The Changing Wind of Data Privacy Law: a Comparative Study of the European Union’S General Data Protection Regulation and the 2018 California Consumer Privacy Act

Total Page:16

File Type:pdf, Size:1020Kb

The Changing Wind of Data Privacy Law: a Comparative Study of the European Union’S General Data Protection Regulation and the 2018 California Consumer Privacy Act UC Irvine Law Review Volume 10 Issue 4 Article 11 6-2020 The Changing Wind of Data Privacy Law: A Comparative Study of the European Union’s General Data Protection Regulation and the 2018 California Consumer Privacy Act Grace Park Follow this and additional works at: https://scholarship.law.uci.edu/ucilr Part of the Privacy Law Commons Recommended Citation Grace Park, The Changing Wind of Data Privacy Law: A Comparative Study of the European Union’s General Data Protection Regulation and the 2018 California Consumer Privacy Act, 10 U.C. IRVINE L. REV. 1455 (2020). Available at: https://scholarship.law.uci.edu/ucilr/vol10/iss4/11 This Note is brought to you for free and open access by UCI Law Scholarly Commons. It has been accepted for inclusion in UC Irvine Law Review by an authorized editor of UCI Law Scholarly Commons. Second to Printer_Park.docx (Do Not Delete) 6/17/20 8:02 PM The Changing Wind of Data Privacy Law: A Comparative Study of the European Union’s General Data Protection Regulation and the 2018 California Consumer Privacy Act Grace Park* On May 25, 2018, the European Union’s (EU) General Data Protection Regulation (GDPR) came into effect. The GDPR is expected to reshape web use and overhaul data privacy laws beyond Europe in how businesses and organizations can handle customer and user information. Only a month after, California passed the California Consumer Privacy Act of 2018 (CCPA). The CCPA is one of the most significant regulations overseeing data-collection practices of businesses in the United States. It is the first of its kind and is expected to provide the most comprehensive data privacy measures in the United States. As such, the combined CCPA and GDPR data privacy regulations will likely usher in a tidal wave of changes, most likely setting new data privacy standards for other jurisdictions to model. Drawing from these events, this Note will examine the EU’s and California’s newest data privacy laws, studying the immediate and potential effects of GDPR and CCPA regulations on the existing data privacy regime. Through a comparative study of GDPR and CCPA provisions, this Note attempts to answer key questions in discourse today—to what extent are the CCPA and GDPR moving towards convergence or divergence, and how will the laws affect businesses and consumers? Is the U.S. data privacy environment veering away from its hands-off approach and drawing closer to the comprehensive approach of the EU data privacy regime? This Note will explore these questions looking at two particular provisions in the GDPR and CCPA: (1) the opt-in vs. opt-out consent and (2) the right to be forgotten/right to delete personal data. Lastly, this Note analyzes the practical implications of the GDPR and CCPA regulations on businesses in terms of how receptive businesses are to the regulations, how well businesses strive to conform to the regulatory boundaries of data privacy regimes, and whether the regulations will have the intended effect of strengthening consumer rights by putting heavier restrictions on businesses. * Ms. Grace Park is a member of the Class of 2019 of the University of California, Irvine School of Law. Many thanks to Professor David Kaye for his guidance and suggestions to pursue and research this topic. 1455 Second to Printer_Park.docx (Do Not Delete) 6/17/20 8:02 PM 1456 UC IRVINE LAW REVIEW [Vol. 10:1455 Introduction .................................................................................................................. 1456 I. The Data Privacy Framework ....................................................................... 1458 A. What is Data Privacy Law? .................................................................... 1458 B. The Development of Internet Law ...................................................... 1461 C. Data Privacy Regulatory Environment in the United States and the European Union .............................................................................. 1464 1. The EU Model and the GDPR ..................................................... 1465 2. The California Model and the CCPA ........................................... 