Page 173 - Privacy in a Cyber Age Policy and Practice
P. 173

DNA SEARCHES:  A LIBERAL COMMUNITARIAN APPROACH  161

             Some have argued that, to better protect individuals’ privacy, these
           samples should be destroyed after DNA profiles have been extracted. Britain
           is destroying its DNA samples while retaining profiles of convicted crimi-
              26
           nals.  The EU Court of Human Rights, while acknowledging the difference
           between samples and profiles, ruled that both should be destroyed for
           those not convicted of a crime. 27
             The samples ought to be kept in order to provide for reanalysis as technol-
           ogies develop, for exoneration, for convicting criminals of additional crimes
           of which they have originally not been charged, and for ruling on the guilt
           or innocence of arrestees that have been released but new evidence that
           implicates them has been established.
             Instead of destroying the samples, additional steps should be taken to
           prevent unauthorized analysis and sharing of DNA samples. All such mea-
           sures that limit secondary usages of genetic information and that ensure
           the legality of these usages—as opposed to measures that simply limit
           the  collection of such genetic information—are measures that enhance
                      28
           accountability.  (The term accountability is used throughout this article to
           refer to institutionalized arrangements that serve to ensure that the mate-
           rial at hand is used legally, without undue use, access, or disclosure—and
           that proper oversight and enforcements mechanisms are in place, to gener-
           ate the incentives to ensure that the various legally set rules and procedures
           are observed).
             Several accountability measures have already been implemented. CODIS
           matches do not reveal identifying information about a person whose DNA
           profile is searched, such as name or social security number; instead, each
           profile is labeled with a specimen identifier, the originating laboratory’s
           identifier, and the initials of the technician who created the profile. The
           originating laboratories keep the samples and records of the personal
                                               29
           information associated with each specimen.  If a match is found, the
           authorities seeking a match have the information necessary to contact the
           appropriate laboratory, which then releases the identifying information
           in accordance with applicable federal, state, and local law, often after re-
                                                     30
           testing the retained DNA sample to verify the match.  Thus, a “firewall” of
           sorts exists between insensitive, searchable profile information and sensitive,
           personally-identifiable information and samples.
             Moreover, the sensitive information contained in retained DNA samples
           is protected by law. Congress enacted laws that impose heavy penalties for
                                                      31
           unauthorized disclosure of DNA profile information  and other infor-
                                                           32
           mation that could be derived from analyzing DNA samples.  The courts
           have provided for the possibility that advances in genetic technology could
                                                          33
           necessitate reconsideration of the sensitivity of “junk” DNA,  acknowledg-
           ing that if advances in genetic technology find that “junk” DNA, including
   168   169   170   171   172   173   174   175   176   177   178