Privacy on the Internet: the Vole Ving Legal Landscape Debra A

Total Page:16

File Type:pdf, Size:1020Kb

Privacy on the Internet: the Vole Ving Legal Landscape Debra A View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara High Technology Law Journal Volume 16 | Issue 2 Article 10 January 2000 Privacy on the Internet: The volE ving Legal Landscape Debra A. Valentine Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Debra A. Valentine, Privacy on the Internet: The Evolving Legal Landscape , 16 Santa Clara High Tech. L.J. 401 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol16/iss2/10 This Symposium is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. PRIVACY ON THE INTERNET: THE EVOLVING LEGAL LANDSCAPE Prepared Remarks of Debra A. Valentinet TABLE OF CONTENTS I. Introduction ................................................................................ 401 II. Privacy on the Internet-The Evolving Legal Landscape ............. 403 A. Federal Trade Commission Act and Informational Privacy ........... 404 B. Other Federal Statutes and Informational Privacy ......................... 408 C. Federal Intemet-Law ................................................................... 410 III. Current Federal Policy on Internet Privacy .................................. 412 IV. The U.S. Approach to Privacy Versus the E.U. Approach ............ 415 V . Conclusion ................................................................................. 417 I. INTRODUCTION The Internet has evolved from a communications link among defense researchers into a network providing millions of users easy access to a wealth of information, goods, and services. Currently, it is estimated that well over 100 million people have access to the Internet, and the number is growing quickly.' In part, the exponential growth in the on-line consumer market has propelled the Internet's extraordinary growth. As the Federal Trade Commission (FTC or "Commission") noted in its July 1999 report to Congress, on-line commerce tripled from approximately $3 billion in sales in 1997 to t General Counsel of the United States Federal Trade Commission. Ms. Valentine previously served as Assistant Director for International Competition and Deputy Director for Policy Planning at the FTC. Before serving with the FTC, she was a partner at O'Melveny & Myers. Ms. Valentine graduated from Yale Law School and received her undergraduate degree from Princeton University. The views expressed here are those of the author and not necessarily of the Federal Trade Commission or any Commissioner. 1. See Cass R. Sunstein, Code Comfort, THE NEw REPuBLc, Jan. 10, 2000, at 37; Nielsen//Netratings, Weekly Internet Ratings, Data for Monday, January 3 through Sunday, January 9, 2000 (Jan. 13, 2000) <http://www.nielsen- netratings.com/press'-releases/pr'-0001 13.htm>. 402 COMPUTER HIGH TECHNOLOGYLAW JOURNAL [Vol.16 approximately $9 billion in 1998 Annual consumer sales are projected to skyrocket from $15 billion in 1999 to $184 billion in 2004.1 The Net is transforming not just our economy, but also our society and our notions of privacy. While the Internet provides a goldmine of information, products, and services to consumers, the Internet also is a rich source of information about consumers. Internet sites collect substantial amounts of personal information, both directly through registration pages, survey forms, order forms, and on-line contests, and indirectly through software products such as "cookies" and other types of tracking software.4 By following consumers' on-line activities, Internet site owners and other data collectors gather significant information about visitors' personal interests and preferences. Such consumer data have proven to be extremely valuable to on-line companies-they enable on-line marketers to target products and services tailored specifically to the interests of individual consumers and permit companies to boost their revenues by selling the data or selling advertising space on their Internet sites.5 An entire industry has emerged to market a variety of software products designed to assist Internet sites in collecting and analyzing visitor data and in serving targeted advertising.6 Ultimately, the prevalence, ease, and relatively low cost of collecting, maintaining, and disseminating personal consumer information have a Janus-faced aspect. On the one hand, the ability to gather, process, and disseminate information on the Internet provides 2. FTC, SELF-REGULATION AND PRIVACY ONLINE: A FEDERAL TRADE COMMISSION REPORT TO CONGRESS 1 (July 1999) <http://www.ftc.gov/os/1999/9907privay99.pdf> [hereinafter FTC's JULY, 1999 PRIVACY REPORT]; see also FTC, THE FTC'S FIRST FIVE YEARS: PROTECTING CONSUMERS ONLINE 3 (Dec. 1999) <http:llwww.ftc.gov/os/1999/9912/fiveyearreport.pdf>. 