1468 II. Comparative Study of the GDPR and the CCPA ...................................... 1473 A. Opt-In vs. Opt-Out Consent ................................................................ 1473 1. Application ....................................................................................... 1476 B. The Right to be Forgotten .................................................................... 1479 1. Application ....................................................................................... 1483 III. The Effects of the European Union and California’s Data Privacy Laws on Businesses and Organizations ....................................................... 1485 Conclusion ..................................................................................................................... 1488 INTRODUCTION The year 2018 was a huge step forward for advocates who have long pushed for stronger data protection for individuals. On May 25, 2018, the EU’s General Data Protection Regulation (GDPR) came into effect with fanfare, as businesses and organizations impacted by the law scrambled to meet the new benchmark for data protection. The GDPR is expected to reshape web use and overhaul data privacy laws beyond Europe, altering how businesses and organizations can handle customer and user information. Coming on the heels of GDPR’s effective date, the California state legislature hastened to pass the California Consumer Privacy Act of 2018 (CCPA) a month later. The CCPA is one of the most significant regulations overseeing data-collection practices of technology companies in the United States.1 Going into effect in January 2020, the California law is the first of its kind in the United States and is expected to provide the most comprehensive data privacy measures in the United States. The CCPA is being closely watched because California has been a forerunner in enacting various laws protecting consumer rights. Data privacy rights are no different. The combined CCPA and GDPR data privacy regulations will likely usher in a tidal wave of changes because these initiatives are being carried forth by the world’s major economic powers2 and will most likely set new data privacy standards for other jurisdictions to model. 1. Daisuke Wakabayashi, California Passes Sweeping Law to Protect Online Privacy, N.Y. TIMES ( June 28, 2018), https://www.nytimes.com/2018/06/28/technology/california-online-privacy- law.html [https://perma.cc/4R83-SVZD]. 2. See Kieran Corcoran, California’s Economy Is Now the 5th-Biggest in the World, and Has Overtaken the United Kingdom, BUS. INSIDER (May 5, 2018), https://www.businessinsider.com/ california-economy-ranks-5th-in-the-world-beating-the-uk-2018-5 [https://perma.cc/2S4B-GYN6]. Second to Printer_Park.docx (Do Not Delete) 6/17/20 8:02 PM 2020] THE CHANGING WIND OF DATA PRIVACY LAW 1457 The focus on laws fortifying data protection comes at the same time that 2018 became the year that consumers intensified demands for greater corporate accountability. Reports after reports of massive data breaches or privacy intrusions have come to light. In March 2018, news broke that Cambridge Analytica had collected and sold personal data of millions of Facebook users without their knowledge or consent. In August 2018, a user sued Google after reports emerged of Google Maps storing users’ location data even when “Location History” was turned off.3 One month later, Facebook revealed that hackers had breached and gained access to more than thirty million users’ personal data.4 Most recently, investigation by the Irish Data Protection Commissioner divulged information that Microsoft’s LinkedIn professional networking application (“app”), i.e., a software program run on computers or mobile devices to perform specific tasks, misused email addresses of eighteen million nonmembers in the United States.5 According to reports, LinkedIn used the emails to get more people to sign up for the service by using them in hashed form to place targeted ads on Facebook’s platform.6 The constant media stream of corporations mishandling personal data has steadily contributed to the growing awareness of Internet privacy issues. Users are “very concerned” about companies like Facebook that have failed to institute policies safeguarding personal data and have indeed profited from the misuse of users’ personal data.7 Thus, recent events have united voices calling for stronger data protection regulation to the forefront of national discourse. The public seems to be at a turning point in what it expects governments to do in order to curb