Difference between revisions of "Privacy"

From MgmtWiki
Jump to: navigation, search
(US State Regulations)
(GDPR grants these rights)
 
(47 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
==Full Title or Meme==
 
==Full Title or Meme==
Privacy is the right to be let alone. <ref name="Warren">Warren and Brandeis ''The Right to Privacy'' (1890-12-15) Harvard Law Review http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html</ref>
+
# [[Privacy]] is the right to be let alone as defined in the late 19th century. <ref name="Warren">Warren and Brandeis ''The Right to Privacy'' (1890-12-15) Harvard Law Review http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html</ref>
 +
# [[Privacy]] more recently has come to mean the right to hide [[User Information]].
  
 
==Context==
 
==Context==
Line 6: Line 7:
 
Everyone wants some privacy, but no one can explain that in a way that matches anyone else's desire for privacy.  Privacy is associated with liberty, but also with privilege (private roads, private schools), with confidentiality (private conversations) with nonconformity, with dissent, with shame, with embarrassment, with the deviant, with the taboo, with subterfuge and concealment.<ref>Louis Menand ''Nowhere to Hide: Why Do We Care So Much About Privacy?'' The New Yorker June 18, 2018 https://www.newyorker.com/magazine/2018/06/18/why-do-we-care-so-much-about-privacy</ref>
 
Everyone wants some privacy, but no one can explain that in a way that matches anyone else's desire for privacy.  Privacy is associated with liberty, but also with privilege (private roads, private schools), with confidentiality (private conversations) with nonconformity, with dissent, with shame, with embarrassment, with the deviant, with the taboo, with subterfuge and concealment.<ref>Louis Menand ''Nowhere to Hide: Why Do We Care So Much About Privacy?'' The New Yorker June 18, 2018 https://www.newyorker.com/magazine/2018/06/18/why-do-we-care-so-much-about-privacy</ref>
  
In his dissent to a 1952 Supreme Court decision<ref>Public Utilities Comm'n v. Pollak,  
+
In his dissent to a 1952 Supreme Court decision<ref>Justice Douglas (Descent), Public Utilities Comm'n v. Pollak, 343 U.S. 451 (1952) https://supreme.justia.com/cases/federal/us/343/451/case.html</ref>  Justice Douglas issued this stirring defense of the right to be let alone:
343 U.S. 451 (1952) https://supreme.justia.com/cases/federal/us/343/451/case.html</ref>  Justice Douglas issued this stirring defense of the right to be let alone:
 
  
 
<blockquote>"If liberty is to flourish, government should never be allowed to force people to listen to any radio program. The right of privacy should include the right to pick and choose from competing entertainments, competing propaganda, competing political philosophies. If people are let alone in those choices, the right of privacy will pay dividends in character and integrity. The strength of our system is in the dignity, the resourcefulness, and the independence of our people. Our confidence is in their ability as individuals to make the wisest choice. That system cannot flourish if regimentation takes hold. The right of privacy, today violated, is a powerful deterrent to any one who would control men's minds."</blockquote>
 
<blockquote>"If liberty is to flourish, government should never be allowed to force people to listen to any radio program. The right of privacy should include the right to pick and choose from competing entertainments, competing propaganda, competing political philosophies. If people are let alone in those choices, the right of privacy will pay dividends in character and integrity. The strength of our system is in the dignity, the resourcefulness, and the independence of our people. Our confidence is in their ability as individuals to make the wisest choice. That system cannot flourish if regimentation takes hold. The right of privacy, today violated, is a powerful deterrent to any one who would control men's minds."</blockquote>
  
The above statement seems to state that the people's character and integrity will be enhanced by the right to pick their own sources of information. There is ample reason to doubt that statement in light of the environment in 2018 where populist demagogues are again persuading people to vote against their own interests by manipulating news sources that appeal to the peoples' prurient interests. <ref>Eduardo Porter, ''Is the Populist Revolt Over? Not if Robots Have Their Way'' https://www.nytimes.com/2018/01/30/business/economy/populist-politics-globalization.html</ref> But the statement does seem to clarify that privacy is about liberty, the right to do what you want with yourself and your belongings.
+
The above statement seems to state that the people's character and integrity will be enhanced by the right to pick their own sources of information. There is ample reason to doubt that statement in light of the environment in 2018 where populist demagogues are again persuading people to vote against their own interests by manipulating news sources that appeal to the peoples' prurient interests. <ref>Eduardo Porter, ''Is the Populist Revolt Over? Not if Robots Have Their Way'' https://www.nytimes.com/2018/01/30/business/economy/populist-politics-globalization.html</ref> But the statement does seem to clarify that privacy is about liberty, the right to do what you want with yourself, with your attention and with your belongings. The "right to be let alone" was codified by the US Supreme Court in in 1965.<ref>Justice Douglas 381 U.S. 479 Griswold v. Connecticut (No. 496) (1995-06-07) US Supreme Court https://www.law.cornell.edu/supremecourt/text/381/479</ref>
 +
 
 +
The privacy context that is most often discussed for computer systems is user's data protection rather than intrusions into a user's attention. Bill Gates put it this way:<ref>Bill Gates, ''Thinking Big'' (2018-09-09) The New York Times Book Review p1. ff</ref>
 +
<blockquote>[At Microsoft we don't generally] distinguish among the types of data being collected - the kind of shoes you like to buy versus which diseases you're genetically predisposed to - or who is gathering it, or how they're using it. Your shopping history and our medical history aren't collected by the same people, protected by the same safeguards or used for the same purposes. Recognizing this distinction would [make our] discussions more enlightening.</blockquote>
 +
 
 +
But the subject of most interests to users is identity theft and unexpected (creepy is the word most often used) knowledge about what users have been viewing and how that impacts the messages that are targeted to a user. So the context reported in the technical press is typically more about a computer site's legal liability rather than the users' experience. In other words, the challenge understood by computer sites today is the user's rights, rather than the user's privacy expectations.
  
