24
Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts Macro level – what kind of world do we want to live in

Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Relation between technology and privacy

• Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

• Macro level – what kind of world do we want to live in

Page 2: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Why do we care about privacy• Why do you care, or not, about

privacy?

• Why does society protect it, or not?

• Reflections from what we’ve read this semester?

Page 3: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

What does it protect?

• Literally?

• Figuratively?

Page 4: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

What sort of right or interest is it?

• Is it an end or a means? Or both?

• What happens without it? – How do you know?

• What values is it in tension with?– How do you harmonize or balance?

• How does technology challenge conceptions of privacy?

Page 5: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Scope of 4th A Protection

• The 4th Amendment:– The right of the people to be secure in their

persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but on probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the person or things to be seized.

Page 6: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Scope of 4th A ProtectionKatz v. U.S. 389 U. S. 347, 353 (1967).• “the Fourth Amendment protects people—and not

simply ‘areas’…the reach of that Amendment cannot turn upon the presence or absence of a physical intrusion into any given enclosure.”

• Test– You must have an actual, subjective expectation of

privacy.

– It must be an expectation that is objectively reasonable (“one society is prepared to recognize as ‘reasonable’”-- 389 U. S. 347, 361 (Justice Harlan concurring)).

Page 7: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Scope of 4th A Protection• Smith vs. Maryland, 1979

– individuals have no legitimate expectation of privacy in the phone numbers they dial, and therefore the installation of a technical device (a pen register) that captured such numbers on the phone company's property did not constitute a search.

• United States v. Miller– records of an individual's financial transactions held by

his bank were outside the protection of the Fourth Amendment

Page 8: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Basis for narrowing Protection

• Assumption of the risk– “takes the risk, in revealing his affairs to

another, that the information will be conveyed by that person to the Government”

• Voluntary nature of the disclosure– “a person has no legitimate expectation of

privacy in information he voluntarily turns over to third parties”

Page 9: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

"It would be foolish to contend that the degree of privacy secured to citizens by the 4th A has been entirely unaffected by the advance of technology...the question we confront today is what limits there are upon this power of technology to shrink the realm of guaranteed privacy."

Page 10: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Status Quo, Technology, & Law

“reasonable expectation of privacy”Dog sniff Aerial photography Thermal imaging

expectations

capa

bilit

ylegal rules

Page 11: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

data in networks?

• The interception of communications, transactional data during transmission.

• The acquisition of stored communications and transactional data.

Page 12: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

ECPA (SCA + amendments to Title III)

The Electronic Communications Privacy Act defined two types of ISPs:

• Electronic Communications Service to the extent you permit users to communicate with each other

• Remote Computing Service to the extent you permit users to store communications or other information

Page 13: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Kinds of Data

• Basic Subscriber Information (name, address, equipment identifier such as temporary IP address, and means and source of payment)

• Other non-content Information (clickstream, location)

• Wiretap, Pen Register or Trap and Trace

• Content - Real Time and Stored

Page 14: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Legal Standards• Basic Subscriber Information: Subpoena or

better (Gov’t may not use civil subpoena)• Other Information: 2703(d) order or better• Dialed digits: Pen Register or better• Real Time Content: Title III order• Stored Content < 180 days: search warrant• Stored Content > 180 days: subpoena or

better• Opened v. Unopened -- ct doesn’t matter;

doj says once opened no warrant required

Page 15: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

1 Home Energy Use (Pot diaries)

• Story of Starkweather“The public awareness that such records are routinely maintained…negate[s] any consistutaionally sufficient expectation of privacy…”

• Story of Kyllo"We think that obtaining by sense-enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical intrusion into a constitutionally protected area constitutes a search -- at least where (as here) the technology in question is not in general public use. This assures preservation of that degree of privacy against government that existed when the 4th A was adopted."

• Story of Caballes“Well trained narcotics detection dog, one that does not expose noncontraband items that otherwise would remain hidden from public view during a lawful traffic stop generaly does not implicate legitimate privacy interests.”

Page 16: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

1 DistinctionsIs it sensed or recorded?

• Activity that generates records held by others

• Activity that is imperceptible without trespass

• Activity that can be perceived (sensed) from outside, “Plain view”

• Activity that is rendered perceptible by technology

Where is the activity taking place?

• home v. public street?

What is sensed?

• Just illegal activity, contraband?

• Mix of legal and illegal activities?

Page 17: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

1 Lessons

• A little recording can mean a lot

• Location matters (people, activity, data)

• Use of well trained technologies (precise and accurate)– low false positives – outside the 4th A because they are not searches, at least in some instances

• Police only technology is unreasonable invasion, readily available technology maybe not

Page 18: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

2 Cameras in Public Places

• Value of public places– Community, speech, protest, public life

• “No Privacy in Public” – – You see me, I see you (reciprocity)– Police need not avert eyes– As much privacy as the space affords– Bounded by space, time, presence

Page 19: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

2 Ubiquitous image collection

• I see you, you cannot see me

• Police virtually present all the time

• Porous unknowable public “space”

• Permanence

• Aggregation

• Who, when, where of observation change

• Inability to engage in self help

Page 20: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

2 Responses

• Legislated click

• Bans on camera phones in some places (you may see me but you can’t prove that you saw me)

• Upskirt laws

• Barak Obama privacy zone

• HP anti paparazzi patents

Page 21: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

“…how, when, and at what level does privacy matter?”

• Importance of legal context as well as social context

• Expectations of privacy are shaped by what is technically possible, technical possibility in turn informs courts’ analysis of reasonableness

• Court makes distinctions that may not relate to normative understandings -- careful where this happens

Page 22: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Value Driven Architecture

• Architectural choices constrain policy

• Policy choices if considered in architectural design can be “hardened”

• Need to identify policy goals – privacy, security, other – in order to engage in iterative process during design phase

• Must understand stakeholder needs, technology, law, and have clear objectives

Page 23: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

Value Driven Architecture

• Architectural choices constrain policy

• Policy choices if considered in architectural design can be “hardened”

• Need to identify policy goals – privacy, security, other – in order to engage in iterative process during design phase

• Must understand stakeholder needs, technology, law, and have clear objectives

Page 24: Relation between technology and privacy Micro level – focus on empowering individuals – information and tools to effectuate privacy in various contexts

The last word…

Reserved judgment as to how much technological enhancement of ordinary perception, from such a vantage point (public street) if any is too much.