corporate misuse of personal data and strengthen data privacy laws to protect consumer rights.8 Accordingly, this Note conducts a study into the EU’s and California’s newest data privacy laws in order to examine the immediate and potential effects of the GDPR and CCPA regulation on the existing data privacy regime. This Note will compare and analyze where the GDPR and CCPA provisions align and where they 3. Cyrus Farivar, Man Sues Over Google’s “Location History” Fiasco, Case Could Affect Millions, ARS TECHNICA (Aug. 20, 2018, 10:55 AM), https://arstechnica.com/tech-policy/2018/08/did- google-violate-users-privacy-when-it-secretly-kept-location-data/ [https://perma.cc/N5CK-QRNT]. 4. Allen St. John, Facebook Breach Exposed Personal Data of Millions of Users, CONSUMER REPORTS (Oct. 12, 2018), https://www.consumerreports.org/digital-security/facebook-data-breach-
Recommended publications
  • Anonymity and Encryption in Digital Communications, February 2015
    Submission to the UN Special Rapporteur on freedom of expression – anonymity and encryption in digital communications, February 201 1! Introduction Privacy International submits this information for the Special Rapporteur's report on the use of encryption and anonymity in digital communications. Anonymity and the use of encryption in digital communications engage both the right to freedom of expression and right to privacy very closely: anonymity and encryption protects privacy, and ithout effective protection of the right to privacy, the right of individuals to communicate anonymously and ithout fear of their communications being unla fully detected cannot be guaranteed. As noted by the previous mandate holder, !rank #aRue, $the right to privacy is essential for individuals to express themselves freely. Indeed, throughout history, people%s illingness to engage in debate on controversial sub&ects in the public sphere has al ays been linked to possibilities for doing so anonymously.'( Individuals' right to privacy extends to their digital communications.) As much as they offer ne opportunities to freely communicate, the proliferation of digital communications have signi*cantly increased the capacity of states, companies and other non+state actors to interfere ith individual's privacy and free expression. Such interference ranges from mass surveillance of communications by state intelligence agencies, to systematic collection and storage of private information by internet and telecommunication companies, to cybercrime. Anonymity and encryption are essential tools available to individuals to mitigate or avert interferences ith their rights to privacy and free expression. In this ay, they are means of individuals exercising to the fullest degree their rights hen engaging in digital communications.
    [Show full text]
  • The Right to Be Forgotten in the Light of the Consent of the Data Subject
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Open Repository and Bibliography - Luxembourg computer law & security review 32 (2016) 218–237 Available online at www.sciencedirect.com ScienceDirect www.compseconline.com/publications/prodclaw.htm The right to be forgotten in the light of the consent of the data subject Cesare Bartolini *, Lawrence Siry * University of Luxembourg, Luxembourg ABSTRACT Keywords: Recently, the Court of Justice of the European Union issued decision C-131/12, which was Data protection considered a major breakthrough in Internet data protection. The general public wel- General data protection reform comed this decision as an actualization of the controversial “right to be forgotten”, which Consent was introduced in the initial draft for a new regulation on data protection and repeatedly amended, due to objections by various Member States and major companies involved in massive processing of personal data. This paper attempts to delve into the content of that decision and examine if it indeed involves the right to be forgotten, if such a right exists at all, and to what extent it can be stated and enforced. © 2016 Cesare Bartoli & Lawrence Siry. Published by Elsevier Ltd. All rights reserved. forgotten is not mentioned in the current DPD provisions, yet 1. Introduction it has been statutorily introduced in the proposed General Data Protection Regulation (GDPR). The GDPR comes from the evo- In May 2014, the Court of Justice of the European Union (CJEU) lution of the DPD interpretation in the light of technological issued a decision1 which has been regarded as the enforce- developments since its adoption in 1995.
