74
1 Social Distortion: Privacy, Consent, and Social Networks H. Brian Holland Visiting Associate Professor of Law Dickinson School of Law at Penn State University

Social Distortion: Privacy, Consent, and Social Networks

Embed Size (px)

DESCRIPTION

Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl

Citation preview

Page 1: Social Distortion: Privacy, Consent, and Social Networks

1

Social Distortion:Privacy, Consent, and Social NetworksH. Brian HollandVisiting Associate Professor of LawDickinson School of Law at Penn State University

Page 2: Social Distortion: Privacy, Consent, and Social Networks

2

Not talking about covert surveillance

Not talking about the government

but rather

Voluntary disclosure of personal information

to private institutions

Page 3: Social Distortion: Privacy, Consent, and Social Networks

3

1. The current market for personal informationThe privacy paradoxDistortions in the market

2. Social network sites: Market distortions on steroids

Changes to the information-exchange agreement

Social phenomena driving disclosure

3. Why most proposed legal solutions will not work

4. What will work

Page 4: Social Distortion: Privacy, Consent, and Social Networks

4

The Paradox of the Privacy “Market”

Page 5: Social Distortion: Privacy, Consent, and Social Networks

5

We say one thing.I want my privacy.

We do something else.Here’s my data. Take what you want.

(just give me my stuff)

Page 6: Social Distortion: Privacy, Consent, and Social Networks

6

Examples

Page 7: Social Distortion: Privacy, Consent, and Social Networks

7

The claim

43% of online users claim that they are likely to read the privacy policy

of an ecommerce sitebefore buying anything

Page 8: Social Distortion: Privacy, Consent, and Social Networks

8

The reality

26% actually consulted the privacy policy

Even more odd,essentially no difference between

privacy fundamentalists, pragmatists, or the unconcerned

Page 9: Social Distortion: Privacy, Consent, and Social Networks

9

The claim

71% want to control who can access their personal information

Page 10: Social Distortion: Privacy, Consent, and Social Networks

10

The reality

~ 75% have supplied

first namelast name

emailstreet address

~ 50% have supplied

phone numberbirthday

credit card information

(to e-commerce sites)

Page 11: Social Distortion: Privacy, Consent, and Social Networks

11

Why the paradoxbetween professed attitude

and actual behavior?

Page 12: Social Distortion: Privacy, Consent, and Social Networks

12

Blame it on the market

and the law of the market

Page 13: Social Distortion: Privacy, Consent, and Social Networks

13

Starting point

The current market for

transferring personal information

(1) revelation (mere disclosure)

(2) consent – express or implied

Page 14: Social Distortion: Privacy, Consent, and Social Networks

14

Any regulation?

some targeted limits on:

extremely invasive collection and use(privacy torts)

certain kinds of data(e.g. health records)

certain subjects of data(e.g. kids)

Page 15: Social Distortion: Privacy, Consent, and Social Networks

15

But most data can be collected or given away very cheaply.

So, why do we consent so easily?

3 points

Page 16: Social Distortion: Privacy, Consent, and Social Networks

16

Lack of legal control over data

No property rights in personal data

Lack of bargaining power

Inability to control downstream rights

1

Page 17: Social Distortion: Privacy, Consent, and Social Networks

17

The decline of consent contracting

Contracts as standardized commodities

Contracts as part of the product

2

Page 18: Social Distortion: Privacy, Consent, and Social Networks

18

Market distortions(behavioral economics)

Incomplete or asymmetric information

Bounded rationality

Systemic psychological deviations from rationality

3

Page 19: Social Distortion: Privacy, Consent, and Social Networks

19

Creates artificially low prices

for personal information

consent is cheap

Page 20: Social Distortion: Privacy, Consent, and Social Networks

20

Personal information as a commodity.

Page 21: Social Distortion: Privacy, Consent, and Social Networks

21

Social Network Sites

Market distortions

on steroids.

Page 22: Social Distortion: Privacy, Consent, and Social Networks

22

A social-tools model of production

An effective tool of coordination

A plausible promise(the basic “why” to join or contribute)

An acceptable bargain with users

Page 23: Social Distortion: Privacy, Consent, and Social Networks

23

But is it a bad bargain for users?

Capturing users’ personal information

Privacy 1.0 – Centralized data collection, storage and aggregation

Privacy 2.0 – Peers as both sensors and producers

Owning user’s personal information(storage, use, transfer)

Page 24: Social Distortion: Privacy, Consent, and Social Networks

24

Why consent to a bad bargain?

What do users get?