Context is critical in any decision made about a [[User]]'s [[Privacy]]. Bill Gates put it this way:<ref>Bill Gates, ''Thinking Big'' (2018-09-09) The New York Times Book Review p1. ff</ref>
 
<blockquote>[We don't generally] distinguish among the types of data being collected - the kind of shoes you like to buy versus which diseases you're genetically predisposed to - or who is gathering it, or how they're using it. Your shopping history and our medical history aren't collected by the same people, protected by the same safeguards or used for the same purposes. Recognizing this distinction would [make our] discussions more enlightening.</blockquote>
 
 
===User and Web Site Acceptance for Privacy Seals===
 
===User and Web Site Acceptance for Privacy Seals===
  
Line 26: Line 29:
 
Survey found that less than one-tenth, or approximately 8%, of sites in the Random Sample, and 45% of sites in the Most Popular Group, display a privacy seal.
 
Survey found that less than one-tenth, or approximately 8%, of sites in the Random Sample, and 45% of sites in the Most Popular Group, display a privacy seal.
 
</blockquote>
 
</blockquote>
 +
Still, hope springs eternal, the ID2020 Alliance folk have created a Certification Mark<ref>ID2020 Alliance accelerates towards "good" digital identity through launch of Certification Mark and new Alliance member Cision News (2019-01-24) https://www.prnewswire.com/news-releases/id2020-alliance-accelerates-towards-good-digital-identity-through-launch-of-certification-mark-and-new-alliance-member-300783721.html</ref> as it attempts " to improve lives through digital identity by creating a trustmark for digital identity technologies that meet ID2020's technical requirements. The Certification Mark gives companies developing digital identity technologies in line with ID2020's core principles of portability, persistence, privacy, and user-control a way to demonstrate their commitment to "good" digital identity in the market, incentivizing a race to the top. It draws inspirations from efforts like the Trustable Tech Mark to develop a "badge of honor" for companies and organizations designing technology with user privacy and rights top-of-mind."
 +
 +
===Terminologies===
 +
Several efforts are underway to collect the terms that are used in privacy standards, regulation and documentations.
 +
* [https://www.w3.org/ns/dpv W3C Data Privacy Vocabulary] is a community (non-standards) group in the W3C collecting other sources. Preliminary draft (V0.1) on 2019-07-26.
  
 
==Problems==
 
==Problems==
*[[Privacy]] has no real basis in history or law before the Warren and Brandeis article<ref name="Warren"></ref> in 1890 as it does not exist in the tribal societies which predated civilizations nor in the autocracies that dominated until the enlightenment of the mid 1800s when access to the posting of private mail became available to every citizen in the developed countries of the world. Since Hebb's experiments starting in 1951 we have known exactly how complete isolation can dive anyone into insanity,<ref>Michael Mechanic, ''What Extreme Isolation Does to Your Mind''. (2012-10-18) Mother Jones https://www.motherjones.com/politics/2012/10/donald-o-hebb-effects-extreme-isolation/</ref> so extreme [[Privacy]] should not be considered to be healthy, even if it were possible. Nor can [[Privacy]] be considered an absolute right since we also want to support the state in bringing malefactors to justice. It will most likely be many years before we learn to strike the right balance, particularly in view of the many other changes still underway is social structures.
+
*[[Privacy]] has no real basis in history or law before the Warren and Brandeis article<ref name="Warren"></ref> in 1890 as it does not exist in the tribal societies which predated civilizations nor in the autocracies that dominated until the enlightenment of the mid 1800s when access to the posting of private mail became available to every citizen in the developed countries of the world. Since Hebb's experiments starting in 1951 we have known exactly how complete isolation can dive anyone into insanity,<ref>Michael Mechanic, ''What Extreme Isolation Does to Your Mind''. (2012-10-18) Mother Jones https://www.motherjones.com/politics/2012/10/donald-o-hebb-effects-extreme-isolation/</ref> so extreme [[Privacy]] should not be considered to be healthy, even if it were possible. Nor can [[Privacy]] be considered an absolute right since we also want to support the state in bringing malefactors to justice. It will most likely be many years before we learn to strike the right balance, particularly in view of the many other changes still underway in social structures.
 
*[[User]]s or [[Consumer]]s have always been a real asset to any business and access that provides user attention (aka eyeballs) to a message is now a commodity to be bought and sold on the internet.
 
*[[User]]s or [[Consumer]]s have always been a real asset to any business and access that provides user attention (aka eyeballs) to a message is now a commodity to be bought and sold on the internet.
 
*The great amount of attention currently focused on [[Privacy]] is having the unfortunate effect of accretion of unrelated concerns which are not related to the right to be let alone.<ref> Natasha Singer, ''Just Don't Call it Privacy.'' (2018-09-23) New York Times p. SR 4</ref> The following are some of the topics listed by the New York Times as a part of that accretion to the term: (1) employers use Facebook s' advertising platform to show certain job ads only to men, to young folk, or to any other category selected by the advertiser, (2) Google collects the where-abouts of its users - even after they deliberately turn off location history, (3) AT&T shares its mobile customers' locations with data brokers. Regardless of whether these behaviors are good are bad, these are social not privacy issues.
 
*The great amount of attention currently focused on [[Privacy]] is having the unfortunate effect of accretion of unrelated concerns which are not related to the right to be let alone.<ref> Natasha Singer, ''Just Don't Call it Privacy.'' (2018-09-23) New York Times p. SR 4</ref> The following are some of the topics listed by the New York Times as a part of that accretion to the term: (1) employers use Facebook s' advertising platform to show certain job ads only to men, to young folk, or to any other category selected by the advertiser, (2) Google collects the where-abouts of its users - even after they deliberately turn off location history, (3) AT&T shares its mobile customers' locations with data brokers. Regardless of whether these behaviors are good are bad, these are social not privacy issues.
 
*Technology, and social media in particular,<ref>Sarah Igo, ''The Known Citizen: A History of Privacy in Modern America'' 2018 ISBN 978-0674737501</ref> record nearly every transaction that we make, and can retrieve it for any purpose not explicitly disallowed by regulation. The amount of information that Facebook has accumulated about people is far more than most people understand.<ref>Brian X. Chen https://www.nytimes.com/2018/04/11/technology/personaltech/i-downloaded-the-information-that-facebook-has-on-me-yikes.html</ref> The constantly evolving problem is to keep the laws protecting citizens from depredations by large organization up-to-date in the face of rapidly accelerating change.
 
