1 Protecting Privacy, the Social Contract

Total Page:16

File Type:pdf, Size:1020Kb

1 Protecting Privacy, the Social Contract Protecting privacy, the social contract, and the rule of law in the Virtual World Matthew Sundquist∗ Introduction and Framework Explanation I. Valuing Privacy and Determining When to Respond II. Compounding Privacy Problems: Rational Choice Theory and Technological Growth III. Legal Guidance for Privacy A. Precedents B. Statutory Guidance C. Analysis D. Looking Ahead IV. Case Study of FTC Enforcement A. Solution: Enhanced Enforcement B. Coalition Solutions C. Lessons from the Collaboration against SOPA D. Conclusion A host of laws and regulations engage with the legal,1 technological,2 and social3 meanings4 of privacy. In a country of more than 300 million people and plentiful law enforcement officers, there is ∗ Matthew Sundquist is a graduate of Harvard College. He is the Privacy Manager at Inflection, and a Student Fellow of the Harvard Law School Program on the Legal Profession. This paper represents the opinion of the author. It is not meant to represent the position or opinions of Inflection. For their thoughtful advice and suggestions, I am grateful to Allison Anoll, Beth Givens, Bob Gellman, Bruce Peabody, Christopher Wolf, Erik Jones, Jacqueline Vanacek, James Grimmelmann, and Orin Kerr. For their support in writing this paper and friendship, I am grateful to Brian and Matthew Monahan. 1 The term legal has different definitions in relation to privacy. • For a discussion of privacy as a principle in law, see Julie M. Carpenter & Robin Meriweather, Brief Amicus Curiae of the DKT Liberty Project in support of Petitioner, Kyllo v. United States, 533 U.S. 27 (2000); Ken Gormely, One Hundred Years of Privacy 4 Wisconsin Law Review 1335 (1992); Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, 4 Harvard L. R. 193 (1890) (describing privacy as the “right to be let alone.”). • Privacy is also covered by statutory law. See e.g., HIPAA (Health Insurance Portability and Accountability Act); Sarbanes–Oxley Act; Gramm–Leach–Bliley Act; Payment Card Industry Data Security Standard (PCI DSS); Fair and Accurate Credit Transaction Act (FACTA), including Red Flags Rule; Electronic Fund Transfer Act, Regulation E (EFTA); Stored Communications Act; Federal disclosure laws; e–discovery provisions in the Federal Rules of Civil Procedures; Free and Secure Trade Program (FAST); Fair Crediting Reporting Act (FCRA); Right to Financial Privacy Act; Family Education Rights and Privacy Act; Customer Proprietary Network Information rules; Children’s Online Privacy Protection Act; Cable Act; Video Privacy Protection Act; Driver’s Privacy Protection Act ; Title 39 of the Codes of Federal Regulation which deals with the USPS; Section 5 of the Federal Trade Commission Act. This does not include state laws. 1 likely to be abusive behavior. As a result, we are awash in claims about the definition, function, and value of privacy, we are awash in potential threats to privacy, and, increasingly, we are awash in debates about how to fashion remedies to address these issues. To survey the entire landscape of privacy dilemmas or threats, or assume that I could extract a representative sample of privacy policies or dilemmas is impossible. This paper does not attempt to provide a systematic theoretical account of privacy and technology, nor does it outline a typology of circumstances in which privacy might be threatened or abused by private or public entities. My paper advances a general framework for when a legal or social response to a privacy threat is appropriate.. The emergent areas I survey demonstrate the utility and application of my approach. This paper is in four sections. I begin by introducing a framework for prioritizing when a virtual or online practice, law, or regulatory deficiency warrants a legal or social response. First, a practice or law that violates the law should be prosecuted. Second, where privacy laws are ineffectually enforced we should be on heightened alert. Third, we need a response when a practice violates a valued social expectations of how information should flow.5 The first two conditions are important as updating and enforcing our laws in light of technological change is crucial to the maintenance of the social contract. The third condition is important as many of our expectations about information and privacy developed when tracking at the scale the government and businesses do so was impossible. Now, Google and Facebook have hundreds of millions of users. Around 1,271 government organizations and 1,931 private • The Supreme Court has repeatedly set precedents on privacy. See e.g., Ex parte Jackson, 96 U.S. 727 (1878); Meyer v. Nebraska, 262 U.S. 390 (1923); Olmstead v. United States, 277 U.S. 438 (1928); Griswold v. Connecticut, 381 U.S. 479 (1965); Katz v. United States, 389 U.S. 347 (1967); Stanley v. Georgia, 394 U.S. 557 (1969); Kelley v. Johnson, 425 U.S. 238 (1976); Moore v. City of East Cleveland, 431 U.S. 494 (1977); Lawrence v. Texas, 539 U.S. 558 (2003). See generally Laura K. Donohue, Anglo- American Privacy and Surveillance, 96 J. Crim. L. & Criminology 1059 (2006); William Knox, Some Thoughts on the Scope of the Fourth Amendment and Standing to Challenge Searches and Seizures, 40 Mo. L. Rev. 1 (1975). 