3. Actual sales for 1999 are not yet available, but the FTC has projected figures of $12 to $18 billion. See FTC's JULY, 1999 PRIVACY REPORT, supra note 2, at 3; see also Forrester Research, Inc., Online Retail to Reach $184 Billion by 2004 as Post-Web Retail Era Unfolds (Sept. 28, 1999) <http:lwww.forrester.comlER/PresslRelease/0,1769,164,FF.htm>. 4. See John Markoff, Bitter Debate On Privacy Divides Two Experts (Dec. 30, 1999) <http:llwww.nytimes.comllibrary/tech/99/12/biztechlarticles/30privacy.htnl>. Cookie technology allows a web site server to place information about a consumer's visits to the site on the consumer's computer in a text file readable only to that web site server. The cookie assigns each consumer's computer a unique identifier so that the consumer can be recognized in later visits to the site. Advertisers are now able to assign a cookie to the computers of users who visit sites in advertising networks and to follow those users from site to site by reading information stored in that cookie at each site. 5. See FrC's JULY, 1999 PRIVACY REPORT, supra note 2, at 2. 6. See id.; see also supra note 4. 2000] PRIVACY ON THE INTERNET consumers with a wealth of benefits (e.g., web sites can "remember" where a consumer has been and what type of products the consumer likes so that when the consumer returns to the site, she can be directed to additional products that are likely to interest her). On the other hand, darker voices are legitimately concerned that the manipulative 7 use of information available on the Net may adversely affect privacy. Some uses of personal data can be intrusive, as when private information is widely circulated; or reckless, as when inaccurate information is widely shared with other people and companies; or predatory, as when the information is used to target victims for a scam or crime. For over five years, the FTC has actively monitored developments in e-commerce, particularly those affecting consumer privacy. The FTC has supported industry self-regulation and has taken enforcement actions as needed. The FTC also has endorsed certain legislative initiatives (e.g., the Children's Online Privacy Protection Act8) to address specific on-line privacy concerns. As explained below, there is no simple choice between self-regulation or legislation as the anointed vehicle for protecting consumers' privacy. We already have both and will continue to need both in the future. II. PRIVACY ON THE INTERNET-T-IE EVOLVING LEGAL LANDSCAPE In the United States, individual privacy, including on-line privacy, is protected through a combination of constitutional guarantees, federal and state statutes, regulations, and voluntary codes of conduct, all of which apply to the public and private sectors in different ways. Although the U.S. Constitution does not explicitly mention a right to privacy, the Supreme Court decades ago recognized a fundamental right to privacy, or the right to be left alone.9 The Court subsequently interpreted the Bill of Rights as creating, through a penumbra of various rights, "a right of personal privacy, or a guarantee [that] certain areas or zones of privacy [do] exist under the Constitution."' ° Viewed in hindsight, the federal courts have effectively acknowledged a right to privacy with respect to marital relations, procreation, contraception, family relationships, 7. See Sunstein, supra note 1, at 37; see also Glenn R. Simpson, E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., Jan. 6, 2000, at A24. 8. 15 U.S.C.A. §§ 6501-6506 (West Supp. 1999). 9. See Griswold v. Connecticut, 381 U.S. 479,483-86 (1965). 10. Roe v. Wade, 410 U.S. 113,152 (1973). 404 COMPUTER HIGH TECHNOLOGYLAW JOURNAL [Vol.16 child rearing, and education." In addition, a number of state constitutions specifically enumerate the right of citizens to be protected from privacy invasions.'2 Aside from constitutional guarantees, the U.S. legislative approach to privacy has been traditionally sectoral, that is, privacy law has developed to address particular data types and users.' 3 Historically, fear of the government's use of personal data was the primary concern. Certain statutes thus limit the use of personally identifiable data that the government maintains. 14 Other statutes limit the government's use of personal data maintained by industry. 5 And some statutes limit firms' use of personal data.16 While no single law or regulation specifically recognizes a U.S. citizen's general right to informationalprivacy, certain laws as applied do afford a fair amount of such privacy to consumers. A. Federal Trade Commission Act and InformationalPrivacy Section 5 of the Federal Trade Commission Act 7 ("FTC Act") in 11. See, e.g., Loving v. Virginia, 388 U.S. 1 (1967) (marital relations); Skinner v. Oklahoma, 316 U.S. 535 (1942) (procreation); Eisenstadt v. Baird, 405 U.S. 438 (1972) (contraception); Prince v. Massachusetts, 321 U.S. 156 (1944) (family relationships and child rearing); Pierce v. Society of Sisters, 268 U.S. 510 (1925) (education). 12. See, e.g., CAL CONST. art. I, § 1; ARiz.