*Technology, and social media in particular,<ref>Sarah Igo, ''The Known Citizen: A History of Privacy in Modern America'' 2018 ISBN 978-0674737501</ref> record nearly every transaction that we make, and can retrieve it for any purpose not explicitly disallowed by regulation. The amount of information that Facebook has accumulated about people is far more than most people understand.<ref>Brian X. Chen https://www.nytimes.com/2018/04/11/technology/personaltech/i-downloaded-the-information-that-facebook-has-on-me-yikes.html</ref> The constantly evolving problem is to keep the laws protecting citizens from depredations by large organization up-to-date in the face of rapidly accelerating change.
 
*See the page [[Identity Theft]] for financial issues created by release of [[User Private Information]].
 
*See the page [[Identity Theft]] for financial issues created by release of [[User Private Information]].
 +
*See the page [[Privacy Risk]] for more details on how an [[Enterprise]] could mitigate risks associated with holding [[User Private Information]].
  
 
==Solutions==
 
==Solutions==
The number of governments that have proposed "Solutions" to the invasions of "The Right to Privacy"<ref name="Warren" /> is large<ref>https://en.wikipedia.org/wiki/Privacy#Privacy_law</ref>, but the results are meager and most law enforcement agencies are often in court trying to use any loop-hole to strip away privacy even where products have been specifically designed to maintain privacy.<ref>Jack Nicas ''Apple to Close iPhone Security Hole That Law Enforcement Uses to Crack Devices'' https://www.nytimes.com/2018/06/13/technology/apple-iphone-police.html</ref> The same laws that protect privacy also protect criminal behavior. Not that privacy laws always make sense; US federal law prohibits the National Tracing Center from using a searchable data base to identify the owners of guns seized at crime scenes. No privacy advocate has yet recommended that law be repealed.
+
The number of governments that have proposed "Solutions" to the invasions of "The Right to Privacy"<ref name="Warren" /> is large<ref>https://en.wikipedia.org/wiki/Privacy#Privacy_law</ref>, but the results are meager and most law enforcement agencies are often in court trying to use any loop-hole to strip away privacy; especially in cases where products have been specifically designed to maintain privacy.<ref>Jack Nicas ''Apple to Close iPhone Security Hole That Law Enforcement Uses to Crack Devices'' https://www.nytimes.com/2018/06/13/technology/apple-iphone-police.html</ref> The same laws that protect privacy also protect criminal behavior. Not that privacy laws always make sense; US federal law prohibits the National Tracing Center from using a searchable data base to identify the owners of guns seized at crime scenes. No privacy advocate has yet recommended that law be repealed.
 +
 
 +
The solutions shown below are basically targeted to user's rights, privacy figures in most of these, but the connection is often a stretch. It might be appropriate at this time change the name of the topic "privacy" to "user rights".
  
 
===Technology Solutions===
 
===Technology Solutions===
 
[[Privacy Enhancing Technology Provider]]s have been proposed and are actively available from Microsoft and IBM. Their uptake has been negligible because of two factors: they are clumsy for users and they don't provide much privacy. The real problem facing users today is how to stop digital agents from using your information once they acquire it. The [[GDPR]] is designed to control the movement of users private data from one enterprise to another. The State of California now has a initiative scheduled for ballot that focuses more on places where your data exits. But neither of them addresses the problem of your data in some third world country, or island nation, from misuse. In some ways the [[GDPR is a scam]] in that it is more about penalizing corporations in California for the benefit of bureaucrats in Europe than helping with existing loss of privacy.
 
[[Privacy Enhancing Technology Provider]]s have been proposed and are actively available from Microsoft and IBM. Their uptake has been negligible because of two factors: they are clumsy for users and they don't provide much privacy. The real problem facing users today is how to stop digital agents from using your information once they acquire it. The [[GDPR]] is designed to control the movement of users private data from one enterprise to another. The State of California now has a initiative scheduled for ballot that focuses more on places where your data exits. But neither of them addresses the problem of your data in some third world country, or island nation, from misuse. In some ways the [[GDPR is a scam]] in that it is more about penalizing corporations in California for the benefit of bureaucrats in Europe than helping with existing loss of privacy.
 +
 +
===The Right to be Let Alone===
 +
Most of the legislation and press is actually about [[Information Sharing]] which is not the original Warren and Brandeis definition. User attention is actually what advertisers want, [[Information Sharing]] just helps the advertiser to target the audience. [[Ad Blockers]] do address user attention as does [[Native App Privacy]] with focuses on apps that may demand user attention by sending notification messages to the screen at any time they wish. Fortunately the [[Smart Phone]] operating systems all allow fine grained user control of notifications from apps. But this is one area that receive little attention until an article from MIT<ref>Rob Matheson, ''The privacy risks of compiling mobility data.'' (2018-12-07) MIT News Office  http://news.mit.edu/2018/privacy-risks-mobility-data-1207</ref> that describes the de-anonymization of location data which is sold to companies that want to see where traffic patterns concentrate. It turns out that if I know where you go, I can figure out who you are.
  
 
===Personal Recommendations===
 
===Personal Recommendations===
 
Like many people, there is a tendency for [[Enterprise]]s to try to project their own failures elsewhere and proclaim their own innocence. Privacy concerns are just another case where they try to blame the user for not solving the problem. Here are some ideas that [[User]]s can take to protect their privacy, not that it should be their obligations, but because [[Web Site]]s continue to be so poor at helping. Some of the ideas come from the past president of the Direct marketing Association.<ref>Linda Woolley, Letter to the Editor. (2018-09-02) New York Times Magazine p. 7</ref> who seems to think that any solution "has to start with consumers". Other commentators are more forceful like Ellen Pad's article in Wired<ref>Ellen Pad, ''Let's Stop Pretending Facebook and Twitter's CEOs Can't Fix This Mess.'' (2018-08-28) https://www.wired.com/story/ellen-pao-facebook-twitter-ceos-can-fix-abuse-mark-zuckerberg-jack-dorsey </ref> who "thinks they don’t care about their users and how their platforms work to harm many, and so they don’t bother to understand the interactions and amplification that result. They’ve been trained to not care." In any case you are the only person who really cares about your privacy.
 