2 Technology has created intriguing privacy problems. See e.g., Horst Feistel, Cryptography and Computer Privacy, 228 SCIENT. AM. 15 (1973) (exploring enciphering and origin authentication as a means of protecting systems and personal data banks); Rakesh Agrawal & Ramakrishnan Srikant, Privacy-Preserving Data Mining, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (attempting to “develop accurate models without access to precise information in individual data records”); Latanya Sweeney, k-Anonymity: A Model for Protecting Privacy, 10 Intern. J. on Uncertainty, Fuzziness and Knowledge-based Systems 557 (2002) (explaining means for anonymzing data to protect privacy). 3 Scholars have often advocated balanced frameworks for interpreting and protecting privacy. See Helen Nissenbaum, A Contextual Approach to Privacy Online 140 Daedalus 32, 33 (2011) (arguing that our experiences and social surroundings formulate our expectations for information use and privacy); JOHN PALFREY & URS GASSER, BORN DIGITAL, 7 (2008) (arguing that the younger generation of technology users, due to their frequent and early adoption of technology, has different conceptions of privacy than their parents or grandparents); see generally ALAN WESTIN, PRIVACY AND FREEDOM (1967) (arguing that privacy is comprised of intimacy, anonymity, solitude, and reserve); JUDITH DECREW, IN PURSUIT OF PRIVACY: LAW, ETHICS, AND THE RISE OF TECHNOLOGY (1997) (arguing that privacy entails informational privacy, accessibility privacy, and expressive privacy); Jeremy Kang, Information Privacy in Cyberspace Transactions 50 Stan. L. R. 1193 (1997) (arguing for privacy in our physical space, choice, and flows of information). 4 I examine privacy of the personal information we create directly by communicating and completing forms, contracts, and documents as well as the information we create indirectly by using browsers, carrying phones with geo-tracking, and purchasing or using products and services. I focus on the assurances we receive about this information and whether they are complied with. See generally Office of Management and Budget Memorandum, Safeguarding Against and Responding to the Breach of Personally Identifiable Information (May 2007) (defining personally identifiably information and when and how to protect the information). 5 See generally Nissenbaum, supra note. 2 companies work on counterterrorism, homeland security and intelligence in the U.S.6 Information often flows based on what is technologically possible rather than based on norms or laws.7 In the second section, I examine how technology has allowed more information about people to be gathered and stored online.8 The 92% of online adults using search engines daily, 92% using email daily, and 60% of adults doing both on a typical day leave a large digital trail.9 Businesses and government can quickly create and begin to rely on a new practice, leading to claims they could not function without that practice.10 Technology has, as Amazon founder Jeff Bazos explained, begun “eliminating all the gatekeepers” for companies and technical practices.11 Technology has enabled the U.S. government to discover and learn more about Americans and citizens abroad.12 The NSA can intercept and download electronic communications equivalent to the contents of the Library of Congress every six hours.13 Government analysts annually produce 50,000 intelligence reports.14 While economic theory suggests a rational capacity to process the stream of privacy threats and trade-offs we face, people simply cannot process everything about privacy or make rational privacy decisions.15 As a result of all these factors, regulatory inaction or a lack of regulations allows more activity—and potentially invasions of our privacy—to happen faster, at a larger scale. Even as courts and Congress have addressed some questions involving the relationship between evolving technology and privacy, including Constitutional questions, they have avoided others. The 6 See Dana Priest & William Arkin, A hidden world, growing beyond control, WASH. POST, available at projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/. 7 Ibid, at 34. 8 See generally Sweeney, supra note, at 557, (“Society is experiencing exponential growth in the number and variety of data
Recommended publications
  • Most Contagious 2011