Page 25: Social Distortion: Privacy, Consent, and Social Networks

25

New and powerful market distortions

Page 26: Social Distortion: Privacy, Consent, and Social Networks

26

Two integrated points

Social network sites are …

(1) Altering the basic structure of the information exchange agreement

(2) Benefiting from certain social phenomena that are driving us to join the network and

to disclose a lot of personal information

Page 27: Social Distortion: Privacy, Consent, and Social Networks

27

The structure of the

information-exchange agreement

consent recedes into the background

First point

Page 28: Social Distortion: Privacy, Consent, and Social Networks

28

The classic e-commerce model

Money

Personal information associated with delivery of current goods or services and the provision of future goods or services

Merchandise

Services

Database

??

??

??

Page 29: Social Distortion: Privacy, Consent, and Social Networks

29

The g-mail model

Initial negotiation and transaction

(looks like the ecommerce model)

A little bit of personal

information

In exchange for services

Page 30: Social Distortion: Privacy, Consent, and Social Networks

30

The g-mail model

Lots of personal information

Subsequent negotiations and transactions for the exchange of personal information

between contacts

Page 31: Social Distortion: Privacy, Consent, and Social Networks

31

The g-mail model

Lots of personal information

Lots o

f perso

nal in

form

atio

n

Not holding?Not passing on?

Ads

Gmail recedes into the background, almost as a third-

party beneficiary of these subsequent transactions (info exchange) between contacts

Page 32: Social Distortion: Privacy, Consent, and Social Networks

32

The Social Network Site model

A little bit of personal

information

In exchange for services

Page 33: Social Distortion: Privacy, Consent, and Social Networks

33

The Social Network Site model

Lots of personal

information

Lots o

f perso

nal in

form

atio

n

A little bit of personal

information

In exchange for services

Page 34: Social Distortion: Privacy, Consent, and Social Networks

34

The Social Network Site model

A little bit of personal

information

In exchange for services

Lots of personal

information

Lots o

f perso

nal in

form

atio

n

Lots and lots and lots and lots of personal information

In exchange for ???

Page 35: Social Distortion: Privacy, Consent, and Social Networks

35

The Social Network Site model

A little bit of personal

information

In exchange for services

Lots of personal

information

Lots o

f perso

nal in

form

atio

n

Lots and lots and lots and lots of personal information

In exchange for ???

Database

??

??

??

Ads

Ads

Ads

Page 36: Social Distortion: Privacy, Consent, and Social Networks

36

Certain social phenomena

Driving us to join the network

and

Driving us to disclose a lot of personal information

Second point

Page 37: Social Distortion: Privacy, Consent, and Social Networks

37

Social phenomena

(a) The evolution of social organizationtoward social networks and networked individualism

(b) Online identity performanceassertions of digital identity

processes of identity formation

Page 38: Social Distortion: Privacy, Consent, and Social Networks

38

Glocalized Relationships

NetworkedIndividualismBounded

Groups

(a) The evolution of social organization(from little boxes to social networks)

neighborhoods householdsworkplaces

??

Page 39: Social Distortion: Privacy, Consent, and Social Networks

39

Networked individualismRelationship unhinged from location

Person-to-person connectivity(replacing place-to-place)

Facilitating larger, more fragmented networks

Page 40: Social Distortion: Privacy, Consent, and Social Networks

40

Using technology to manage intimacy

in larger, more fragmented social networks

The email example

Asynchronous

Flexible

Control

Contact with multiple people

Page 41: Social Distortion: Privacy, Consent, and Social Networks

41

Social network sites

Flexible, asynchronous communication

+

Leveraging our need to build and maintain relationships

Page 42: Social Distortion: Privacy, Consent, and Social Networks

42

Need for community

Need to remain connected

Need to retain and createcommon experience

Need to engagepeer opinion and build reputation

Page 43: Social Distortion: Privacy, Consent, and Social Networks

43

Personal informationis at the heart of relationship

This is how we

create intimacy

Page 44: Social Distortion: Privacy, Consent, and Social Networks

44

Not basic identifiers or contact information

Truly personal information

Expressions of Self

Preferences

Graphic representations

Affiliations

Acts and activities

Sexuality

Identity

Page 45: Social Distortion: Privacy, Consent, and Social Networks

45

(b) Online identity performance

Assertions of digital identity(all users)

Process of identity formation

(younger users)

Page 46: Social Distortion: Privacy, Consent, and Social Networks

46

Assertions of digital identity

(all users)

Traditional identity cluesare not available

Page 47: Social Distortion: Privacy, Consent, and Social Networks

47

So we

compensate

Other clues

More information

More communication time

Using networks to triangulate and authenticate(to overcome ease of manipulation)

Page 48: Social Distortion: Privacy, Consent, and Social Networks

48

Process of identity formation

(younger users)

Using digital space to …

Work out identity and status

Make sense of cultural clues and societal norms

Negotiate public life

Page 49: Social Distortion: Privacy, Consent, and Social Networks

49

Part of this is

taking risks

Putting yourself out there

Pushing boundaries

Gauging reactions

What is acceptable and what is not?