Recommended publications
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • What Data Is Best Kept Private and Why?
    What data is best kept private and why? Hi, My name is Catherine Gicheru. I am an ICFJ Knight Fellow and the Director of the African Women Journalism Project, an initiative that works to support, train and mentor women journalists in Africa in covering underreported communities and issues. Last week Arzu Geybulla took you through what online harassment looks like, how to look after your emotional wellbeing and shared resources for psychosocial support. This week, l will be telling you about online privacy...what is it and why it's important. You will learn what information you should or shouldn't share online and how the information you share online can make you vulnerable to online attacks and targeted by bad actors. We shall also share some practical tips on what you can do to protect your privacy online. This week in addition to the videos there will be additional reading materials. I encourage you all to participate in the discussions that we shall be having throughout the week. Thank you for joining me and I look forward to working with you to better understand Online Privacy. I would like to start this second module by quickly talking about how the internet works so that you can better understand what data you share knowingly or unknowingly, and why some information should be kept private. There’s a lot of technical explanations of how the internet works, but the simplest explanation is this, the Internet is a vast, sprawling collection of networks that connect to each other. In fact, the word “Internet” comes from this concept: interconnected networks.
    [Show full text]
  • 1 Before the U.S. COPYRIGHT OFFICE, LIBRARY of CONGRESS
    Before the U.S. COPYRIGHT OFFICE, LIBRARY OF CONGRESS In the Matter of Section 512 Study Docket No. 2015-7 Additional Comments of Electronic Frontier Foundation February 21, 2017 Submitted by: Corynne McSherry Mitch Stoltz Kerry Maeve Sheehan1 Electronic Frontier Foundation 815 Eddy Street San Francisco, CA 94109 Telephone: (415) 436-9333 [email protected] The Electronic Frontier Foundation (EFF) appreciates the Copyright Office’s efforts to consider the impact of section 512 of the Digital Millennium Copyright Act. EFF is a member-supported, nonprofit, public interest organization dedicated to ensuring that copyright law advances the progress of science and the arts and enhances freedom of expression. Founded in 1990, EFF represents tens of thousands of dues-paying members, including consumers, hobbyists, computer programmers, entrepreneurs, students, teachers, and researchers, who are united in their desire for a balanced copyright system that provides adequate incentives for creators, facilitates innovation, and ensures broad access to information in the digital age. EFF has been involved, as amicus or party counsel, in numerous court cases interpreting section 512, including Lenz v Universal, Lessig v. Liberation Music, MoveOn v. Viacom, Tuteur v. Wesley Corcoran, Sapient v. Geller, SHARK v. PRCA, Viacom v. YouTube, UMG Recordings v. Veoh, and Columbia Pictures v. Fung. We regularly counsel 1 Kerry Maeve Sheehan is not admitted to practice law. 1 individuals who have been targeted by takedown notices pursuant to the DMCA regarding their rights and options. We have also represented the interests of users and innovators on multiple formal and informal public processes assessing the notice and takedown system, in the United States and abroad.
