Informational Privacy, Privacy Law, Consent, and Norms Richard Warner.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy, Consent, and Norms Richard Warner. Summary Informational privacy is the ability to control what others know about us and what they do with it.
Contracts, Norms, and Privacy Robert Sloan Richard Warner.
Evaluating Economic Performance
© 2012 Lathrop & Gage LLP Presented by: Lincoln D. Bandlow, Esq. Lathrop & Gage LLP 1888 Century Park East, Suite 1000 Los Angeles, CA
American Free Enterprise
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
Subject Selection and Recruitment David Wendler Department of Clinical Bioethics NIH, USA.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Delmar Learning Copyright © 2003 Delmar Learning, a Thomson Learning company Nursing Leadership & Management Patricia Kelly-Heidenthal
Chapter 9 Fundamental Legal Principles.
 Introduction (Scary details)  Part I: Introduction to Stock Market Challenge (Brett) 4:30 to 5:15  Part II: What is Financial Literacy (Bill) 5:15.
RISK MANAGEMENT FOR ENTERPRISES AND INDIVIDUALS Chapter 9 Fundamental Doctrines Affecting Insurance Contracts.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
Chapter 9 Fundamental Legal Principles
Internal Auditing and Outsourcing
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Consumer Behavior, Market Research
Legal Principles of Insurance Chapter 9. Agenda Recall topics learned in your insurance or business law class to better understand this chapter Principle.
Privacy: Law, Values, Norms
Financial literacy is defined as the ability to read, analyze, manage and communicate about the personal financial conditions that affect material well-being.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Copyright 2010, The World Bank Group. All Rights Reserved. 1 GOVERNMENT FINANCE STATISTICS COVERAGE OF THE GFS SYSTEM Part 1 This lecture defines the concept.
Corporate Social Responsibility
Exploring Business © 2009 FlatWorld Knowledge 16-1 The Legal and Regulatory Environment of Business.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Notice and Choice and Its Problems Robert Sloan Richard Warner.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Capitalism and Economic Freedom.  A. Capitalism is a market economy in which private citizens own the factors of production. In a free enterprise system,
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Privacy and the Market Richard Warner. Three Types of Privacy  Spatial rights define a physical zone of control over intrusions by others.  Decisional.
Introduction To Privacy Law Richard Warner. An Informational Privacy Ideal Informational privacy consists in the ability to control  What information.
Snowe Amendment to the Wired Act William F. Pewen, Ph.D., M.P.H. Office of Senator Olympia J. Snowe, ME (202)
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Consent & Vulnerable Adults Aim: To provide an opportunity for Primary Care Staff to explore issues related to consent & vulnerable adults.
1-1 CHAPTER 7 MATERIALS TO SUPPLEMENT TEXTBOOK J. Pittman, Instructor.
Chapter 1 Introduction McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All Rights Reserved.
Capitalism. A market economy is normally based on a system of capitalism, where private citizens, many of whom are entrepreneurs, own the factors of production.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
Unit 3 Seminar.  Used to predict acceptable or unacceptable behavior  Helps to assess level of skills/knowledge/ characteristics applicants have  Reduce.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Research Ethics Dr Nichola Seare Aston Health Research & Innovation Cluster.
Financial Management Chapter 1- Introduction to Accounting & Finance Session Number N1.
Jim Loter Director of Information Technology
Data Collection: Themes
Chapter 9 Fundamental Legal Principles.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Democracy in the United States
Image courtesy of Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law.
Chapter 1 Sect. 3 Mr. Gordon.
By Richard A. Mann & Barry S. Roberts
Marketing Your Food Product
The 2018 Human Subject Rules
Consumers Online Before firms can begin to sell their products online, they must first understand what kinds of people they will find online and how.
Big Data Considerations
Chapter 1 Section 3 Mr. Gordon.
Investor protection and MIFID
The 2018 Human Subject Rules
Chapter 1 Section 3 Mr. Plude.
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
INFS 452 – Computer Ethics & Society
IT and Society Week 2: Privacy.
Presentation transcript:

Informational Privacy, Privacy Law, Consent, and Norms Richard Warner

Why Privacy and Security? What is the connection between privacy and security? Online security is essentially a matter of preventing unauthorized access to information while ensuring authorized access. What how should we distinguished between authorized and unauthorized access?

Privacy and Security To answer, we need to know what should be private. Consider health information. What information should be secured against unauthorized access, and how secure should it be?

Three Types of Privacy Spatial rights define a physical zone of control over intrusions by others. Decisional rights protect an individual’s freedom of choice. Informational rights demarcate an ability to determine what others know about us and what they do with that knowledge.

Informational Privacy Informational privacy is a matter of control. It is “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others”[1] and for what purpose others use that information.[1]  Alan Westin, Privacy and Freedom 7 (1967).

Loss of Control The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to who distributed.

Direct Marketing Example “One can reasonably expect to purchase a listing of five thousand women who are both public employees and wear sexy underwear; or business owners who espouse far-right political causes; or registered Republicans who are purchasers of pornography—or... of pornography with S-M themes.... The guest list information from a hotel frequented by lesbians... [and lists of] women who buy wigs; callers to a romance telephone service; impotent middle-aged men; gamblers; buyers of hair removal products; male buyers of fashion underwear; believers in the feminist political movement, anti-gay movement, and prayer in the public schools.”