Like many people, there is a tendency for [[Enterprise]]s to try to project their own failures elsewhere and proclaim their own innocence. Privacy concerns are just another case where they try to blame the user for not solving the problem. Here are some ideas that [[User]]s can take to protect their privacy, not that it should be their obligations, but because [[Web Site]]s continue to be so poor at helping. Some of the ideas come from the past president of the Direct marketing Association.<ref>Linda Woolley, Letter to the Editor. (2018-09-02) New York Times Magazine p. 7</ref> who seems to think that any solution "has to start with consumers". Other commentators are more forceful like Ellen Pad's article in Wired<ref>Ellen Pad, ''Let's Stop Pretending Facebook and Twitter's CEOs Can't Fix This Mess.'' (2018-08-28) https://www.wired.com/story/ellen-pao-facebook-twitter-ceos-can-fix-abuse-mark-zuckerberg-jack-dorsey </ref> who "thinks they don’t care about their users and how their platforms work to harm many, and so they don’t bother to understand the interactions and amplification that result. They’ve been trained to not care." In any case you are the only person who really cares about your privacy.
* Don't use Facebook to buy things. As a part of their effort to stop "Fake Users" Facebook will abruptly terminate accounts, so any place you use a Facebook sign-in might suddenly become unavailable.
+
* Don't use Facebook to buy things. As a part of their effort to stop "[[Fake Identifier]]s" Facebook will abruptly terminate accounts, so any place you use a Facebook sign-in might suddenly become unavailable.
* Don't stay logged into [[Web Site]]s like Facebook that track your every move.
+
* Don't stay logged into [[Web Site]]s like Google Maps or Facebook that track your every move.
 
* Don't take surveys or tell [[Web Site]]s about your preferences. The pollster may be selling your options to those who want to market to you.
 
* Don't take surveys or tell [[Web Site]]s about your preferences. The pollster may be selling your options to those who want to market to you.
 
* Run an "Ad blocker" that stops the ability of third party sites, present as ads on your screen, from loading, or from storing cookies on your device. This will also speed up your download times often by huge amounts.
 
* Run an "Ad blocker" that stops the ability of third party sites, present as ads on your screen, from loading, or from storing cookies on your device. This will also speed up your download times often by huge amounts.
Line 51: Line 65:
 
* Never click on a link or call a phone number that you cannot validate as legitimate, most especially in an email supposedly from "a friend" who may have provided access to their contacts lists.
 
* Never click on a link or call a phone number that you cannot validate as legitimate, most especially in an email supposedly from "a friend" who may have provided access to their contacts lists.
 
* Be kind to your fiends by never giving any but your trusted email app access to your contacts list.
 
* Be kind to your fiends by never giving any but your trusted email app access to your contacts list.
 +
The general slant of this section is that you should be part of the solution and not part of the problem. This is different than most recommendations for personal privacy which focus on the reader and not on society. The general problem of privacy erosion cannot be solved if we all focus on our own privacy rather than the social and economic systems that give rise to that erosion. Still, the advice in many of the articles is good, if not particularly forward looking. Some example in New York Times articles.<ref>Thorin Klosowski, ''How to Protect Your Digital Privacy'' New York Times (2019 undated)  https://www.nytimes.com/guides/privacy-project/how-to-protect-your-digital-privacy</ref><ref>David Progue, ''10 Tips to Avoid Leaving Tracks Around the Internet'' New York Times (2019-10-14 print) p. B6 and (2019-10-08 internet) https://www.nytimes.com/2019/10/04/smarter-living/10-tips-internet-privacy-crowdwise.html?searchResultPosition=1</ref>
  
 
===International Regulations===
 
===International Regulations===
Line 65: Line 80:
 
* The Federal Trade Commission’s report on mobile privacy: Mobile Privacy Disclosures: [http://www.ftc.gov/os/2013/02/130201mobileprivacyreport.pdf Building Trust Through Transparency]
 
* The Federal Trade Commission’s report on mobile privacy: Mobile Privacy Disclosures: [http://www.ftc.gov/os/2013/02/130201mobileprivacyreport.pdf Building Trust Through Transparency]
 
* Legislation was signed by the president (2018-09-14) that does more to make your data your property by [https://www.nytimes.com/2018/09/14/your-money/credit-freeze-free.html forcing credit agencies to allow free control by the consumer.]
 
* Legislation was signed by the president (2018-09-14) that does more to make your data your property by [https://www.nytimes.com/2018/09/14/your-money/credit-freeze-free.html forcing credit agencies to allow free control by the consumer.]
 +
*National Telecommunications and Information Administration is conducting a [https://www.ntia.doc.gov/category/privacy comprehensive review] of the nexus between privacy policy and innovation in the Internet economy which is updated nearly every month.
 +
*NIST has updated the [https://www.nist.gov/news-events/news/2018/05/nist-updates-risk-management-framework-incorporate-privacy-considerations Risk Management Framework] to include privacy considerations (2018-05-11).
 +
*NIST has published [https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft draft 5 of the SP 800-53 publication] on ''Security and Privacy Controls for Information Systems and Organizations'' (2018-08) which nominally applies only to federal non-defense systems, but is often used in commercial systems as well.
 +
*NIST has started (2018-11-29) a year long effort to establish a [https://www.nist.gov/privacy-framework Privacy Framework].
  
 
===US State Regulations===
 
===US State Regulations===
Line 70: Line 89:
 
* [https://www.pingidentity.com/content/ping/en/company/blog/posts/2018/a-guide-to-navigating-the-california-consumer-privacy-act.html?mkt_tok=eyJpIjoiWXpZeFl6WXdNVFE0T1RNMyIsInQiOiJqdmZFOU1ITUo0ZGJXbjhVUGVSOTBsempZbnR0Qmd4cTQxWE1FMkhnMDY5N2k3SE9uakszWFBWRlViOVlUTDBZWmtyMjF3ZlZyMnN4M01ONnZIdHlHcjk2NmZXeFJUNyttNkZzaWh1WTZcL2pUUFE1ejFGdG5oMEZaYWN0dkRHc2oifQ%3D%3D PING published a review of the California legislation.]
 