    MOST CONTAGIOUS 2011 Cover image: Take This LoLLipop / Jason Zada most contagious / p.02 / mosT ConTAGIOUS 2011 / subsCripTion oFFer / 20% disCounT FuTure-prooFing your brain VALid unTiL 9Th JANUARY 2012 offering a saving of £200 gBP chapters / Contagious exists to find and filter the most innovative 01 / exercises in branding, technology, and popular culture, and movemenTs deliver this collective wisdom to our beloved subscribers. 02 / Once a year, we round up the highlights, identify what’s important proJeCTs and why, and push it out to the world, for free. 03 / serviCe Welcome to Most Contagious 2011, the only retrospective you’ll ever need. 04 / soCiaL It’s been an extraordinary year; economies in turmoil, empires 05 / torn down, dizzying technological progress, the evolution of idenTiTy brands into venture capitalists, the evolution of a generation of young people into entrepreneurs… 06 / TeChnoLogy It’s also been a bumper year for the Contagious crew. Our 07 / Insider consultancy division is now bringing insight and inspiration daTa to clients from Kraft to Nike, and Google to BBC Worldwide. We 08 / were thrilled with the success of our first Now / Next / Why event augmenTed in London in December, and are bringing the show to New York 09 / on February 22nd. Grab your ticket here. money We’ve added more people to our offices in London and New 10 / York, launched an office in India, and in 2012 have our sights haCk Culture firmly set on Brazil. Latin America, we’re on our way. Get ready! 11 / musiC 2.0 We would also like to take this opportunity to thank our friends, supporters and especially our valued subscribers, all over the 12 / world.
    [Show full text]
  • Protecting Privacy, the Social Contract, and the Rule of Law in the Virtual World
    ONLINE PRIVACY PROTECTION: PROTECTING PRIVACY, THE SOCIAL CONTRACT, AND THE RULE OF LAW IN THE VIRTUAL WORLD Matthew Sundquist TABLE OF CONTENTS INTRODUCTION ........................................................................................... 153 I. VALUING PRIVACY AND DETERMINING WHEN TO RESPOND .................. 157 II. COMPOUNDING PRIVACY PROBLEMS: RATIONAL CHOICE THEORY AND TECHNOLOGICAL GROWTH................................................................. 161 III. LEGAL AND JUDICIAL PRIVACY GUIDANCE .......................................... 163 A. Precedents..................................................................................... 163 B. Statutory Guidance ...................................................................... 166 C. Analysis ........................................................................................ 169 D. Looking Ahead ............................................................................. 171 IV. CASE STUDY OF FTC ENFORCEMENT .................................................. 173 A. Solution: Enhanced Enforcement ............................................... 175 B. Coalition Solutions ...................................................................... 178 C. Lessons from the Collaboration Against SOPA ......................... 180 CONCLUSION .............................................................................................. 182 INTRODUCTION A host of laws and regulations engage with the legal,1 technological,2 and social3 meanings4 of privacy. In a country
    [Show full text]
  • White Paper Swire US EU Surveillance
    December 17, 2015 US Surveillance Law, Safe Harbor, and Reforms Since 2013 Peter Swire1 Executive Summary: This White Paper is a submission to the Belgian Privacy Authority for its December 18, 2015 Forum on “The Consequences of the Judgment in the Schrems Case.”2 The Forum discusses the decision by the European Court of Justice in Schrems v. Data Protection Commissioner3 that the EU/US Safe Harbor was unlawful under the EU Data Protection Directive, particularly due to concerns about US surveillance law. For the Forum, I have been asked to comment on two issues: 1) Is US surveillance law fundamentally compatible with E.U. data protection law? 2) What actions and reforms has the US taken since the Snowden revelations began in June 2013? The White Paper draws on my background as a scholar of both EU data protection law and US surveillance law. It addresses serious misunderstandings of US national security law, reflected in official statements made in the Schrems case and elsewhere. It has three chapters: (1) The fundamental equivalence of the United States and EU member States as constitutional democracies under the rule of law. In the Schrems decision, the US was criticized for failing to ensure “a level of protection of fundamental rights essentially equivalent to that guaranteed in the EU legal order.” This chapter critiques that finding, instead showing that the United States has strict rule of law, separation of powers, and judicial oversight of law enforcement and national security 1 Peter Swire is the Huang Professor of Law and Ethics at the Georgia Tech Scheller College of Business and a Senior Fellow of the Future of Privacy Forum.