Direct Marketing Direct mail marketing now “returns $10 in sales for every $1 in costs—a ratio double that for a television advertisement.” Direct marketing now accounts for just over half of all advertising expenditures.

Categories It is convenient to divide activities affecting informational privacy in to three categories: Activities affecting informational privacy CollectionProcessingDistribution

Privacy in the Past In the recent past, our ability to process information was relatively limited. Consequently, what each of us thought ought to be private could, through our own efforts, be kept private to a considerable extent. Consequently, privacy law focused primarily on distribution and, to some extent, on collection.

The Common Law Torts The common law privacy torts reflect this background. Only one tort is concerned with collection:  Intrusion into seclusion. The other three distribution:  Public disclosure of private facts,  False light,  Misappropriation of a name or likeness. Misappropriation protects one’s financial interest in one’s name or likeness, so the first two really concern the disclosure of information.

Unreasonable Intrusion Into Seclusion Intentional intrusion on the seclusion of another Highly offensive to a reasonable person Remsburg v. Docusearch  Do I have an expectation of privacy in my Work address? Social security number? Where do I have a reasonable expectation of privacy?  Subjective expectation required?

Appropriation Of Likeness Or Name Interfere with the “interest of the individual in the exclusive use of his own identity, in so far as it is represented by his name or likeness.” See Restatement (Second) of Torts § 652C, Comment a (1977) Absence of permission Topheavy Studios v. Jane Doe Financial advantage No significant newsworthiness  Restatement (Second) Torts §652(C)

Unreasonable Publicity Of Private Facts Publicity of private facts about an individual Which is highly offensive to a reasonable person, and No newsworthiness.  Social value  Voluntary or involuntary public figure?  Involuntary: substantial nexus between published matters and public interest in those matters

Public placing in false light Use of a name or identifying information, Which would lead a reasonable person to believe falsely that the individual has been engaged in criminal or morally reprehensible conduct.

Daniel Solove “Theorists have proclaimed the value of privacy to be protecting intimacy, friendship, individuality, human relationships, autonomy, freedom, self-development, creativity, independence, imagination, counterculture, eccentricity, creativity, thought, democracy, reputation, and psychological well-being.”

Privacy Harms Horror stories  Increased risk of bad outcomes Solove, Bartow Cumulative information overload Changes in the balance of power  May be commercial or non-commercial Concentration of power leads to abuse Social inequities Chilling effect  Fermat’s Last Theorem example (Andrew Wiles)  Impact on the development of the self.

Two Claims Technology has enabled ever-increasing mass surveillance—constant surveillance of almost everyone over a wide range of activities. The goal is discrimination. Governmental: to determine eligibility; entitlement; law-abidingness. Private: to profit: credit worthiness; insurance; direct marketing; price discrimination.

James Rule on Information Processing “A distinctive and sociologically crucial quality: they not only collect and record details of personal information; they are also organized to provide bases for action toward the people concerned. Systematically harvested personal information, in other words, furnishes bases for institutions to determine what treatment to mete out to each individual.”

Dwyer v. American Express American Express analyzed the purchases of its cardholders to divide them into “six tiers based on spending habits and then rent this information to... merchants... [D]efendants analyze where they shop and how much they spend, and also consider behavioral characteristics and spending histories. Defendants... create a list of cardholders who would most likely shop in a particular store and rent that list to the merchant.”

Collection Distribution Intrusion on seclusion Public disclosure of private. facts Misappropriation False light Disclosure of sensitive information Trespass Processing Contract

Consent Requirements Why not require businesses to present consumers with relevant information in an understandable fashion and secure an affirmative act of agreement to proceeding with the transaction? I assume that consumers will obtain this information primarily by reading privacy policies and contracts governing sales of goods or the provision of services, where the latter includes terms of use agreements governing the use of web sites. I will call these collectively, privacy notices.

Unread Privacy Notices “Judging by behavior in the marketplace, most consumers have better things to do with their time than read privacy notices... [P]rocessing privacy notices is a cost that most consumers apparently do not believe is worth incurring. The perceived benefits are simply too low.”  J. Howard Beales, III & Timothy J. Muris, Choice or Consequences: Protecting Privacy in Commercial Information, 75 U. of Chi. L. Rev. 109 – 110 (2008).

Informed Consent Is Impossible Even if they did read and understand privacy notices, consumers would not obtain all the information necessary to give informed consent. The data aggregation problem.

The Approach Would Have Bad Results Suppose consumers could obtain and understand all the relevant information. The resulting overall pattern of consent would determine a tradeoff between privacy and competing concerns. Is there any reason to think that the tradeoff will result in the socially optimal balance between informational privacy and competing concerns?

No Socially Optimal Outcome There would be if:  (1) the giving or withhold of consent signaled consumers’ preferences with regard to consent to sellers;  (2) sellers responded to these signals by altering their offerings to reflect these values;  (3) buyers responded by preferring products and services consistent with their preference about consent to those not consistent;  (4) this feedback mechanism yielded the socially optimal allocation of information.

Non-Optimal Results But even if (1) – (3) are true, there is no reason to think (4) is. The telephone book example.

Informational Norms Informational norms are social norms that constrain the collection, use, and distribution of personal information. Informational norms explain why, for example, you expect your pharmacist to inquire about drugs you are taking (to prevent harmful drug interactions), but not whether you are happy in your marriage. Such norm-governed exchanges not only implement acceptable tradeoffs between informational privacy and competing goals, they also ensure consumers give free and informed consent to those tradeoffs.