* [https://www.pingidentity.com/content/ping/en/company/blog/posts/2018/a-guide-to-navigating-the-california-consumer-privacy-act.html?mkt_tok=eyJpIjoiWXpZeFl6WXdNVFE0T1RNMyIsInQiOiJqdmZFOU1ITUo0ZGJXbjhVUGVSOTBsempZbnR0Qmd4cTQxWE1FMkhnMDY5N2k3SE9uakszWFBWRlViOVlUTDBZWmtyMjF3ZlZyMnN4M01ONnZIdHlHcjk2NmZXeFJUNyttNkZzaWh1WTZcL2pUUFE1ejFGdG5oMEZaYWN0dkRHc2oifQ%3D%3D PING published a review of the California legislation.]
 
* The California State Attorney General’s recommendations for mobile privacy: [http://oag.ca.gov/sites/all/files/pdfs/privacy/privacy_on_the_go.pdf Privacy on the Go: Recommendations for the Mobile Ecosystem]
 
* The California State Attorney General’s recommendations for mobile privacy: [http://oag.ca.gov/sites/all/files/pdfs/privacy/privacy_on_the_go.pdf Privacy on the Go: Recommendations for the Mobile Ecosystem]
 +
* California state attorney general Xavier Becerra outlined on (2019-10-11)<ref>Lauren Feiner, ''California AG tells businesses like Facebook and Google how they must comply with the state’s new landmark privacy law'' CNBC (2019-10-11) https://www.cnbc.com/2019/10/11/california-attorney-general-outlines-rules-for-state-privacy-law-ccpa.html</ref>  what companies will have to do to comply with the state’s landmark privacy law, the California Consumer Protection Act (CCPA). The law will go into effect Jan. 1, 2020. The draft regulations instruction companies on how quickly they should respond to customer requests about their data and how they should verify customers requesting to see or delete their data
 +
 +
===User Rights===
 +
In general discussions about privacy are focused on the [[Privacy Risk]] experienced by data collections and their efforts to avoid legal liability. Here we try to focus on the rights that users have in the digital world.
 +
# [https://legal-dictionary.thefreedictionary.com/Privacy+rights Legal rights are discussed on this site.]
 +
# [http://www.un.org/en/universal-declaration-human-rights/index.html The Universal Declaration of Human Rights (UDHR)] states in article 12 - "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks."
 +
# While the UDHR has no legal basis in most countries, it is followed at one level or another in nearly all of them.
 +
====GDPR grants these rights====
 +
[https://www.wrighthassall.co.uk/knowledge/legal-articles/2017/11/21/gdpr-individuals-rights/ One legal firm] was bold enough to describe the GDPR in the following bullet points.
 +
*The right to be informed
 +
**You must provide data subjects with various pieces of information about the data processing activities you carry out.
 +
**This information is usually provided in a Privacy Notice or Privacy Statement.
 +
**The information must be:
 +
***concise, transparent, intelligible and easily accessible;
 +
***written in clear and plain language; and
 +
***free of charge.
 +
*The right of access
 +
**You must provide data subjects with:
 +
***confirmation their data is being processed;
 +
***access to their personal data; and
 +
***other supplementary information.
 +
**You must comply with any subject access request within one month of receipt.
 +
**You cannot charge a fee unless the request is “manifestly unfounded or excessive”.
 +
**Where you process a large quantity of information you can ask the data subject to specify the information they want access to.
 +
**You may refuse to comply with a subject access request where this is “manifestly unfounded or excessive”.
 +
*The right to rectification (called redress in this wiki)
 +
**Data subjects can have their personal data rectified if it is inaccurate or incomplete.
 +
**You must comply with any request to rectify within one month of receipt. This can be extended to 2 months where the request is complex.
 +
 +
==Conclusions==
 +
At the end of any discussion about privacy, the harsh fact emerges that for all people talk about privacy, they seem have little interest in doing anything to preserve it. Oliver Sacks had this to say<ref>Oliver Sacks ''The Machine Stops - The neurologist on steam engines, smartphones, and fearing the future.'' (2019-02-04) The New Yorker https://www.newyorker.com/magazine/2019/02/11/the-machine-stops</ref><blockquote>Everything is public now, potentially: one’s thoughts, one’s photos, one’s movements, one’s purchases. There is no privacy and apparently little desire for it in a world devoted to non-stop use of social media. Every minute, every second, has to be spent with one’s device clutched in one’s hand. Those trapped in this virtual world are never alone, never able to concentrate and appreciate in their own way, silently. They have given up, to a great extent, the amenities and achievements of civilization: solitude and leisure, the sanction to be oneself, truly absorbed, whether in contemplating a work of art, a scientific theory, a sunset, or the face of one’s beloved.</blockquote>
  
 
==References==
 
==References==
 
[[Category:Glossary]]
 
[[Category:Glossary]]
 
[[Category:Privacy]]
 
[[Category:Privacy]]
 +
[[Category:Article]]

Latest revision as of 09:05, 14 October 2019

Full Title or Meme

  1. Privacy is the right to be let alone as defined in the late 19th century. [1]
  2. Privacy more recently has come to mean the right to hide User Information.

Context

Everyone wants some privacy, but no one can explain that in a way that matches anyone else's desire for privacy. Privacy is associated with liberty, but also with privilege (private roads, private schools), with confidentiality (private conversations) with nonconformity, with dissent, with shame, with embarrassment, with the deviant, with the taboo, with subterfuge and concealment.[2]

In his dissent to a 1952 Supreme Court decision[3] Justice Douglas issued this stirring defense of the right to be let alone:

"If liberty is to flourish, government should never be allowed to force people to listen to any radio program. The right of privacy should include the right to pick and choose from competing entertainments, competing propaganda, competing political philosophies. If people are let alone in those choices, the right of privacy will pay dividends in character and integrity. The strength of our system is in the dignity, the resourcefulness, and the independence of our people. Our confidence is in their ability as individuals to make the wisest choice. That system cannot flourish if regimentation takes hold. The right of privacy, today violated, is a powerful deterrent to any one who would control men's minds."