    [Show full text]
  • 7 October 2019 Dear Mr. Zuckerberg, OPEN LETTER
    7 October 2019 Dear Mr. Zuckerberg, OPEN LETTER: FACEBOOK’S END-TO-END SECURITY PLANS The organizations below write today to encourage you, in no uncertain terms, to continue increasing the end-to-end security across Facebook’s messaging services. We have seen requests from the United States, United Kingdom, and Australian governments ​ asking you to suspend these plans “until [Facebook] can guarantee the added privacy does not reduce public safety”. We believe they have this entirely backwards: each day that platforms do not support strong end-to-end security is another day that this data can be breached, mishandled, or otherwise obtained by powerful entities or rogue actors to exploit it. Given the remarkable reach of Facebook’s messaging services, ensuring default end-to-end security will provide a substantial boon to worldwide communications freedom, to public safety, and to democratic values, and we urge you to proceed with your plans to encrypt messaging through Facebook products and services. We encourage you to resist calls to create so-called ​ “backdoors” or “exceptional access” to the content of users’ messages, which will fundamentally weaken encryption and the privacy and security of all users. Sincerely, 1. 7amleh-The Arab Center for Social Media Advancement 2. Access Now 3. ACM US Technology Policy Committee 4. ACT | The App Association 5. AfroLeadership 6. Alternatives 7. American Civil Liberties Union 8. Americans for Prosperity 9. APADOR-CH 10. ARTICLE 19 11. Asociación Argentina de Usuarios de Internet - Internauta Argentina 12. Asociación Colombiana de Usuarios de Internet 13. Asociación por los Derechos Civiles (ADC), Argentina 14.
    [Show full text]
  • NOTHING to HIDE: Tools for Talking (And Listening) About Data Privacy for Integrated Data Systems
    NOTHING TO HIDE: Tools for Talking (and Listening) About Data Privacy for Integrated Data Systems OCTOBER 2018 Acknowledgements: We extend our thanks to the AISP Network and Learning Community, whose members provided their support and input throughout the development of this toolkit. Special thanks to Whitney Leboeuf, Sue Gallagher, and Tiffany Davenport for sharing their experiences and insights about IDS privacy and engagement, and to FPF Policy Analyst Amy Oliver and FPF Policy Intern Robert Martin for their contributions to this report. We would also like to thank our partners at Third Sector Capital Partners and the Annie E. Casey Foundation for their support. This material is based upon work supported by the Corporation for National and Community Service (CNCS). Opinions or points of view expressed in this document are those of the authors and do not necessarily reflect the official position of, or a position that is endorsed by, CNCS or the Social Innovation Fund. TABLE OF CONTENTS Introduction ............................................................................................................................................................................................................................. 2 Why engage and communicate about privacy? ................................................................................................................................................. 2 Using this toolkit to establish social license to integrate data .....................................................................................................................