    [Show full text]
  • Privacy on the Internet: the Vole Ving Legal Landscape Debra A
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara High Technology Law Journal Volume 16 | Issue 2 Article 10 January 2000 Privacy on the Internet: The volE ving Legal Landscape Debra A. Valentine Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Debra A. Valentine, Privacy on the Internet: The Evolving Legal Landscape , 16 Santa Clara High Tech. L.J. 401 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol16/iss2/10 This Symposium is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. PRIVACY ON THE INTERNET: THE EVOLVING LEGAL LANDSCAPE Prepared Remarks of Debra A. Valentinet TABLE OF CONTENTS I. Introduction ................................................................................ 401 II. Privacy on the Internet-The Evolving Legal Landscape ............. 403 A. Federal Trade Commission Act and Informational Privacy ........... 404 B. Other Federal Statutes and Informational Privacy ......................... 408 C. Federal Intemet-Law ................................................................... 410 III. Current Federal Policy on Internet Privacy .................................. 412 IV. The U.S. Approach
    [Show full text]
  • Privacy Online: a Report to Congress
    PRIVACY ONLINE: A REPORT TO CONGRESS FEDERAL TRADE COMMISSION JUNE 1998 FEDERAL TRADE COMMISSION Robert Pitofsky Chairman Mary L. Azcuenaga Commissioner Sheila F. Anthony Commissioner Mozelle W. Thompson Commissioner Orson Swindle Commissioner BUREAU OF CONSUMER PROTECTION Authors Martha K. Landesberg Division of Credit Practices Toby Milgrom Levin Division of Advertising Practices Caroline G. Curtin Division of Advertising Practices Ori Lev Division of Credit Practices Survey Advisors Manoj Hastak Division of Advertising Practices Louis Silversin Bureau of Economics Don M. Blumenthal Litigation and Customer Support Center Information and Technology Management Office George A. Pascoe Litigation and Customer Support Center Information and Technology Management Office TABLE OF CONTENTS Executive Summary .......................................................... i I. Introduction ........................................................... 1 II. History and Overview .................................................... 2 A. The Federal Trade Commission’s Approach to Online Privacy ................. 2 B. Consumer Privacy Online ............................................. 2 1. Growth of the Online Market ...................................... 2 2. Privacy Concerns ............................................... 3 C. Children’s Privacy Online ............................................. 4 1. Growth in the Number of Children Online ............................ 4 2. Safety and Privacy Concerns ...................................... 4 III. Fair
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Protecting Privacy Under the Fourth Amendment
    Protecting Privacy Under the Fourth Amendment The Fourth Amendment' has explicitly been held to protect personal privacy2 since at least the mid-nineteenth century.3 Experts in many fields, including law, psychology, philosophy and sociology, believe that privacy is vitally important to all human beings,' and the Supreme Court has 1. The Fourth Amendment provides that: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. CONST. amend. IV. Under the Fourteenth Amendment, the states must comply with the provisions of the Fourth Amendment. Mapp v. Ohio, 367 U.S. 643, 655 (1961). 2. As a constitutional concept, privacy is an elusive yet fundamental value. Although the word "privacy" does not appear in the Constitution, the Supreme Court has recognized a constitutional right to privacy based upon provisions of the First, Third, Fourth, Fifth, and Ninth Amendments and their respective "penumbras." Griswold v. Connecticut, 381 U.S. 479, 484-85 (1965); cf Beaney, The ConstitutionalRight to Privacy in the Supreme Court, 1962 SUP. CT. REV. 212, 215 ("The nearest thing to an explicit recognition of a right to privacy in the Constitution is contained in the Fourth Amendment".) This right to privacy is a "fundamental personal right, emanting 'from the totality of the constitutional scheme.' " Griswold v. Connecticut, 381 U.S. 479, 494 (1965) (Goldberg, J., con- curring) (quoting Poe v.
    [Show full text]
  • What Data Is Best Kept Private and Why?
    What data is best kept private and why? Hi, My name is Catherine Gicheru. I am an ICFJ Knight Fellow and the Director of the African Women Journalism Project, an initiative that works to support, train and mentor women journalists in Africa in covering underreported communities and issues. Last week Arzu Geybulla took you through what online harassment looks like, how to look after your emotional wellbeing and shared resources for psychosocial support. This week, l will be telling you about online privacy...what is it and why it's important. You will learn what information you should or shouldn't share online and how the information you share online can make you vulnerable to online attacks and targeted by bad actors. We shall also share some practical tips on what you can do to protect your privacy online. This week in addition to the videos there will be additional reading materials. I encourage you all to participate in the discussions that we shall be having throughout the week. Thank you for joining me and I look forward to working with you to better understand Online Privacy. I would like to start this second module by quickly talking about how the internet works so that you can better understand what data you share knowingly or unknowingly, and why some information should be kept private. There’s a lot of technical explanations of how the internet works, but the simplest explanation is this, the Internet is a vast, sprawling collection of networks that connect to each other. In fact, the word “Internet” comes from this concept: interconnected networks.