The above statement seems to state that the people's character and integrity will be enhanced by the right to pick their own sources of information. There is ample reason to doubt that statement in light of the environment in 2018 where populist demagogues are again persuading people to vote against their own interests by manipulating news sources that appeal to the peoples' prurient interests. [4] But the statement does seem to clarify that privacy is about liberty, the right to do what you want with yourself, with your attention and with your belongings. The "right to be let alone" was codified by the US Supreme Court in in 1965.[5]

The privacy context that is most often discussed for computer systems is user's data protection rather than intrusions into a user's attention. Bill Gates put it this way:[6]

[At Microsoft we don't generally] distinguish among the types of data being collected - the kind of shoes you like to buy versus which diseases you're genetically predisposed to - or who is gathering it, or how they're using it. Your shopping history and our medical history aren't collected by the same people, protected by the same safeguards or used for the same purposes. Recognizing this distinction would [make our] discussions more enlightening.

But the subject of most interests to users is identity theft and unexpected (creepy is the word most often used) knowledge about what users have been viewing and how that impacts the messages that are targeted to a user. So the context reported in the technical press is typically more about a computer site's legal liability rather than the users' experience. In other words, the challenge understood by computer sites today is the user's rights, rather than the user's privacy expectations.

User and Web Site Acceptance for Privacy Seals

Back in 2000 the FTC had the following to say.[7] There is no evidence to-date that things have changed for the better.

The 2000 Survey also examined the extent to which industry's primary self-regulatory enforcement initiatives online privacy seal programs have been adopted. These programs, which require companies to implement certain fair information practices and monitor their Compliance, promise an efficient way to implement privacy protection. However, the 2000 Survey revealed that although the number of sites enrolled in these programs has increased over the past year, the seal programs have yet to establish a significant presence on the Web. The Survey found that less than one-tenth, or approximately 8%, of sites in the Random Sample, and 45% of sites in the Most Popular Group, display a privacy seal.

Still, hope springs eternal, the ID2020 Alliance folk have created a Certification Mark[8] as it attempts " to improve lives through digital identity by creating a trustmark for digital identity technologies that meet ID2020's technical requirements. The Certification Mark gives companies developing digital identity technologies in line with ID2020's core principles of portability, persistence, privacy, and user-control a way to demonstrate their commitment to "good" digital identity in the market, incentivizing a race to the top. It draws inspirations from efforts like the Trustable Tech Mark to develop a "badge of honor" for companies and organizations designing technology with user privacy and rights top-of-mind."

Terminologies

Several efforts are underway to collect the terms that are used in privacy standards, regulation and documentations.

  • W3C Data Privacy Vocabulary is a community (non-standards) group in the W3C collecting other sources. Preliminary draft (V0.1) on 2019-07-26.

Problems

  • Privacy has no real basis in history or law before the Warren and Brandeis article[1] in 1890 as it does not exist in the tribal societies which predated civilizations nor in the autocracies that dominated until the enlightenment of the mid 1800s when access to the posting of private mail became available to every citizen in the developed countries of the world. Since Hebb's experiments starting in 1951 we have known exactly how complete isolation can dive anyone into insanity,[9] so extreme Privacy should not be considered to be healthy, even if it were possible. Nor can Privacy be considered an absolute right since we also want to support the state in bringing malefactors to justice. It will most likely be many years before we learn to strike the right balance, particularly in view of the many other changes still underway in social structures.
  • Users or Consumers have always been a real asset to any business and access that provides user attention (aka eyeballs) to a message is now a commodity to be bought and sold on the internet.
  • The great amount of attention currently focused on Privacy is having the unfortunate effect of accretion of unrelated concerns which are not related to the right to be let alone.[10] The following are some of the topics listed by the New York Times as a part of that accretion to the term: (1) employers use Facebook s' advertising platform to show certain job ads only to men, to young folk, or to any other category selected by the advertiser, (2) Google collects the where-abouts of its users - even after they deliberately turn off location history, (3) AT&T shares its mobile customers' locations with data brokers. Regardless of whether these behaviors are good are bad, these are social not privacy issues.
  • Technology, and social media in particular,[11] record nearly every transaction that we make, and can retrieve it for any purpose not explicitly disallowed by regulation. The amount of information that Facebook has accumulated about people is far more than most people understand.[12] The constantly evolving problem is to keep the laws protecting citizens from depredations by large organization up-to-date in the face of rapidly accelerating change.
  • See the page Identity Theft for financial issues created by release of User Private Information.
  • See the page Privacy Risk for more details on how an Enterprise could mitigate risks associated with holding User Private Information.

Solutions

The number of governments that have proposed "Solutions" to the invasions of "The Right to Privacy"[1] is large[13], but the results are meager and most law enforcement agencies are often in court trying to use any loop-hole to strip away privacy; especially in cases where products have been specifically designed to maintain privacy.[14] The same laws that protect privacy also protect criminal behavior. Not that privacy laws always make sense; US federal law prohibits the National Tracing Center from using a searchable data base to identify the owners of guns seized at crime scenes. No privacy advocate has yet recommended that law be repealed.

The solutions shown below are basically targeted to user's rights, privacy figures in most of these, but the connection is often a stretch. It might be appropriate at this time change the name of the topic "privacy" to "user rights".

Technology Solutions

Privacy Enhancing Technology Providers have been proposed and are actively available from Microsoft and IBM. Their uptake has been negligible because of two factors: they are clumsy for users and they don't provide much privacy. The real problem facing users today is how to stop digital agents from using your information once they acquire it. The GDPR is designed to control the movement of users private data from one enterprise to another. The State of California now has a initiative scheduled for ballot that focuses more on places where your data exits. But neither of them addresses the problem of your data in some third world country, or island nation, from misuse. In some ways the GDPR is a scam in that it is more about penalizing corporations in California for the benefit of bureaucrats in Europe than helping with existing loss of privacy.

The Right to be Let Alone

Most of the legislation and press is actually about Information Sharing which is not the original Warren and Brandeis definition. User attention is actually what advertisers want, Information Sharing just helps the advertiser to target the audience. Ad Blockers do address user attention as does Native App Privacy with focuses on apps that may demand user attention by sending notification messages to the screen at any time they wish. Fortunately the Smart Phone operating systems all allow fine grained user control of notifications from apps. But this is one area that receive little attention until an article from MIT[15] that describes the de-anonymization of location data which is sold to companies that want to see where traffic patterns concentrate. It turns out that if I know where you go, I can figure out who you are.