    [Show full text]
  • Is the Market for Digital Privacy a Failure?1
    Is the Market for Digital Privacy a Failure?1 Caleb S. Fuller2 Abstract Why do many digital firms rely on collecting consumer information–a practice that survey evidence shows is widely disliked? Why don’t they, instead, charge a fee that would protect privacy? This paper empirically adjudicates between two competing hypotheses. The first holds that firms pursue this strategy because consumers are ill-informed and thus susceptible to exploitation. The second holds that this strategy reasonably approximates consumer preferences. By means of survey, I test a.) the extent of information asymmetry in digital markets, b.) consumers’ valuation of privacy, and c.) whether government failure contributes to consumer mistrust of information collection. My results indicate that a.) the extent of information asymmetry is minimal, b.) there is significant divergence between “notional” and “real” demand for privacy and c.) that government contributes to consumer distrust of information collection by private firms. Significantly, almost 82% of Google users are unwilling to pay anything for increased digital privacy. JEL-Classification: D23, K29, Z18 Keywords: privacy paradox, digital privacy, survey, market failure 1 I wish to thank Alessandro Acquisti, Peter Leeson, Chris Coyne, Peter Boettke, David Lucas, Noah Gould, and Nicholas Freiling for helpful suggestions. All errors are my own. I am also indebted to the Mercatus Center for providing funding for the survey conducted by Haven Insights LLC. 2 Assistant professor of economics, Grove City College, Email: 1 INTRODUCTION Google’s motto is “Don’t Be Evil.” But the fact that the company surreptitiously collects the information of over one billion individuals annually leads some to question whether the firm’s business model runs afoul of its dictum (Hoofnagle 2009).
    [Show full text]
  • Principles of Internet Privacy
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Articles by Maurer Faculty Faculty Scholarship 2000 Principles of Internet Privacy Fred H. Cate Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facpub Part of the Computer Law Commons, and the Law and Society Commons Recommended Citation Cate, Fred H., "Principles of Internet Privacy" (2000). Articles by Maurer Faculty. 243. https://www.repository.law.indiana.edu/facpub/243 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Articles by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Principles of Internet Privacy FRED H. CATE* I. INTRODUCTION Paul Schwartz's InternetPrivacy and the State makes an important and original contribution to the privacy debate that is currently raging by be- ginning the process of framing a new and more useful understanding of what "privacy" is and why and how it should be protected.' The definition developed by Brandeis, Warren,2 and Prosser,3 and effectively codified by Alan Westin in 1967---"the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others"---worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.
    [Show full text]
  • Internet Privacy and the State
    UC Berkeley UC Berkeley Previously Published Works Title Internet Privacy and the State Permalink https://escholarship.org/uc/item/37x3z12g Author Schwartz, Paul M Publication Date 2021-06-27 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Berkeley Law Berkeley Law Scholarship Repository Faculty Scholarship 1-1-1999 Internet Privacy and the State Paul M. Schwartz Berkeley Law Follow this and additional works at: http://scholarship.law.berkeley.edu/facpubs Part of the Law Commons Recommended Citation Paul M. Schwartz, Internet Privacy and the State, 32 Conn. L. Rev. 815 (1999), Available at: http://scholarship.law.berkeley.edu/facpubs/766 This Article is brought to you for free and open access by Berkeley Law Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Berkeley Law Scholarship Repository. For more information, please contact [email protected]. Interet Privacy and the State PAUL M. SCHWARTZ" INTRODUCTION "Of course you are right about Privacy and Public Opinion. All law is a dead letter without public opinion behind it. But law and public opinion in-1 teract-and they are both capable of being made." Millions of people now engage in daily activities on the Internet, and under current technical configurations, this behavior generates finely grained personal data. In the absence of effective limits, legal or other- wise, on the collection and use of personal information on the Internet, a new structure of power over individuals is emerging. This state of affairs has significant implications for democracy in the United States, and, not surprisingly, has stimulated renewed interest in information privacy? Yet, the ensuing debate about Internet privacy has employed a deeply flawed rhetoric.