Page 50: Social Distortion: Privacy, Consent, and Social Networks

50

Just as with intimate relationships

Personal information

is at the heart of

identity performance

Page 51: Social Distortion: Privacy, Consent, and Social Networks

51

Acts of articulation

Text

Images

Audio

Video

Developing a virtual presence or identity.

Page 52: Social Distortion: Privacy, Consent, and Social Networks

52

and social networks get it all

A little bit of personal

information

In exchange for services

Lots of personal

information

Lots o

f perso

nal in

form

atio

n

Lots and lots and lots and lots of personal information

In exchange for ???

Database

??

??

??

Page 53: Social Distortion: Privacy, Consent, and Social Networks

53

Terms of Service and Privacy Policies

* highlights *

Page 54: Social Distortion: Privacy, Consent, and Social Networks

54

Page 55: Social Distortion: Privacy, Consent, and Social Networks

55

Page 56: Social Distortion: Privacy, Consent, and Social Networks

56

Page 57: Social Distortion: Privacy, Consent, and Social Networks

57

Page 58: Social Distortion: Privacy, Consent, and Social Networks

58

And users consent to all of this …

Page 59: Social Distortion: Privacy, Consent, and Social Networks

59

So, what’s my point?

Page 60: Social Distortion: Privacy, Consent, and Social Networks

60

It’s not just immature and irresponsible kids

Just say “no”

Would you want your grandmother

to read it!

Would you post it in Times Square?

Page 61: Social Distortion: Privacy, Consent, and Social Networks

61

There are real, concrete reasons for posting so much personal information.

They won’t simply “grow out of it”

Page 62: Social Distortion: Privacy, Consent, and Social Networks

62

Proposed legal solutions?

1. Targeting market distortionsincreased salience

propertization

2. Altering the terms of consentcontract reform / limitations on consent

opt-in vs. opt-out

3. Expanding rights and regulationconsumer fraud regulations

tort liability

Page 63: Social Distortion: Privacy, Consent, and Social Networks

63

Why they won’t work

Page 64: Social Distortion: Privacy, Consent, and Social Networks

64

Proposed legal solutions?

1. Targeting market distortionsincreased salience

propertization

2. Altering the terms of consentcontract reform / limitations on consent

opt-in vs. opt-out

3. Expanding rights and regulationconsumer fraud regulations

tort liability

Ineffective at altering the decision to provide consent

Page 65: Social Distortion: Privacy, Consent, and Social Networks

65

Proposed legal solutions?

1. Targeting market distortionsincreased salience

propertization

2. Altering the terms of consentcontract reform / limitations on consent

opt-in vs. opt-out

3. Expanding rights and regulationconsumer fraud regulations

tort liability

Focus on the wrong problem: misuse rather than consent

Page 66: Social Distortion: Privacy, Consent, and Social Networks

66

“If a person consents to most of these activities,

there is no privacy violation.”

Daniel J. SoloveA Taxonomy of Privacy

Page 67: Social Distortion: Privacy, Consent, and Social Networks

67

Proposed legal solutions?

1. Targeting market distortionsincreased salience

propertization

2. Altering the terms of consentcontract reform / limitations on consent

opt-in vs. opt-out

3. Expanding rights and regulationconsumer fraud regulations

tort liability

Interference with autonomy &Negative impact on

functionality

Page 68: Social Distortion: Privacy, Consent, and Social Networks

68

What will work?

Page 69: Social Distortion: Privacy, Consent, and Social Networks

69

Goal

Regulate privacy

and

Preserve the benefits of new social spaces(functionality)

Page 70: Social Distortion: Privacy, Consent, and Social Networks

70

Is it really a problem?

How much of a problem is it?

What do users really want?

Page 71: Social Distortion: Privacy, Consent, and Social Networks

71

Focus

Emerging social norms of

“network” privacy

Page 72: Social Distortion: Privacy, Consent, and Social Networks

72

Regulating data-flow between networks

Architecture/DesignUser-controlled partitions

TechnologyTagging data

Contextual data

LawRestrictions on downstream use and transfer

Restrictions on network-crossing

Data portability

Page 73: Social Distortion: Privacy, Consent, and Social Networks

73

Regulating data-use within networks

The market is more likely to workThe “Beacon” example

Strengthened by portability

Social norms will develop

Page 74: Social Distortion: Privacy, Consent, and Social Networks

74

Thank you.