Data, Privacy, Security, and The Courts: Where Are We? And, How Do We Get Out Of Here? Richard Warner Chicago-Kent College of Law

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

The Mental Capacity Act 2005 Implications for Front Line Staff Richard Williams Professor of Mental Health Strategy, University of Glamorgan Professor.
TASK: The comparison between basic and applied research.
Contracts, Norms, and Privacy Robert Sloan Richard Warner.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
VCE Religion and Society Revised Study
Hong Kong Privacy Code on Human Resource Management
Business Intelligence Michael Gross Tina Larsell Chad Anderson.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Managing Distributed Collections: Evaluating Web Page Change, Movement, and Replacement Richard Furuta and Frank Shipman Center for the Study of Digital.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Big Data Analytics and Challenge Presented by Saurabh Rastogi Asst. Prof. in Maharaja Agrasen Institute of Technology B.Tech(IT), M.Tech(IT)
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
 MODERN DATABASE MANAGEMENT SYSTEMS OVERVIEW BY ENGINEER BILAL AHMAD
Science and Engineering Practices
1 Consent for treatment A summary guide for health practitioners about obtaining consent for treatment Bridie Woolnough Resolution Officer Health Care.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Organ, body, authority Prof. Gyula Bándi. A reference to the competent organ or body, particularly to the competent authority, are part of legal regulation.
Course Conclusion Who Governs? To What Ends?. Who Governs?
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Notice and Choice and Its Problems Robert Sloan Richard Warner.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Research PHE 498. Define Research Research can be considered as systematic inquiry: A process that needs to be followed systematically to derive conclusions.
FILE NUMBER Kent Grey, Partner 1 June 2012 Technology in Governance Risk-intelligent approach to the use of technology “in the Boardroom”
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Introduction – Addressing Business Challenges Microsoft® Business Intelligence Solutions.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Qualitative Research January 19, Selecting A Topic Trying to be original while balancing need to be realistic—so you can master a reasonable amount.
Market research for a start-up. LEARNING OUTCOMES By the end of this lesson I will be able to: –Define and explain market research –Distinguish between.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
AUDIT IN COMPUTERIZED ENVIRONMENT
Data Structures and Algorithms Dr. Tehseen Zia Assistant Professor Dept. Computer Science and IT University of Sargodha Lecture 1.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Introducing Government in America. Introduction Politics and government matter. Americans are apathetic about politics and government. American youth.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Types of Information Systems Basic Computer Concepts Types of Information Systems  Knowledge-based system  uses knowledge-based techniques that supports.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
McGraw-Hill © 2007 The McGraw-Hill Companies, Inc. All rights reserved. Slide 1 Sociological Research SOCIOLOGY Richard T. Schaefer 2.
Director, Internet, Science, and Technology Research
Privacy and Public Policy Implications of IoT
Judicial Training on Data Protection and Privacy Rights
Student Privacy in an Ever-Changing Digital World
Ethical, Social, and Political Issues in E-commerce
Internet Advertising FTC 101.
Microsoft SAM for Hosting (SPLA)
Red Flags Rule An Introduction County College of Morris
Why are you collecting data in the first place
Ethical questions on the use of big data in official statistics
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Secondary Data, Databases,
Investor protection and MIFID
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
Business Intelligence
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Data Warehousing Data Mining Privacy
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
IT and Society Week 2: Privacy.
Presentation transcript:

Data, Privacy, Security, and The Courts: Where Are We? And, How Do We Get Out Of Here? Richard Warner Chicago-Kent College of Law

We Live in the Age of Big Data “Big Data” refers to the acquisition and analysis of massive collections of information, collections so large that until recently the technology needed to analyze them did not exist. And more: Datafication Massive amounts of unstructured “messy” data Otherwise unnoticed patterns Indiscriminate collection Indefinite retention for unpredictable future uses

Datafication

Massive Messy Data Big Data analysis requires collecting massive amounts of messy data. Messy data: The data is not in a uniform format as one would see in traditional database, it is not annotated (semantically tagged). A technological breakthroughs was to find ways to manipulate and analyze such data. Massive amounts: think of every tweet ever tweeted. They are all in the Library of Congress. 400 million tweets a day in 2013.

