A Consent-Based Approach Richard Warner

Slides:



Advertisements
Similar presentations
Our school: typical Greek school traditional models of education in its daily instructive practice. Past few years: efforts to modernize these instructive.
Advertisements

Safety Planning. Safety Plan KNOW THE FAMILY D1: Extent of Maltreatment D2: Surrounding Circumstances D3: Child Functioning D4: Adult Functioning D5:
Contracts, Norms, and Privacy Robert Sloan Richard Warner.
PHYS 2020 Pseudocode. Real Programmers Program in Pencil!  You can save a lot of time if you approach programming in a methodical way.  1) Write a clear.
Click Wrap Contracts Richard Warner.  Web sites typically contain an agreement defining the terms on which the web site may be used.  In many cases,
Objections to the contractual theory Another objection to the theory points out that consumers can freely agree to purchase a product without certain qualities.
Obtaining Informed Consent: 1. Elements Of Informed Consent 2. Essential Information For Prospective Participants 3. Obligation for investigators.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Teaching and Testing Pertemuan 13
1 chapter: >> First Principles Krugman/Wells Economics
TESTING THE WATERS: USING COLLECTIVE REAL OPTIONS TO MANAGE THE SOCIAL DILEMMA OF STRATEGIC ALLIANCES Presented by Jong-kyung Park MATTHEW W. MCCARTER,
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Copyright © 2012 Pearson Education, Inc. All rights reserved. Business Ethics Concepts & Cases Manuel G. Velasquez.
No, Thanks, I’ll Use a Spreadsheet
The Goals and Principles of Human Participant Protection Part 4: Vulnerable Populations.
Medical Law and Ethics Lesson 4: Medical Ethics
Chapter 2 – Economics.  Four different types of economic systems have evolved throughout history as cultures, societies, and nations have struggled with.
Question 23 As an accountant of an organization, discuss why it might be necessary to initiate systems analysis. {6 marks} Giving reasons for your answer,
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Building Online Traffic Instructor: Hanniya Abid Assistant Professor COMSATS Institute of Information Technology Lecture 22 E-Marketing.
Notice and Choice and Its Problems Robert Sloan Richard Warner.
Value Lecture 10 This lecture is part of Chapter 5: Becoming a Millionaire.
Event Management & ITIL V3
Principle #2 – Transparent and Responsible Pricing This presentation is made possible by the Smart Campaign Principle #2- Transparent.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Ethical Issues Lecture 14 th. Summary: Understanding Sampling Choice of sampling techniques depends upon the research question(s) and their objectives.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Nursery Management Understanding and Managing Finance Session 9.
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Business Project Nicos Rodosthenous PhD 28/10/ /10/20141Dr Nicos Rodosthenous.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
Market Research TEST MARKETING. WHAT IS TEST-MARKETING  Test Marketing combines scientific testing with controlled field experimentation. Test- market.
LEGAL ASPECTS OF DIGITAL LIBRARIES By TALWANT SINGH ADDL DISTT. & SESSIONS JUDGE; DELHI.
Copyright © 2007 Pearson Education Canada 5-1 Chapter 5: Audit Responsibilities and Objectives.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Information System Project Management Lecture three Chapter one
Introduction To Privacy Law Richard Warner. An Informational Privacy Ideal Informational privacy consists in the ability to control  What information.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Copyright © 2010 Pearson Education, Inc.4-1. The Problem “Problems” are situations calling for managers to make choices among alternatives. Managers make.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
By Godwin Alemoh. What is usability testing Usability testing: is the process of carrying out experiments to find out specific information about a design.
Cookies By: Kendra Alvarez. Concepts of Cookies Cookies are pieces of information generated by a Web server and stored in the user's computer, ready for.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Economics ch. 7 Perfect Competition  A large number of buyers and sellers exchange identical products under the following five conditions. ___________.
Private Placements and Venture Capital Chapter 28 Tools & Techniques of Investment Planning Copyright 2007, The National Underwriter Company1 What is it?
PIGOU AND COASE The art of political economy. A.C. PIGOU
UNIT III. A managerial problem can be described as the gap between a given current state of affairs and a future desired state. Problem solving may then.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Key Knowledge Confidentiality Year 4 Medical Ethics and Law Thread Course The Ethox Centre, University of Oxford.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Business Ethics Concepts & Cases