    [Show full text]
  • Privacy-Enhancing Technologies for the Internet
    Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley iang,daw,brewer ¡ @cs.berkeley.edu Abstract ing privacy issues on the Internet, and Section 3 provides some relevant background. We then discuss Internet pri- The increased use of the Internet for everyday activi- vacy technology chronologically, in three parts: Section 4 ties is bringing new threats to personal privacy. This pa- describes the technology of yesterday, Section 5 explains per gives an overview of existing and potential privacy- today’s technology, and Section 6 explores the technology enhancing technologies for the Internet, as well as moti- of tomorrow. Finally, we conclude in Section 7. vation and challenges for future work in this field. 2. Motivation 1. Introduction The threats to one’s privacy on the Internet are two-fold: your online actions could be (1) monitored by unauthorized Recently the Internet has seen tremendous growth, with parties and (2) logged and preserved for future access many the ranks of new users swelling at ever-increasing rates. years later. You might not realize that your personal infor- This expansion has catapulted it from the realm of academic mation has been monitored, logged, and subsequently dis- research towards new-found mainstream acceptance and in- closed; those who would compromise your privacy have no creased social relevance for the everyday individual. Yet incentive to warn you. this suddenly increased reliance on the Internet has the po- The threat of long-term storage and eventual disclosure tential to erode personal privacies we once took for granted. of personal information is especially acute on the Internet.
    [Show full text]
  • Worldwide Privacy Regulations Restricting Access to Genealogical Records Jan Meisels Allen
    IAJGS 38th International Conference on Jewish Genealogy August 6, 2018 Warsaw, Poland Worldwide Privacy Regulations Restricting Access to Genealogical Records Jan Meisels Allen Genealogists without records can’t do genealogy! We are facing crises worldwide on access to vital records due to misunderstandings by those in power about identity theft and fraud and due to budget cuts Privacy Someone's right to keep their personal matters and relationships secret Why Do We Care About Privacy? There are many people who value their privacy, and wouldn't dream of posting personal information about themselves or their family where everyone can see it. Some of those people are my cousins, and some of them are your cousins - but how could you and I hope to connect with them online given their concerns? Do You Want Your Information Available to Everyone? We want others to provide information to us. Do we want our personal information posted to the Internet? European Union Members 28 Countries Austria Belgium Bulgaria Czech Croatia Cyprus Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg Malta Netherlands Poland Portugal Romania Slovakia Slovenia Spain Sweden Until 3-29- United Kingdom 2019 European Union - 2 • 28 Countries until BREXIT takes place - 29 March 2019 • 500 million residents • Right to be forgotten/erased • Google has ~90% of Search Engine Market in Europe-varies by country • Since May 29, 2014 Google received 698,395 requests to delink from 2,615,742 URLs. They did not remove 44 percent of the URLs requested. • Fall 2016 CJEU ruled hyperlinking by third-party website (search engine) without consent of holder constitutes a "communication to the public“ and doing so is a violation of EU copyright directive.
    [Show full text]
  • The Digital Person: Technology and Privacy in the Information Age
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by George Washington University Law School GW Law Faculty Publications & Other Works Faculty Scholarship 2004 The Digital Person: Technology and Privacy in the Information Age Daniel J. Solove George Washington University Law School, [email protected] Follow this and additional works at: https://scholarship.law.gwu.edu/faculty_publications Part of the Law Commons Recommended Citation Solove, Daniel J., The Digital Person: Technology and Privacy in the Information Age (October 1, 2004). D. Solve, The Digital Person: Technology and Privacy in the Information Age, NYU Press (2004); GWU Law School Public Law Research Paper 2017-5; GWU Legal Studies Research Paper 2017-5. Available at SSRN: https://ssrn.com/abstract=2899131 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons. It has been accepted for inclusion in GW Law Faculty Publications & Other Works by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Electronic copy available at: https://ssrn.com/abstract=2899131 the digital person Electronic copy available at: https://ssrn.com/abstract=2899131 1010101010101 10101010101 101010101 1010 101 10101 1 0 1 1 Ex Machina: Law, Technology, and Society General Editors: Jack M. Balkin and Beth Simone Noveck The Digital Person Technology and Privacy in the Information Age Daniel J. Solove Electronic copy available at: https://ssrn.com/abstract=2899131 the digital person Technology and Privacy in the lnformation Age daniel j. solove a NEW YORK UNIVERSITY PRESS New York and London new york university press New York and London www.nyupress.org © by New York University All rights reserved Library of Congress Cataloging-in-Publication Data Solove, Daniel J., – The digital person : technology and privacy in the information age / Daniel J.