Patterns We Would Not Notice Big Data analytics can reveal important patterns that would otherwise go unnoticed. Taking the antidepressant Paxil together with the anti- cholesterol drug Pravachol could result in diabetic blood sugar levels. Discovered by (1) using a symptomatic footprint characteristic of very high blood sugar levels obtained by analyzing thirty years of reports in an FDA database, and (2) then finding that footprint in the Bing searches using an algorithm that detected statistically significant correlations. People taking both drugs also tended to enter search terms (“fatigue” and “headache,” for example) that constitute the symptomatic footprint.

Benefits of Big Data Big Data analytics can reveal important patterns that would otherwise go unnoticed. Taking the antidepressant Paxil together with the anti- cholesterol drug Pravachol could result in diabetic blood sugar levels. Discovered by (1) using a symptomatic footprint characteristic of very high blood sugar levels obtained by analyzing thirty years of reports in an FDA database, and (2) then finding that footprint in the Bing searches using an algorithm that detected statistically significant correlations. People taking both drugs also tended to enter search terms (“fatigue” and “headache,” for example) that constitute the symptomatic footprint.

Obama and Big Data “Aiming to make the most of the fast-growing volume of digital data, the Obama Administration today announced a Big Data Research and Development Initiative. By improving our ability to extract knowledge and insights from large and complex collections of digital data, the initiative promises to help solve some the Nation’s most pressing challenges.” Office of Science and Technology Policy, Obama Administration Unveils “Big Data” Initiative: Announces $200 Million In New R&D Investments (Executive Office of the President, March 29, 2012), ta_press_release.pdf.

Institution Transparency requirements Government Internal sharing Consumers and others seeking services ReportingSurveillance Privacy and security requirements Investigation Foreign governments Voluntary information sharing, Reporting requirements InvestigationExternal sharing

Indiscriminate Collection Big Data typically involves collecting diverse types of data. “In an intelligence driven security model, the definition of ‘security data’ expands considerably. In this new model, security data encompasses any type of information that could contribute to a 360-degree view of the organization and its possible business risks.” Sam Curry et al., “Big Data Fuels Intelligence-Driven Security” (RSA, January 2013), 4, data-fuels-intelligence-driven-security-io.pdf.

Indefinite Retention, Unpredictable Uses The information is typically retained for a long time to use in unpredictable ways. as the Pravochol/Paxil example illustrates. The example also illustrates the rationale: the discovery of patterns we might not otherwise notice.

Loss of Informational Privacy Informational privacy is the ability to determine for ourselves what information about us others collect and what they do with it. None of the developments just outlined can happen without a loss of control over our data.

We Lose Control, They Gain It Information aggregators Businesses Government Our data “We can determine where you work, how you spend your time, and with whom, and with 87% certainty where you'll be next Thursday at 5:35 p.m.”

Increased power to control from knowing our location data.

But James Rule, pre-Big Data Information processing practices now “share a distinctive and sociologically crucial quality: they not only collect and record details of personal information; they are also organized to provide bases for action toward the people concerned. Systematically harvested personal information, in other words, furnishes bases for institutions to determine what treatment to mete out to each individual... Mass surveillance is the distinctive and consequential feature of our times.” James Rule, Privacy in Peril, © 2007, completed in 2006

New Privacy Problems? Changed privacy problems. A particularly complex and difficult tradeoff problem takes center stage. Big Data presents a much wider range of both risks and benefits—from detecting drug interactions to reducing emergency room costs to improving police response times.

Privacy Advocates and Courts Privacy advocates insist that We adopt severe restrictions on data collection, use, and retention, and. that courts should see the invasion of privacy as a compensable harm. Courts Refuse to see a mere invasion of privacy as a compensable harm Do not curtailed massive data collection, and Rarely hold businesses liable for data breaches.