    [Show full text]
  • 1 Before the U.S. COPYRIGHT OFFICE, LIBRARY of CONGRESS
    Before the U.S. COPYRIGHT OFFICE, LIBRARY OF CONGRESS In the Matter of Section 512 Study Docket No. 2015-7 Additional Comments of Electronic Frontier Foundation February 21, 2017 Submitted by: Corynne McSherry Mitch Stoltz Kerry Maeve Sheehan1 Electronic Frontier Foundation 815 Eddy Street San Francisco, CA 94109 Telephone: (415) 436-9333 [email protected] The Electronic Frontier Foundation (EFF) appreciates the Copyright Office’s efforts to consider the impact of section 512 of the Digital Millennium Copyright Act. EFF is a member-supported, nonprofit, public interest organization dedicated to ensuring that copyright law advances the progress of science and the arts and enhances freedom of expression. Founded in 1990, EFF represents tens of thousands of dues-paying members, including consumers, hobbyists, computer programmers, entrepreneurs, students, teachers, and researchers, who are united in their desire for a balanced copyright system that provides adequate incentives for creators, facilitates innovation, and ensures broad access to information in the digital age. EFF has been involved, as amicus or party counsel, in numerous court cases interpreting section 512, including Lenz v Universal, Lessig v. Liberation Music, MoveOn v. Viacom, Tuteur v. Wesley Corcoran, Sapient v. Geller, SHARK v. PRCA, Viacom v. YouTube, UMG Recordings v. Veoh, and Columbia Pictures v. Fung. We regularly counsel 1 Kerry Maeve Sheehan is not admitted to practice law. 1 individuals who have been targeted by takedown notices pursuant to the DMCA regarding their rights and options. We have also represented the interests of users and innovators on multiple formal and informal public processes assessing the notice and takedown system, in the United States and abroad.
    [Show full text]
  • A Call from the Panopticon to the Judicial Chamber “Expect Privacy!”
    Journal of International Commercial Law and Technology Vol.1, Issue 2 (2006) A Call From the Panopticon to the Judicial Chamber “Expect Privacy!” Julia Alpert Gladstone Bryant University Smithfield, RI,USA Abstract Privacy is necessary in order for one to develop physically, mentally and affectively. Autonomy and self definition have been recognized by the United States Supreme Court as being values of privacy. In our technologically advanced, and fear driven society, however, our right to privacy has been severely eroded. Due to encroachment by government and business we have a diminished expectation of privacy. This article examines the detriments to self and society which result from a reduced sphere of privacy, as well as offering a modest suggestion for a method to reintroduce an improved conception of privacy into citizens’ lives. Keywords: Privacy, Technology, Judiciary, Autonomy, Statute INTRODUCTION Citizens often pay scant attention to their privacy rights until a consciousness raising event, such as the late 2005 exposure of the unauthorized wiretapping performed by the United States Executive Branch, heightens their interest and concern to protect previously dormant privacy rights. The scholarly literature on privacy is plentiful which broadly explains privacy as a liberty or property right, or a condition of inner awareness, and explanations of invasions of privacy are also relevant. This article seeks to explain why privacy remains under prioritized in most people’s lives, and yet, privacy is held as a critical, if not, fundamental right. Privacy is defined according to social constructs that evolve with time, but it is valued, differently. It is valued as a means to control one’s life.