Personal Recommendations

Like many people, there is a tendency for Enterprises to try to project their own failures elsewhere and proclaim their own innocence. Privacy concerns are just another case where they try to blame the user for not solving the problem. Here are some ideas that Users can take to protect their privacy, not that it should be their obligations, but because Web Sites continue to be so poor at helping. Some of the ideas come from the past president of the Direct marketing Association.[16] who seems to think that any solution "has to start with consumers". Other commentators are more forceful like Ellen Pad's article in Wired[17] who "thinks they don’t care about their users and how their platforms work to harm many, and so they don’t bother to understand the interactions and amplification that result. They’ve been trained to not care." In any case you are the only person who really cares about your privacy.

  • Don't use Facebook to buy things. As a part of their effort to stop "Fake Identifiers" Facebook will abruptly terminate accounts, so any place you use a Facebook sign-in might suddenly become unavailable.
  • Don't stay logged into Web Sites like Google Maps or Facebook that track your every move.
  • Don't take surveys or tell Web Sites about your preferences. The pollster may be selling your options to those who want to market to you.
  • Run an "Ad blocker" that stops the ability of third party sites, present as ads on your screen, from loading, or from storing cookies on your device. This will also speed up your download times often by huge amounts.
  • Help efforts like the citizen initiative[18] filed with the secretary of state in California to limit the sale of user data.[19] Did not even need to go to the ballot because the CA legislature acted first.
  • Pay attention to security and privacy notifications on your computer; often you will be able to "just say no".
  • Freeze your credit ratings as described on this site.
  • Never click on a link or call a phone number that you cannot validate as legitimate, most especially in an email supposedly from "a friend" who may have provided access to their contacts lists.
  • Be kind to your fiends by never giving any but your trusted email app access to your contacts list.

The general slant of this section is that you should be part of the solution and not part of the problem. This is different than most recommendations for personal privacy which focus on the reader and not on society. The general problem of privacy erosion cannot be solved if we all focus on our own privacy rather than the social and economic systems that give rise to that erosion. Still, the advice in many of the articles is good, if not particularly forward looking. Some example in New York Times articles.[20][21]

International Regulations

US Federal Regulations

  • ACM's U.S. Technology Policy Committee (USACM) this week (2018-07-02) submitted recommendations to the Senate Commerce Committee's Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security that focus on protecting personal privacy in the wake of the Facebook and Cambridge Analytica scandal. USACM urged Congress to immediately act to protect the public good and the integrity of the democratic process by addressing technical and ethical issues raised by the data breach. Specifically, USACM wants Congress to draft and adopt comprehensive personal privacy protection legislation extending beyond social media to meet nine critical goals, including limiting collection/minimizing retention of personal data; clarifying and simplifying User Consent processes and maximizing user control of data, and simplifying data-sharing policies and assuring data-flow Transparency. USACM chair Stuart Shapiro says the organization has significant expertise in the technical and ethical aspects of the case, and looks forward to serving as an apolitical resource for Congress in pursuit of solutions.[22]
  • The tech industry lobbying group "Information Technology Industry Council" is aggressively "lobbying officials of the Trump administration and else where to start outlining a federal privacy law." to "overrule the California law and instead put into place a kinder set of rules that would give the companies wide leeway over how personal digital information was handled."[23] According to reviews of their proposals[24] it seems that this group is trying to weaken the privacy laws in comparison to the ones in California or Europe.
  • HIPPA and COPPA offer legislative protections respectively to the sectors of Health Care patients and children under the age of 13.
  • The financial sector heavyweights have banded together with the law firm Venable and former NIST senior executive Jeremy Grant, to form the Better Identity Coalition" to focus (in their own words) "on developing and advancing consensus-driven, cross-sector policy solutions that promote the development and adoption of better solutions for identity verification and authentication." It seems like every sector wants to offer their own sector's version of a cross-sector solution.
  • The Federal Trade Commission’s report on mobile privacy: Mobile Privacy Disclosures: Building Trust Through Transparency
  • Legislation was signed by the president (2018-09-14) that does more to make your data your property by forcing credit agencies to allow free control by the consumer.
  • National Telecommunications and Information Administration is conducting a comprehensive review of the nexus between privacy policy and innovation in the Internet economy which is updated nearly every month.
  • NIST has updated the Risk Management Framework to include privacy considerations (2018-05-11).
  • NIST has published draft 5 of the SP 800-53 publication on Security and Privacy Controls for Information Systems and Organizations (2018-08) which nominally applies only to federal non-defense systems, but is often used in commercial systems as well.
  • NIST has started (2018-11-29) a year long effort to establish a Privacy Framework.

US State Regulations

  • First-in-the-nation consumer privacy rights are the law of the land in California![25] I guess they mean first among the 50 states.
  • PING published a review of the California legislation.
  • The California State Attorney General’s recommendations for mobile privacy: Privacy on the Go: Recommendations for the Mobile Ecosystem
  • California state attorney general Xavier Becerra outlined on (2019-10-11)[26] what companies will have to do to comply with the state’s landmark privacy law, the California Consumer Protection Act (CCPA). The law will go into effect Jan. 1, 2020. The draft regulations instruction companies on how quickly they should respond to customer requests about their data and how they should verify customers requesting to see or delete their data

User Rights

In general discussions about privacy are focused on the Privacy Risk experienced by data collections and their efforts to avoid legal liability. Here we try to focus on the rights that users have in the digital world.

  1. Legal rights are discussed on this site.
  2. The Universal Declaration of Human Rights (UDHR) states in article 12 - "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks."
  3. While the UDHR has no legal basis in most countries, it is followed at one level or another in nearly all of them.

GDPR grants these rights

One legal firm was bold enough to describe the GDPR in the following bullet points.

  • The right to be informed
    • You must provide data subjects with various pieces of information about the data processing activities you carry out.
    • This information is usually provided in a Privacy Notice or Privacy Statement.
    • The information must be:
      • concise, transparent, intelligible and easily accessible;
      • written in clear and plain language; and
      • free of charge.
  • The right of access
    • You must provide data subjects with:
      • confirmation their data is being processed;
      • access to their personal data; and
      • other supplementary information.
    • You must comply with any subject access request within one month of receipt.
    • You cannot charge a fee unless the request is “manifestly unfounded or excessive”.
    • Where you process a large quantity of information you can ask the data subject to specify the information they want access to.
    • You may refuse to comply with a subject access request where this is “manifestly unfounded or excessive”.
  • The right to rectification (called redress in this wiki)
    • Data subjects can have their personal data rectified if it is inaccurate or incomplete.
    • You must comply with any request to rectify within one month of receipt. This can be extended to 2 months where the request is complex.