And the Rest of Us: What We Want More control over our information, but without giving up the advantages information processing secures: We are willing trade. Humphrey Taylor, Most People Are “Privacy Pragmatists” Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefit, T HE H ARRIS P OLL (2003). What is the current mechanism for making privacy tradeoffs? Government: Constitutional and statutory constraints on government surveillance. Dana Priest and William M. Arkin, Top Secret America: The Rise of the New American Security State. Private business: Notice and Choice.

Notice and Choice The “notice” is the presentation of information Typically in a privacy policy. The “choice” is some action by the consumer Typically using the site, or clicking on an “I agree” button. Claims: 1. Notice and Choice ensure free and informed consent. 2. The pattern of free and informed consent defines an acceptable tradeoff between privacy and the benefits of information processing.

What We Have—Contractually Realized Notice and Choice Consumer Business Advertising ecosystem Payment system Aggregators Government

The Dominant Paradigm It is well known that these claims are false. Even so, Notice and Choice dominates public policy in both the US and the EU. An unsympathetic but not entirely inapt analogy: The old joke about the drunk and the streetlight. Why do policy makers and privacy advocates continue to look under the streetlight of Notice and Choice when it is clear that consent is not there?

The Failure of Notice and Choice  Notice and Choice fails to  To ensure free and informed consent.  To define an acceptable tradeoff between privacy and the benefits of information processing.  I focus on the problems about informed consent.

Informed Consent Impossible Two features of the advertising system make it impossible for a Notice to contain enough information: Complexity, and Long-term data retention.

Complexity The specificity assumption: informed consent requires knowing specific detail about what happens with the one’s information. The advertising system is too complex for a Notice to provide the required detail.

Long-Term Data Retention Current practice is to store information for a long time, to be used in ways we cannot now predict. What we cannot predict now we cannot now write down in a privacy policy, so it is not possible for the policy to be informative enough.

The Wrong Tradeoff Why would individual decisions based on information available at the time somehow add up an acceptable tradeoff? Even if Notices could, per impossible, contain all relevant information, and even if all visitors read and understood Notices, they would not have the information they need. The information required to adequately balance the benefits and risks concerns complex society- wide consequences that unfold over a long period of time.

Data Restrictions Proponents of Notice and Choice insist on restrictions on data collection and use: The Federal Trade Commission: Companies should limit data collection to that which is consistent with the context of the transaction or the consumer’s relationship with the business implement reasonable restrictions on the retention of data and should dispose of it once the data has outlived the legitimate purpose for which it was collected.

How Do We Get Out of Here? Notice and Choice first. We—my co-author Robert Sloan and I—think what policy makers have missed is the role of informational norms, Norms that govern the collection, use, and distribution of information. What follows is a bare bones outline of the idea, for more Robert Sloan and Richard Warner, Unauthorized Access: The Crisis in Online Privacy and Security, July 2013,

What Norms Can Do When informational norms govern online businesses data collection and use practices, website visitors give free and informed consent to acceptable tradeoffs. As long as the norms are consistent with our values. Call such norms “value-optimal.”

Informed Consent A visitor’s consent is informed if the visitor can make a reasonable evaluation of the risks and benefits of disclosing information. Suppose visitors know transactions are governed by value-optimal norms, then: they know that uses of the visitor’s information— both uses now and uses in the unpredictable future—will implement tradeoffs between privacy and competing goals that entirely consistent with their values.

Tradeoffs All informational norms—value-optimal and non- value-optimal alike—implement a tradeoff between privacy and competing concerns. They permit some information processing, and thus secure some of its benefits, but they protect privacy by allowing only certain processing. When the norm is value-optimal, the tradeoff it implements it is justified by visitors’ values. The tradeoff is acceptable in this sense.

The Lack of Norms Problem Rapid advances in technology have created many situations for which we lack relevant value- optimal informational norms. Two cases : (1) relevant norms exist, but they are not value- optimal; (2) relevant norms do not exist at all.

Now What About Privacy Harms? The norms approach works—if indirectly. We can reduce the risk of harm problem by reducing unauthorized access. Can we reduce it to the point that we can adequately address the remaining increased risk of harm through existing means—insurance and recovery from identity theft? Whether we can is a matter of norms appropriate product-risk norms for software. and appropriate service-risk norms for malware.