Student Privacy in an Ever-Changing Digital World
Tutorial for 21Classes.com
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Starfish Faculty Training How to Raise Flags and Kudos
Spyware. By: Katheryn L. Gaston.
How to upgrade your RSFORM!PRO forms for GDPR compliance
Introduction to Health Privacy
Presentation transcript:

A Consent-Based Approach Richard Warner

The Consent Requirement  An attractive to regulate privacy is to impose a “consent requirement”: pass a statute that requires that businesses obtain our consent before they collect certain types of information about us.  The more types of information businesses cannot collect without consent, the greater the privacy protection.  I will bypass the question of what types of information should be included.

The Consent Requirement  The consent requirement leaves the decision about when to disclose information in the hands of individual consumers.  If businesses desire information consumers are reluctant to disclose, businesses can offer discounts on purchases or other forms of compensation.  The interactions among consumers and businesses determines the tradeoff between privacy and efficiency.

The Consent Requirement  The consent requirement appears at one to solve stroke the privacy problem technology creates.  The problem is that technology greatly reduces our ability to control what others know about us.  The consent requirement appears to return to us by law the control technology has stolen; it ensures a zone of privacy which others may not invade without our explicit, prior consent.

The Critical Question  The critical question about the consent requirement is whether it can actually succeed in adequately protecting privacy.  To answer, we need to identify the threats that reduce our ability to control what others know about us.

Lack of Consent  Businesses deny us control over what others know about us when they collect information about us without our consent.  Lack of consent is common on the Web.  When you visit a web site, the visit typically triggers the deposit on your hard drive of programs–called “cookies”–that garner information and return it to advertisers.

Cookies and Consent  It is arguable that you give implied consent to the use of cookies. You can set your Internet browser to prevent their use. Many sites will refuse access to you if you block cookies. So the implied consent you give does not necessarily represent a truly meaningful choice among viable options.  Consent to cookies is often less than fully informed; many are unaware of just how much information the cookies collect and who receives that information.

Consent and Privacy Policies  Even when web sites do attempt to obtain consent to the collection and use of information, the “consent” they obtain is often defective.  Many web sites offer a privacy policy that informs users about what information the business collects and what it does with that information.  Unfortunately, policies are often written in a confusing and deceptive fashion to suggest that the business offers more privacy protection that it really does;

Clicking the Box  Consent is often solicited through the request to check a box if you agree to let the business collect information and use it in certain ways.  The box is often checked by default; this means you must notice the box and uncheck it to avoid giving “consent.”  In many cases, if you return to the page to correct erroneously entered information or for some other reason, the box is again checked by default, you must notice that and uncheck it again.

Data Aggregation  Even when a consumer has given free and informed consent to the disclosure of information, data aggregation may extend the effects of that disclosure in ways the consumer did not contemplate and to which he or she would not have given consent.

The Consent Requirement Solution  The consent requirement can require that web sites contain easily understandable, unambiguous privacy policies and can prohibit such practices as having check-boxes indicating consent checked by default.  The worry is whether privacy policies really produce adequately informed consent.

An Objection  A consumer “has real difficulty in assigning the proper value to personal information. It is difficult for the individual to adequately value specific pieces of information.... Because this value is linked to uncertain future uses, it is difficult, it not impossible, for an individual to adequately value her information.” Daniel J. Solove, Privacy and Power: Computer Databases and Metaphors for Information Privacy, 53 Stan. L. Rev (2001).

The Objection  Improper valuation means that consumers will sometimes make decisions about disclosing information that are the opposite of those that they would make were they better informed.  To the extent that consumers mistakenly impart information that they would withhold were they better informed, they impair their privacy.  To the extent that they mistakenly withhold information that they would impart were they better informed, they impair market efficiency without any offsetting privacy gain.