    [Show full text]
  • Technical and Legal Overview of the Tor Anonymity Network
    Emin Çalışkan, Tomáš Minárik, Anna-Maria Osula Technical and Legal Overview of the Tor Anonymity Network Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1 Technical and Legal Overview of the Tor Anonymity Network 1. Introduction .................................................................................................................................... 3 2. Tor and Internet Filtering Circumvention ....................................................................................... 4 2.1. Technical Methods .................................................................................................................. 4 2.1.1. Proxy ................................................................................................................................ 4 2.1.2. Tunnelling/Virtual Private Networks ............................................................................... 5
    [Show full text]
  • Fighting for Online Privacy with Digital Weaponry: Combating Revenge Pornography by Elisa D’Amico and Luke Steinberger
    Fighting for Online Privacy with Digital Weaponry: Combating Revenge Pornography By Elisa D’Amico and Luke Steinberger The Cyber Civil Rights Legal Project offers pro bono help to victims whose sexually explicit images have been dis- seminated online without consent. The speed at which information spreads is unfathomably rapid, and in just moments, a person’s most intimate moments can be exposed—displayed online for more than three billion Internet users around the globe to view, download, and share. I. Introduction and Background on Revenge ity; commentary often falsely suggest victims’ availability Porn for sex. “This has undoubtedly been the darkest chapter of As if the unauthorized distribution of intimate images my life.” Those words were spoken by one individual online with degrading and defamatory comments was whose private, intimate photographs were distributed not bad enough, revenge porn victims are also “doxed”: online without her consent for countless strangers to see. their full names and other identifying information—such Yet they might as well be the motto for all those who fall as their addresses, phone numbers, and links to social prey to abusers who use the Internet as their playground, media accounts—are posted online along with their nude sharing the most intimate details of their victims’ bodies images.11 This harassment and abuse typically extends and lives online at high speeds and at low costs,1 enabling beyond the initial posting of intimate and personal infor- what so many perpetrators and perpetuators crave:
    [Show full text]
  • Consumers Online: Your Rights to Privacy in Cyberspace Nancy Lazar
    Loyola Consumer Law Review Volume 10 | Issue 2 Article 3 1998 Consumers Online: Your Rights to Privacy in Cyberspace Nancy Lazar Follow this and additional works at: http://lawecommons.luc.edu/lclr Part of the Consumer Protection Law Commons Recommended Citation Nancy Lazar Consumers Online: Your Rights to Privacy in Cyberspace, 10 Loy. Consumer L. Rev. 117 (1998). Available at: http://lawecommons.luc.edu/lclr/vol10/iss2/3 This Recent Legislative Activity is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola Consumer Law Review by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. RECENT LEGISLATIVE by Nancy Lazar ACTIVITY Consumers Online: Your Right to Privacy in Cyberspace "According to some predictions, applied federal laws safeguarding consumer nearly one billion people will be privacy to commercial transactions in online in the next 10 years. If people cyberspace, the protection of consumer privacy are uncomfortable sending personal online is limited. For instance, although information over the Internet, the Congress amended the Electronic largest potential consumer market Communications Privacy Act of 1986, 18 will be closed to nearly every U.S.C. § 2510 - 2710 (1982 Supp. IV 1986) company in the world," according to ("Act"), to prevent Internet service providers Joseph L. Dionne, chairman and from releasing personal information of their CEO of The McGraw-Hill members to a government agency absent a legal Companies, a leading information request, the Act does not explicitly prohibit services provider. Internet service providers from distributing the members' private information to any individual A Business Week/Louis Harris & Associates or entity outside of government.
    [Show full text]