Privacy Laws and First Amendment Content Professor Peter P. Swire Ohio State University John Marshall Symposium on Copyright & Privacy Conference November.

Slides:



Advertisements
Similar presentations
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Advertisements

Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
HIPAA In Relation to Other Federal Laws Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster LLP Glasser LegalWorks/HIPAA Conference.
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
Protection of privacy for all Students!
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Search and Seizure on the Premises of the Danish Parliament (the Folketing) Conditions, background and practice.
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Class 7 Internet Privacy Law Your Digital Afterlife.
Pretext Phone Calls Legal in Canada!!. Police-guided pretext phone calls do not violate Charter s. 8 if prior: -One party consent -Judicial Authorization.
UNIT 5 AMERICAN GOVERNMENT. LESSON PAGES How do the 4 th and 5 th Amendments protect against unreasonable law enforcement procedures? Objective:
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Use Policies Deputy Attorney General Robert Morgester
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
Doug Aaron Manchester, Tennessee.  Criminal defendants in State court are more than 20 times more likely to plead guilty than to go to trial.  In Federal.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Questions about broadband What do we do about broadband services? –Why didn’t the ILECs deploy DSL faster? Could regulation be to blame? –How do we get.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
The Forensic Accounting Legal Environment McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
AP GOVERNMENT. CIVIL LIBERTIES  Civil Liberties are individual’s legal and constitutional protections against the government.  Although our civil liberties.
Data Protection Act AS Module Heathcote Ch. 12.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
The Judicial Branch. Copyright 2009 Pearson Education, Inc., Publishing as Longman Understanding the Federal Judiciary The Framers viewed the federal.
Chapter 43 Administrative Law and Regulatory Agencies
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
The Bill of Rights The First Fundamental Changes of the Constitution.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 18 - The Fourth Amendment and National Security.
Adult Protective Services Basic Skills Training Presented by: Rajeev Premakumar Assistant Attorney General Public Assistance Section N.C. Department of.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Common Law, Statutory Law, and Administrative Law.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
PROCESSES OF CRIMINAL LAW: BEFORE THE TRIAL Law 12.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Lesson # 7 A Practical Guide to Computer Forensics Investigations
How Does Electronic Surveillance Work Legally?
Data Protection Legislation
Fourth Amendment And Probable Cause.
Journal #2 When is it appropriate for an official to investigate any of your personal belongings? (Car, phone, bag, physical person?) Give an example.
Pre-Trial Procedures Search and Seizure.
The Surveillance State
Chapter 43 Administrative Law and Regulatory Agencies
Sadi R. Antonmattei-Goitia Sullo & Sullo, LLP February 16, 2019
Presentation transcript:

Privacy Laws and First Amendment Content Professor Peter P. Swire Ohio State University John Marshall Symposium on Copyright & Privacy Conference November 18, 2004

The Question n Will they (content owners & govt.) know what we (users) read and say? n Answer: a robust history of legislatures limiting privacy problems concerning First Amendment content, for both: – What a person says/writes – What a person reads/views n Good procedures should be, and quite possibly will be, created for future surveillance of content

Overview n Multiple statutes (long before P2P) create procedures and privacy protections for 1 st Am content n Verizon v. RIAA was a victory for effective procedural protections n Reasons for privacy protections around use of 1 st Am content: – U.S. tradition and understanding of the need – Importance of good procedures to limit abuse by those seeking surveillance

I. The Statutory Precedents Video Privacy Protection Act of 1988 n Reporter got Borks rental records n Law passed almost instantly n The public choice explanation? – Number of Senators who saw movies their constituents wouldnt like – (The same Congressional concern for their own records led to Gramm-Leach-Bliley privacy law)

Video Privacys Strict Rules n Opt in rule for sharing personally identifiable information n Court orders shall issue only with prior notice to the consumer and only if the law enforcement agency shows that there is probable cause to believe that the records or other information sought are relevant to a legitimate law enforcement inquiry

Video Privacys Strict Rules n Court may quash or modify such order if the information or records requested are unreasonably voluminous in nature or if compliance with such order otherwise would cause an unreasonable burden on such [video] provider n Suppression rule: Personally identifiable information obtained in any manner other than as provided in this section shall not be received in evidence in any trial, hearing, arbitration, or other proceeding

Cable Communications Privacy Act of 1984 n Roughly as strict as VPPA n Annual notice to customers about PII n Opt in (prior written consent) disclosure for content of cable viewing n Opt out for customer lists n Liquidated damages for customers of greater of $1000 or $100/day

Cable Privacy n Court orders only if: – clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case and – the subject of the information is afforded the opportunity to appear and contest such entitys claim

The Content of Publishers n Privacy Protection Act of 1980 n Enacted after Stanford v. Zurcher said no 4 th Am protections for access to records in office of Stanford student paper n Congress required full search warrants for records held by publishers, broadly defined n Perhaps the rules apply to web site publishers as well

Privacy Protection Act Notwithstanding any other law, it shall be unlawful for a government officer or employee, in connection with the investigation or prosecution of a criminal offense, to search for or seize any work product materials possessed by a person reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication Government must get a search warrant, which is relatively strict, before enforcing IP laws

Wiretaps and ECPA – What You Say, Hear, or Read n Content of telephone calls and s has strict protections n Title III (1968), strict rules on wiretaps and bugs n Electronic Communications Privacy Act of 1986, similar rules for intercepting s n Stored Communications Act (1986), medium rules for stored s n Much more lenient rules where no content, such as trap-and-trace orders n Also, Telecommunications Act of 1996, with CPNI rules limiting private-sector sale of data

II. Bad Procedures under 512(h) n As declarant in Verizon v. RIAA, my concerns about the new spam: – Minimal showing to get subpoena – No protection against fraud n No lawyer signature (bar #) required n Information could be sent to a P.O. box – Could turn any IP address into name, address, & phone number – Trivially easy for any web site – porn, marketing, etc. -- to end anonymous surfing

Verizon case n The D.C. Circuit decided to interpret on textual, statutory grounds n In my view, there were painfully weak procedural protections under 512(h) n The bad procedure made the threats to privacy and 1 st Am values much larger n Those concerns made it much, much easier for the D.C. Circuit to hold as it did

III. Concluding Thoughts For video, cable, publishers, phone calls & – Repeated and often strict statutory protections against surveillance of 1 st Am content – High standards for court orders – Prior notice to subscribers – Limits on burdensome discovery requests against the intermediaries

Learning from the History n As a matter of description or prediction: – We see a striking and often overlooked pattern of protection in U.S. law – Remember that the behavior of members of Congress is also subject to disclosure – Quite possible will have significant privacy and procedural protections before 1 st Am content is revealed to enforcers

Looking Ahead n As a matter of prescription: – Due process should be in place – Protections against fraudulent and abusive enforcement should be in place n 512(h) lacked those – Innocent defendants should be able to win, without crushing costs

The Main Lessons from Today n Privacy as discussed here generally does not prevent the well-founded prosecution n Privacy protections are quite substantial, though, for sensitive 1 st Am content n In the copyright wars, privacy protections often mean there should be due process before the intrusion occurs