Knowledge of Use  To take myself as an example, there are two cases in which I know enough to determine whether to disclose information even if I am uncertain as its potential uses.  First, there is information so extremely personal that I will keep it private no matter what; I do not need to know proposed uses of this information to decide not to disclose it.  Second, at the other extreme, there is information I will readily disclose no what use may be made of it (within broad limits; I will return to this qualification).

Knowledge of Use  Suppose, for example, I purchase a newspaper and a bottle of red wine at a grocery store which retains a record that I purchased those items at a particular price on a particular day.  I have no objection to them having that information; indeed, I want them to have it because they can use it to provide me products I want, run a more efficient store, and pass the efficiency savings on to me in the form of lower costs.

Knowledge of Use  I do not care what else they do with the information; as far as I am concerned, they can publish it on a billboard at the exit of the Lincoln tunnel into New York city.  There are limitations, of course; I would not want someone to compile a history of all of my purchases of wine during my lifetime and publish the information on a web site that asserted that my wine consumption was excessive.  I disclose information against a background assumption that the uses that will be made of the information will stay within certain limits; however, I can be confident that the assumption is true.

Intermediate Cases  In the intermediate cases between the two extremes, uncertainty about the use of information can be more of a concern. I may, for example, be reluctant to disclose my opinions and political allegiances to my local congressperson’s reelection campaign unless I am assured that the information will not be passed on to the party’s national committee  Uncertainty does not mean I cannot make a rational decision about whether to disclose information.  It just means I face a decision under uncertainty.  If I do not want to run the risk of an unwanted use of information, I simply do not disclose it.

Intermediate Cases  If businesses want me to disclose information that uncertainty makes me withhold, they simply have to eliminate the uncertainty by agreeing to limit their uses to those acceptable to me.  They can do, for example, through privacy policies.

Privacy Policies  Some will object that consumers do not take the time and trouble to read privacy policies, and hence that it is simply naive to think that detailed privacy policies are an effective method of communication.  We should distinguish two cases.  First, consumers do not read the privacy policy because they do not care sufficiently about the business will do with the information they disclose–my lack of concern about my newspaper and wine purchases illustrates the point.  Here the failure to read the privacy policy does not show that the consent requirement fails to protect privacy; it just shows that consumers do not pointlessly waste their time and effort.

Second Case  Second: consumers withhold information they would disclose if they read it and were reassured by the privacy protections offered.  If businesses want the information, they can present the relevant aspects of the privacy practices in a way makes it more likely that consumers will become aware of them.  If they fail to do so, then the cost of acquiring the information is not worth the cost of reaching out to the consumers.  Thus, information remains private unless businesses find it sufficiently important to them to invest in encouraging its disclosure.  Here the consent requirement works precisely as intended. The point is to allow consumers and businesses to strike a balance between privacy and efficiency.

Aggregation  In the case of aggregation, the consent requirement fails to strike an adequate balance between privacy and efficiency.  The essential difficulty is that data may be aggregated by a variety of third parties for a wide range of purposes over a number of years.  Thus, when consumers divulge individual bits of information, it is virtually impossible for them to predict the ways in that information will be aggregated and the uses to which the aggregated information will be put.

Two Results  First, concern for the unpredictable aggregation consequences will lead some consumers to withhold information that they would willing disclose if they could predict its uses in future data aggregation.  The result is that we forego the efficiency gain we would reap from disclosure without any offsetting privacy protection.  Putting information about aggregation in privacy policies is not the solution.  How is a business to cost-effectively obtain information about what any number of third party aggregators are likely to do with information over a period of several years?

Two Results  Second, some consumers will fail to realize or misjudge the aggregation risk and disclose information they would withhold were they better informed.  Here the efficiency gain from disclosure results from a failure properly to protect privacy.  We see an extreme case of this failure in the case of public records, when it is mandatory to divulge information to governmental agencies.  The use of the information by private parties is completely constrained by any consent requirement.