Page 22 - Privacy in a Cyber Age Policy and Practice
P. 22

A CYBER AGE PRIVACY DOCTRINE  7

           identifying information (e.g., names, addresses and Social Security num-
           bers) when researchers need medical records, which would make it possible
           to allow access to previously inaccessible data (e.g., Medicare databanks).
           Various technical difficulties arise in securing the anonymity of the data.
                                                                    20
           Several ingenious suggestions have been made to cope with this challenge.
           Conversely, if privacy needs shoring up, one should look for ways to proceed,
           such as introducing audit trails, that impose no “losses” to the common good.
             Third, to the extent that privacy-curbing measures must be introduced,
                                                    21
           they should be  as minimally intrusive as possible.  For example, many
           agree that drug tests should be conducted on those, such as school bus
           drivers, directly responsible for the lives of others. Some employers, how-
           ever, resort to highly intrusive visual surveillance to ensure that the sam-
           ple is taken from the person who delivers it. Instead, one can rely on the
           much less intrusive procedure of measuring the temperature of the sample
           immediately upon delivery.
             Fourth, measures that ameliorate the undesirable side effects of neces-
           sary privacy-diminishing measures are to be preferred over those that
           ignore these effects. Thus, if contact tracing is deemed necessary to fight
           the spread of infectious diseases in order to protect public health, efforts
           must be made to protect the anonymity of those involved. A third party
           may inform those who were in contact with an affected individual about
           such exposure and the therapeutic and protective measures they ought to
           next undertake without disclosing the identity of the diagnosed person.
             Applying these four balancing criteria helps determine which correc-
           tions to a society’s course are both necessary and not excessive. This article
           focuses on the third criterion and seeks to address the question: what is
           least intrusive?


                        B. Privacy as a Three-Dimensional Cube
           In this section I attempt to show that to maintain privacy in the cyber age,
           boundaries on information that may be used by the government should
           be considered along three major dimensions: the level of sensitivity of the
           information, the volume of information collected, and the extent to which
           it is cybernated. These considerations guide one to the lowest level of intru-
           siveness holding constant the level of common good.


                                   1. Sensitivity

                                                    22
           One dimension is the sensitivity of the information.  Information is gen-
           erally considered sensitive if, based on the cultural values of the society in
   17   18   19   20   21   22   23   24   25   26   27