    [Show full text]
  • January 11, 2015 President Barack Obama the White House 1600 Pennsylvania Avenue NW Washington, DC 20500 Access Now 1110 Vermont
    January 11, 2015 President Barack Obama The White House 1600 Pennsylvania Avenue NW Washington, DC 20500 Access Now 1110 Vermont Avenue NW Suite 500 Washington, DC 20005 Dear President Obama, We urge you to protect the security of your citizens, your economy, and your government by supporting the development and use of secure communications tools and technologies, rejecting policies that would prevent or undermine the use of strong encryption, and urging other leaders to do the same. Encryption tools, technologies, and services are essential to protect against harm and to shield our digital infrastructure and personal communications from unauthorized access. The ability to freely develop and use encryption provides the cornerstone for today’s global economy. Economic growth in the digital age is powered by the ability to trust and authenticate our interactions and communicate and conduct business securely, both within and across borders. Some of the most noted technologists and experts on encryption recently explained that laws or policies that undermine encryption would “force a U-turn from the best practices now being deployed to make the Internet more secure,” “would substantially increase system complexity” and raise associated costs, and “would create concentrated targets that could attract bad actors.”1 The absence of encryption facilitates easy access to sensitive personal data, including financial and identity information, by criminals and other malicious actors. Once obtained, sensitive data can be sold, publicly posted, or used
    [Show full text]
  • Kids & the Connected Home
    KIDS & THE CONNECTED HOME: PRIVACY IN THE AGE OF CONNECTED DOLLS, TALKING DINOSAURS, AND BATTLING ROBOTS DECEMBER 2016 Acknowledgements Future of Privacy Forum (FPF) and Family Online Safety Institute (FOSI) would like to thank the participants and attendees of "Kids and the Connected Home" (July 20, 2016), as well as the following individuals who contributed to the research and analysis in this paper: Carolina Alonso, Legal & Policy Fellow, Future of Privacy Forum Stacey Gray, Policy Counsel, Future of Privacy Forum Emma Morris, Global Policy Manager, Family Online Safety Institute Jennifer Hanley, Director, Legal & Policy Family Online Safety Institute Steven Anderson, Legal Intern, Future of Privacy Forum Hengyi Jiang, Legal Intern, Future of Privacy Forum Emily S. Tabatabai, Of Counsel, Orrick Herrington & Sutcliffe TABLE OF CONTENTS Executive Summary ............................................................................................................................................... 1 I. The Landscape: Connected Toys Are Increasingly Popular and Often Use Children's Data to Enable Interactive Play ................................. ....................................................................................................... 2 Connected Toys Differ from Other Toys Because They Collect, Use, and Share Data Via the Internet. ................................ ................................................................................................................ 2 Connected Toys Use a Variety of Technical Methods
    [Show full text]
  • Jeffrey Scudder Google Inc. March 28, 2007 Google Spreadsheets Automation Using Web Services
    Jeffrey Scudder Google Inc. March 28, 2007 Google Spreadsheets Automation using Web Services Jeffrey Scudder Google Inc. March 28, 2007 2 Overview What is Google Spreadsheets? • Short Demo What is the Google Spreadsheets Data API? • Motivations (Why an API?) • Protocol design • Atom Publishing Protocols • GData • List feed deconstructed How do I use the Google Spreadsheets Data API? • Authentication • Longer Demo Questions 3 What is Google Spreadsheets? Let’s take a look 4 What is Google Spreadsheets? Why not ask why • Spreadsheets fits well with our mission… – “Organize My Information… and… – Make it Accessible and Useful… – With whomever I choose (and nobody else, thanks)” • In other words…. – Do-it-yourself Content Creation – Accepted/Familiar Interface of Spreadsheets and Documents – Accessibility from anywhere (…connected) – Easy-to-use Collaboration – Do-it-yourself Community Creation 5 What is the Google Spreadsheets Data API? Motivations • Foster development of specific-use apps • Allow users to create new UIs • To extend features offered • To integrate with 3rd party products • To offer new vertical applications 6 What is the Google Spreadsheets Data API? Protocol design based on existing open standards • Deciding on design principles – Use a RESTful approach – Reuse open standards – Reuse design from other Google APIs • The end result – REST web service based on GData – Data is in Atom XML and protocol based on the Atom Publishing Protocol (APP) – GData is based on Atom and APP and adds authentication, query semantics, and more
