Page 24 - Privacy in a Cyber Age Policy and Practice
P. 24

A CYBER AGE PRIVACY DOCTRINE  9

           And given that in 2011 fewer than half of violent crimes and less than 20
           percent of property crimes in the United States were resolved, some may
           well hold that public authorities are not excessively indulged when deal-
                       25
           ing with crime.  As for harm to the individuals involved, they would be
           harmed only if they had a right to commit a crime. The arguments against
           the notion that crimes committed in a home (e.g., spousal abuse) deserve
           more protection than ones committed in public have already been dis-
           cussed. What is new here is that historically, when the Constitution was
           written, searching a home required a person to enter or peep, which would
           entail a high level of intrusiveness because the intruder could not help
           but note other potentially sensitive information besides whether a crime
           was being committed. However, technologies that have a very narrow
           and crime-specific bandwidth (e.g., dogs that sniff for bombs or sensors
           that measure abnormal levels of heat) and are, hence, minimally intru-
           sive should be allowed. One may disagree with this line of analysis but
           still accept the basic point that the less-intrusive collection of insensitive
           information should be tolerated, while the collection of highly sensitive
           information should be banned.
             Many court cases treat the voluntary release of information to others
                                                                26
           as if the information disclosed—including phone numbers dialed,  cop-
                                                           28
                            27
           ies of written checks,  documents given to an accountant,  newspaper
                                                          30
                 29
           records,  and even papers held by a defendant’s attorney —all had the
                              31
           same level of sensitivity.  A privacy doctrine that follows the principles
           here outlined would grant persons more say about the secondary usages of
           sensitive information, while recognizing that the less sensitive information
           may be used and passed on without the individual’s explicit consent.
             Over the years, Congress has pieced together privacy law by address-
           ing the protection of one kind of sensitive information at a time, rather
           than treating all kinds in a comprehensive fashion. Thus, in 1973, the
           Department of Health, Education and Welfare developed the Code of Fair
           Information Practices to govern the collection and use of information by
           the federal government. The principles of the code were incorporated in
           the Privacy Act of 1974, which “prohibits unauthorized disclosures of the
           records [the federal government] protects. It also gives individuals the
           right to review records about themselves, to find out if these records have
           been disclosed, and to request corrections or amendments of these records,
                                         32
           unless the records are legally exempt.”  The Privacy Act applies only to the
           federal government and has not been expanded to include records kept by
           the private sector. In 1986, the Electronic Communications Privacy Act
           (EPCA) restricted wiretapping, regulated government access to electronic
           communication stored by third parties, and prohibited the collection of
           communications content (i.e., what was said, not who was called) by pen
   19   20   21   22   23   24   25   26   27   28   29