Conclusions

At the end of any discussion about privacy, the harsh fact emerges that for all people talk about privacy, they seem have little interest in doing anything to preserve it. Oliver Sacks had this to say[27]
Everything is public now, potentially: one’s thoughts, one’s photos, one’s movements, one’s purchases. There is no privacy and apparently little desire for it in a world devoted to non-stop use of social media. Every minute, every second, has to be spent with one’s device clutched in one’s hand. Those trapped in this virtual world are never alone, never able to concentrate and appreciate in their own way, silently. They have given up, to a great extent, the amenities and achievements of civilization: solitude and leisure, the sanction to be oneself, truly absorbed, whether in contemplating a work of art, a scientific theory, a sunset, or the face of one’s beloved.

References

  1. 1.0 1.1 1.2 Warren and Brandeis The Right to Privacy (1890-12-15) Harvard Law Review http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
  2. Louis Menand Nowhere to Hide: Why Do We Care So Much About Privacy? The New Yorker June 18, 2018 https://www.newyorker.com/magazine/2018/06/18/why-do-we-care-so-much-about-privacy
  3. Justice Douglas (Descent), Public Utilities Comm'n v. Pollak, 343 U.S. 451 (1952) https://supreme.justia.com/cases/federal/us/343/451/case.html
  4. Eduardo Porter, Is the Populist Revolt Over? Not if Robots Have Their Way https://www.nytimes.com/2018/01/30/business/economy/populist-politics-globalization.html
  5. Justice Douglas 381 U.S. 479 Griswold v. Connecticut (No. 496) (1995-06-07) US Supreme Court https://www.law.cornell.edu/supremecourt/text/381/479
  6. Bill Gates, Thinking Big (2018-09-09) The New York Times Book Review p1. ff
  7. FTC PRIVACY ONLINE: FAIR INFORMATION PRACTICES IN THE ELECTRONIC MARKETPLACE A REPORT TO CONGRESS May 2000 https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission-report/privacy2000text.pdf
  8. ID2020 Alliance accelerates towards "good" digital identity through launch of Certification Mark and new Alliance member Cision News (2019-01-24) https://www.prnewswire.com/news-releases/id2020-alliance-accelerates-towards-good-digital-identity-through-launch-of-certification-mark-and-new-alliance-member-300783721.html
  9. Michael Mechanic, What Extreme Isolation Does to Your Mind. (2012-10-18) Mother Jones https://www.motherjones.com/politics/2012/10/donald-o-hebb-effects-extreme-isolation/
  10. Natasha Singer, Just Don't Call it Privacy. (2018-09-23) New York Times p. SR 4
  11. Sarah Igo, The Known Citizen: A History of Privacy in Modern America 2018 ISBN 978-0674737501
  12. Brian X. Chen https://www.nytimes.com/2018/04/11/technology/personaltech/i-downloaded-the-information-that-facebook-has-on-me-yikes.html
  13. https://en.wikipedia.org/wiki/Privacy#Privacy_law
  14. Jack Nicas Apple to Close iPhone Security Hole That Law Enforcement Uses to Crack Devices https://www.nytimes.com/2018/06/13/technology/apple-iphone-police.html
  15. Rob Matheson, The privacy risks of compiling mobility data. (2018-12-07) MIT News Office http://news.mit.edu/2018/privacy-risks-mobility-data-1207
  16. Linda Woolley, Letter to the Editor. (2018-09-02) New York Times Magazine p. 7
  17. Ellen Pad, Let's Stop Pretending Facebook and Twitter's CEOs Can't Fix This Mess. (2018-08-28) https://www.wired.com/story/ellen-pao-facebook-twitter-ceos-can-fix-abuse-mark-zuckerberg-jack-dorsey
  18. Mary Ross, Alastair Mactaggart, The Consumer Right to Privacy Act of 2018 https://oag.ca.gov/system/files/initiatives/pdfs/17-0039%20%28Consumer%20Privacy%20V2%29.pdf
  19. Daisuke Wakabayashi Silicon Valley Faces Regulatory Fight on Its Home Turf May 13, 2018 https://www.nytimes.com/2018/05/13/business/california-data-privacy-ballot-measure.html
  20. Thorin Klosowski, How to Protect Your Digital Privacy New York Times (2019 undated) https://www.nytimes.com/guides/privacy-project/how-to-protect-your-digital-privacy
  21. David Progue, 10 Tips to Avoid Leaving Tracks Around the Internet New York Times (2019-10-14 print) p. B6 and (2019-10-08 internet) https://www.nytimes.com/2019/10/04/smarter-living/10-tips-internet-privacy-crowdwise.html?searchResultPosition=1
  22. USACM Calls on Congress to Enact Comprehensive Consumer Privacy Protections (2018-07-02) https://www.acm.org/media-center/2018/july/media-advisory-us-tech-policy-ctte-letter-on-data-privacy
  23. Cecilia Kang, Pursuing Law on Privacy, With Caveats. (2018-08-27) New York Times p. B1,ff
  24. Bernadette Tansey, Tech Industry Lobby Proposes Data Privacy Laws; Critics Call Them Weak. (2018-10-22) Xconomy https://www.xconomy.com/san-francisco/2018/10/22/tech-industry-lobby-proposes-data-privacy-laws-critics-call-them-weak/
  25. CA Privacy Web Site https://www.caprivacy.org/
  26. Lauren Feiner, California AG tells businesses like Facebook and Google how they must comply with the state’s new landmark privacy law CNBC (2019-10-11) https://www.cnbc.com/2019/10/11/california-attorney-general-outlines-rules-for-state-privacy-law-ccpa.html
  27. Oliver Sacks The Machine Stops - The neurologist on steam engines, smartphones, and fearing the future. (2019-02-04) The New Yorker https://www.newyorker.com/magazine/2019/02/11/the-machine-stops