    [Show full text]
  • Query Expansion Based on Crowd Knowledge for Code Search
    IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 9, NO. X, XXXXX 2016 1 Query Expansion Based on Crowd Knowledge for Code Search Liming Nie, He Jiang, Zhilei Ren, Zeyi Sun, and Xiaochen Li Abstract—As code search is a frequent developer activity in software development practices, improving the performance of code search is a critical task. In the text retrieval based search techniques employed in the code search, the term mismatch problem is a critical language issue for retrieval effectiveness. By reformulating the queries, query expansion provides effective ways to solve the term mismatch problem. In this paper, we propose Query Expansion based on Crowd Knowledge (QECK), a novel technique to improve the performance of code search algorithms. QECK identifies software-specific expansion words from the high quality pseudo relevance feedback question and answer pairs on Stack Overflow to automatically generate the expansion queries. Furthermore, we incorporate QECK in the classic Rocchio’s model, and propose QECK based code search method QECKRocchio. We conduct three experiments to evaluate our QECK technique and investigate QECKRocchio in a large-scale corpus containing real-world code snippets and a question and answer pair collection. The results show that QECK improves the performance of three code search algorithms by up to 64 percent in Precision, and 35 percent in NDCG. Meanwhile, compared with the state-of-the-art query expansion method, the improvement of QECKRocchio is 22 percent in Precision, and 16 percent in NDCG. Index Terms—Code search, crowd knowledge, query expansion, information retrieval, question & answer pair Ç 1INTRODUCTION ODE search is a frequent developer activity in software Obviously, it is not an easy task to formulate a good query, Cdevelopment practices, which has been a part of soft- which depends greatly on the experience of the developer and ware development for decades [47].
    [Show full text]
  • Google Cheat Sheets [.Pdf]
    GOOGLE | CHEAT SHEET Key for skill required Novice This two page Google Cheat Sheet lists all Google services and tools as to understand the Intermediate well as background information. The Cheat Sheet offers a great reference underlying concepts to grasp of basic to advance Google query building concepts and ideas. Expert CHEAT SHEET GOOGLE SERVICES Google domains google.co.kr Google Company Information google.ae google.kz Public (NASDAQ: GOOG) and google.com.af google.li (LSE: GGEA) Google AdSense https://www.google.com/adsense/ google.com.ag google.lk google.off.ai google.co.ls Founded Google AdWords https://adwords.google.com/ google.am google.lt Menlo Park, California (1998) Google Analytics http://google.com/analytics/ google.com.ar google.lu google.as google.lv Location Google Answers http://answers.google.com/ google.at google.com.ly Mountain View, California, USA Google Base http://base.google.com/ google.com.au google.mn google.az google.ms Key people Google Blog Search http://blogsearch.google.com/ google.ba google.com.mt Eric E. Schmidt Google Bookmarks http://www.google.com/bookmarks/ google.com.bd google.mu Sergey Brin google.be google.mw Larry E. Page Google Books Search http://books.google.com/ google.bg google.com.mx George Reyes Google Calendar http://google.com/calendar/ google.com.bh google.com.my google.bi google.com.na Revenue Google Catalogs http://catalogs.google.com/ google.com.bo google.com.nf $6.138 Billion USD (2005) Google Code http://code.google.com/ google.com.br google.com.ni google.bs google.nl Net Income Google Code Search http://www.google.com/codesearch/ google.co.bw google.no $1.465 Billion USD (2005) Google Deskbar http://deskbar.google.com/ google.com.bz google.com.np google.ca google.nr Employees Google Desktop http://desktop.google.com/ google.cd google.nu 5,680 (2005) Google Directory http://www.google.com/dirhp google.cg google.co.nz google.ch google.com.om Contact Address Google Earth http://earth.google.com/ google.ci google.com.pa 2400 E.
