaborative-writing projects (such as Wikipedia). Some of these user contributions may be defamatory, and one of the most complex and intriguing legal questions in this context is: Who should be liable for defamatory statements made online by anonymous (or pseudonymous) users? This Essay critically eval- uates the answers given in various Western jurisdictions and ar- gues that economic analysis supports a revolutionary liability re- gime, which we call "residual indirect liability."1 Our main theoretical contribution lies in recognizing that the legal response to online anonymous defamation should be viewed and analyzed as a combination of two components. The first is the ability (or inability) to bring an action against the content pro- vider-the platform that enables the defamatory statement. Such an action may require modification of substantive law-the recog- nition of some sort of indirect liability.2 The second component is the ability (or inability) to bring an action against the speaker- the anonymous user. Such an action does not require modification t Academic Visitor, Faculty of Law and Centre for Socio-Legal Studies, University of Oxford; Professor of Law and Director of the Aptowitzer Center for Risk, Liability, and Insurance, University of Haifa.
    [Show full text]
  • Reconciling Personal Information in the United States and European Union
    GW Law Faculty Publications & Other Works Faculty Scholarship 2013 Reconciling Personal Information in the United States and European Union Daniel J. Solove George Washington University Law School, [email protected] Paul M. Schwartz Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Solove, Daniel J. and Schwartz, Paul M., "Reconciling Personal Information in the United States and European Union" (2013). GW Law Faculty Publications & Other Works. 956. https://scholarship.law.gwu.edu/faculty_publications/956 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. RECONCILING PERSONAL INFORMATION IN THE UNITED STATES AND EUROPEAN UNION By Paul M. Schwartz* Daniel J. Solove** May 3, 2013 EXECUTIVE SUMMARY ......................................................................................................... 3 I. INTRODUCTION ................................................................................................................... 5 II. DEFINING PII ON BOTH SIDES OF THE ATLANTIC ................................................. 6 A. THE EU: FROM THE DIRECTIVE TO THE PROPOSED REGULATION ....................................... 7 1. The EU Data Protection Directive ...............................................................................
    [Show full text]