Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.

Slides:



Advertisements
Similar presentations
The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
Advertisements

A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
2/16/2010 The Family Educational Records and Privacy Act.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Jan. 28, 2004UCB Sensor Nets Day1 TOWARD A LEGAL FRAMEWORK FOR SENSOR NETWORKS Pamela Samuelson, Law/SIMS UCB Sensor Nets Day January 28, 2004.
Privacy Chris Kelly iLaw July 5, 2002.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Invasion of Privacy – What you are (and are not) entitled to in the eyes of the law Image courtesy of privacy-please/
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
Why You Can’t Win, Break Even, or Get Out of the Game... WATCHING THE DIGITAL DEMOLITION OF OUR FOURTH AMENDMENT RIGHTS IDEAS & INTERSECTIONS: DIGITAL.
(Edited) WORKPLACE PRIVACY.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Class 11 Internet Privacy Law Government Surveillance.
Other Laws (Primarily for E-Government) COEN 351.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
The Right to Privacy Jody Blanke, Professor Computer Information Systems and Law.
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Privacy Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
The Privacy Torts Public Disclosure of a Private Fact Intrusion False Light Appropriation.
CHAPTER 5 ETHICS & PRIVACY.
Jody Blanke, Professor Computer Information Systems and Law 1.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Privacy and the Law.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Issues of personal data protection in scientific research
North Carolina Law Review Symposium
Privacy and Confidentiality in Research
A Gift of Fire Third edition Sara Baase
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Privacy=Secret CHIHUA WANG.
A Gift of Fire Third edition Sara Baase
TRUST:Team for Research in Ubiquitous Secure Technologies
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt Hall School of Law, UC- Berkeley

Privacy  Legal protections for privacy have multiple roots  Important norm– individuals have own concepts of privacy  Different things in different settings; Know it when you lose it

3 Conceptions of Privacy  “the right to be let alone.” Samuel Warren and Louis Brandeis. “The Right to Privacy,” Harvard Law Review, 1890  “the right of the individual to decide for himself, with only extraordinary exceptions in the interest of society, when and on what terms his acts should be revealed to the general public.” Alan Westin Privacy and Freedom, 1967  fairness and control over personal information, anonymity, and confidentiality. See Berman and Mulligan “Privacy in the Digital Age” Nova Law Review 1999.

4 Privacy interests  Decisional privacy  Bodily integrity (search)  Information privacy  Communications privacy

5 Constitutional Basis  The word “privacy does not appear in the US Constitution, but…  1 st A freedom of association  4 th A freedom from unreasonable searches and seizures (Katz, “reasonable expectations of privacy”)  9 th A unenumerated rights (invoked to protect privacy)  14 th A as interpreted in Whalen, right of informational privacy that protects an interest in  Avoiding disclosure of personal matters  Independence in decision-making

6 Tort Law  Warren and Brandeis proposed need for privacy tort  Prosser Torts  Intrusion upon seclusion  Publication of embarrassing private facts  False light  Appropriation of name, likeness or identity

7 Statutory protections Limits on government intrusion -- conversation between Court and Congress  Title III (1968) – restrictions on wiretapping and electronic surveillance (Katz; Smith) (extended by ECPA 1986 and CALEA 1995; altered by Patriot Act 2001)  Right to Financial Privacy (Miller)

8 Statutory protections Limits on government intrusion -- Or, response to government overreaching  Privacy Act First comprehensive Fair Information Practices statute in US  FOIA (with privacy exception)

9 Statutory Protections 1970’s begins concern about private sector data practices:  Fair Credit Reporting Act  Video Privacy Protection Act  Cable Communications Protection Act  Children’s Online Privacy Protection Act  GLB (financial privacy)

13 Beliefs underlying privacy law  Data collection is exception  Public/private spaces distinct - personal will exist in private space  Wall between private sector and government is thick  Data collection is engaged in by limited set of corporate or commercial entities  Communications are ephemeral; distinction between content and other  Regulatory patchwork; notice and consent  Protections weaken as information moves away from home/person out into network/third party storage  Little regulation of government acquisition of personal information from private entities  Regulatory framework focuses on specific record keepers rather than the protection of the information itself  Protections for records related to individual maintained by third parties are weak

14 Ubiquitous computing environment  “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.” M. Weiser, “The computer for the 21st Century,”  “In the future, interconnected devices will be so commonplace that "the internet" becomes invisible. Devices span from the so tiny that the computer disappears, to servers so large that storage limits vanish. It will be possible to track and relate everything...” The Endeavour Expedition: Charting the Fluid Information Utility

10 Thinking about privacy in ubiquitous computing Fair Information Practice Principles  Collection Limitation  Purpose specification  Openness  Consent  Individual participation  Data Quality  Use Limitation  Security  Accountability

11 Thinking about privacy in ubiquitous computing Anonymity and Autonomy  Tightly linked to 1st Amendment freedoms (speech, association)  Critical to participation in certain activities (intellectual, political, controversial)  Implicated by data connected to the individual…even if not to their physical world identity

12 Thinking about privacy in ubiquitous computing Confidentiality  Reflected in 4th Amendment and statutory rights controlling government access to information and private sector disclosure of information  Reflected in confidentiality statutes  Implicated by eavesdropping, redirection of information, disclosure of information

15 Existing privacy law is a poor fit for Ubiquitous computing  Data collection as norm  Absence of cues that signal data collection  Porous barriers between public and private spaces  Everyone is a potential data collector  New kinds of data “sensed” created, stored  Increased ability to create patterns, knowledge out of seemingly unrevealing bits of data  Always on, broad accessibility

16 Challenges for system designers  How do you facilitate transparency and control where being unobtrusive is an explicit system goal?  How do you evaluate privacy risks when you don’t know who is accessing the information and to what else they may be privy?  To what extent do you design around the weaknesses of the existing privacy law? (preference for client side storage? Destruction of data? Limits on certain kinds of collection?)

17 Key questions for business adoption  What are the implications of these systems given the ability of private actors and governmental entities to access information? (privacy, business confidentiality, various sorts of litigation)  Given limits of law, how to deploy? (Limit data collection; purge quickly; keep identification information separate from other forms of data)  Need to fix the law?