    [Show full text]
  • Opensocialに見る Googleのオープン戦略 G オ 戦略
    OpenSocialに見る Googleのオオ戦略ープン戦略 Seasar Conference 2008 Autumn よういちろう(TANAKA Yoichiro) (C) 2008 Yoichiro Tanaka. All rights reserved. 08.9.6 1 Seasar Conference 2008 Autumn Self‐introduction • 田中 洋郎洋一郎(TANAKA Yoichiro) – Mash up Award 3rd 3部門同時受賞 – Google API Expert(OpenSocial) 天使やカイザー と呼ばれて 検索 (C) 2008 Yoichiro Tanaka. All rights reserved. 08.9.6 2 Seasar Conference 2008 Autumn Agenda • Impression of Google • What’s OpenSocial? • Process to open • Google now (C) 2008 Yoichiro Tanaka. All rights reserved. 08.9.6 3 Seasar Conference 2008 Autumn Agenda • Impression of Google • What’s OpenSocial? • Process to open • Google now (C) 2008 Yoichiro Tanaka. All rights reserved. 08.9.6 4 Seasar Conference 2008 Autumn Services produced by Google http://www.google.co.jp/intl/ja/options/ (C) 2008 Yoichiro Tanaka. All rights reserved. 08.9.6 5 Seasar Conference 2008 Autumn APIs & Developer Tools Android Google Web Toolkit Blogger Data API Chromium Feedbunner APIs Gadgets API Gmail Atom Feeds Google Account Google AdSense API Google AdSense for Audio Authentication API Google AdWords API Google AJAX APIs Google AJAX Feed API Google AJAX LAnguage API Google AJAX Search API Google Analytics Google App Engine Google Apps APIs Google Base Data API Google Book Search APIs Google Calendar APIs and Google Chart API Google Checkout API Google Code Search Google Code Search Data Tools API GlGoogle Custom ShSearch API GlGoogle Contacts Data API GlGoogle Coupon FdFeeds GlGoogle DkDesktop GdGadget GlGoogle DkDesktop ShSearch API APIs Google Documents List Google
    [Show full text]
  • An Updated Privacy Paradigm for the INTERNET of THINGS
    BEFORE THE UNITED STATES FEDERAL TRADE COMMISSION WASHINGTON, DC ____________________________________________________ ) COMMENTS OF THE FUTURE OF PRIVACY FORUM ) ) RE: INTERNET OF THINGS, PROJECT NO. P135405 ) ___________________________________________________) I. Introduction On November 19, 2013, the FTC held a Workshop examining the privacy and security issues associated with connected “smart technologies,” collectively referred to as the “Internet of Things.”1 The Future of Privacy Forum (“FPF”)2 was pleased to participate in the Workshop’s panel on Connected Cars. Following the event, the FTC invited public comments to further the Commission’s understanding of the issues raised at the Workshop. 3 FPF appreciates this opportunity to provide these Comments on those issues and to submit formally FPF’s white paper, An Updated Privacy Paradigm for the “Internet of Things”, which FPF published to coincide with the Workshop, attached as Appendix A to these Comments. The Internet of Things has been an important focus of FPF’s work since our founding in 2008. FPF recognizes the enormous potential benefits to consumers and to society of the inter- connected applications offered through the Internet of Things.4 At the same time and from the beginning, FPF has worked to ensure that privacy and security are integrated into those implementations of the Internet of Things that involve the collection and sharing of personal 1 Internet of Things—Privacy and Security in a Connected World, FTC, available at http://www.ftc.gov/news- events/events-calendar/2013/11/internet-things-privacy-and-security-connected-world (last visited Jan. 10, 2014). 2 The Future of Privacy Forum is a Washington, D.C.-based think tank whose mission is to advance privacy for people in practical ways that allow for innovation and responsible use of data.
    [Show full text]