Page 16 - Privacy in a Cyber Age Policy and Practice
P. 16

1


            A Cyber Age Privacy Doctrine








                                  A. Introduction

                                  1. Focus on Use

           A privacy doctrine built for the cyber age must address a radical change
           in the type and scale of violations that the nation—and the world—face,
           namely that the greatest threats to privacy come not at the point that
           personal information is collected, but rather from the secondary uses of
           such information. Court cases such as Katz, Berger, Smith, Karo, Knotts,
           Kyllo—and most recently Jones—concern whether the initial collection of
           information was legal. They do not address the fact that legally obtained
           personal information may nevertheless be used later to violate privacy and
           that the ways such information is stored, combined with other pieces of
           information (“collated”), analyzed, and distributed often entail very sig-
                                  1
           nificant violations of privacy.  Whereas a considerable number of laws and
           court cases cover these secondary usages of information, they do not come
           together as a coherent doctrine of privacy—and most assuredly they do not
           address the unique challenges of the cyber age. 2
             True, collected personal information was subject to secondary abuses
           even when it was largely paperbound (e.g., in police blotters or FBI files).
           Indeed, when Warren and Brandeis published their groundbreaking 1890
           article in the Harvard Law Review, considered the “genesis of the right
                    3
           of privacy,”  they were not concerned about gossip per se (a first order
           privacy violation), but about the wider distribution of intimate details
                                             4
           through the media (a secondary usage).  However, the digitization of
           information, the widespread use of the Internet and computers, and the
           introduction of artificial intelligence systems to analyze vast amounts of
           data have increased the extent, volume, scope, and kinds of secondary
           usages by so many orders of magnitude that it is difficult to find a proper
   11   12   13   14   15   16   17   18   19   20   21