    [Show full text]
  • Is the Market for Digital Privacy a Failure?1
    Is the Market for Digital Privacy a Failure?1 Caleb S. Fuller2 Abstract Why do many digital firms rely on collecting consumer information–a practice that survey evidence shows is widely disliked? Why don’t they, instead, charge a fee that would protect privacy? This paper empirically adjudicates between two competing hypotheses. The first holds that firms pursue this strategy because consumers are ill-informed and thus susceptible to exploitation. The second holds that this strategy reasonably approximates consumer preferences. By means of survey, I test a.) the extent of information asymmetry in digital markets, b.) consumers’ valuation of privacy, and c.) whether government failure contributes to consumer mistrust of information collection. My results indicate that a.) the extent of information asymmetry is minimal, b.) there is significant divergence between “notional” and “real” demand for privacy and c.) that government contributes to consumer distrust of information collection by private firms. Significantly, almost 82% of Google users are unwilling to pay anything for increased digital privacy. JEL-Classification: D23, K29, Z18 Keywords: privacy paradox, digital privacy, survey, market failure 1 I wish to thank Alessandro Acquisti, Peter Leeson, Chris Coyne, Peter Boettke, David Lucas, Noah Gould, and Nicholas Freiling for helpful suggestions. All errors are my own. I am also indebted to the Mercatus Center for providing funding for the survey conducted by Haven Insights LLC. 2 Assistant professor of economics, Grove City College, Email: 1 INTRODUCTION Google’s motto is “Don’t Be Evil.” But the fact that the company surreptitiously collects the information of over one billion individuals annually leads some to question whether the firm’s business model runs afoul of its dictum (Hoofnagle 2009).
    [Show full text]
  • Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017)
    Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Privacy in the Employment Relationship by Thomas H. Wilson, Vinson & Elkins LLP and Corey Devine with Practical Law Labor & Employment Maintained • USA (National/Federal) This Practice Note provides an overview of privacy issues in employment, which may arise in various contexts, such as background checks, drug testing, email and other electronic surveillance and tracking by GPS. Invasion of privacy claims are highly fact-intensive and largely dependent on state law. This Note contains information that is general and not jurisdiction-specific. Contents Overview of Privacy Laws Background Checks Background Checks Conducted Internally by the Employer Background Checks Conducted Externally by a Third Party Employment Testing of Applicants or Employees Drug Testing Polygraph Tests HIV or AIDS Tests Medical and Physical Examinations Other Types of Testing Employee Personnel Records Employee Medical Records Sensitive Personally Identifiable Information Employee Electronic Communications Monitoring of Emails and Internet Usage Requiring Disclosure of Electronic Account Access Information Monitoring of Telephone Calls Video Surveillance of Employee Behavior on the Job Searching Employee Surroundings on the Job No Expectation of Privacy in Common Areas Employer Limits © 2017 Thomson Reuters. No claim to original U.S. Government Works. 1 Privacy in the Employment Relationship, Practical Law Practice Note 6-517-3422 (2017) Employees' Lawful, Off-Duty Activities Tracking Employee Movements by GPS Privacy Concerns Consent and Notice Other Considerations Monitoring and Employee Rights Under the National Labor Relations Act Information about Employees Relevant to Health and Safety This Note provides a general overview of the key legal principles involved in employee privacy in the private employment context.
    [Show full text]
  • Principles of Internet Privacy
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Articles by Maurer Faculty Faculty Scholarship 2000 Principles of Internet Privacy Fred H. Cate Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facpub Part of the Computer Law Commons, and the Law and Society Commons Recommended Citation Cate, Fred H., "Principles of Internet Privacy" (2000). Articles by Maurer Faculty. 243. https://www.repository.law.indiana.edu/facpub/243 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Articles by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Principles of Internet Privacy FRED H. CATE* I. INTRODUCTION Paul Schwartz's InternetPrivacy and the State makes an important and original contribution to the privacy debate that is currently raging by be- ginning the process of framing a new and more useful understanding of what "privacy" is and why and how it should be protected.' The definition developed by Brandeis, Warren,2 and Prosser,3 and effectively codified by Alan Westin in 1967---"the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others"---worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.
    [Show full text]