Page 31 - Privacy in a Cyber Age Policy and Practice
P. 31

16  PRIVACY IN A CYBER AGE

           with little or no gain for the common good, unless private actors—and
           not just the government—are more reined in. To what extent this may be
           achieved by self-regulation, changes in norms, increased transparency, or
           government regulation is beyond the scope of this chapter.
              For this doctrine to be further developed, laws and court rulings ought
                               54
           to be three-dimensional.  Laws and court cases must specify not only
           whether a particular collection of personal information is a “search,” but
           also what level of sensitivity can be tolerated and to what extent the infor-
           mation may be stored, massaged, and distributed. This may seem—and
           is—a tall, if not impossible, order. However, as is next illustrated, a consid-
           erable number of measures are already in place that are, in effect, at least
           two-dimensional. However, these suffer from the fact that they have been
           introduced each on their own and do not reflect an overarching doctrine of
           privacy; hence, they reveal great inconsistencies that need to be remedied. I
           cannot stress enough that the following are only selective examples of such
           measures.
              One should note that a very early attempt to deal with the issue—
           basically, in terms here used, by banning a form of cybernation—utterly
           failed. In 2003, Congress shut down the Pentagon’s Total Information
           Awareness (TIA) program, which was created to detect potential terrorists
           by using data mining technologies to analyze unprecedented amounts of
           personal transaction data. However, a report by the Wall Street Journal in
           2008 revealed that the most important components of the TIA were simply
           “shifted to the NSA” and “put in the so-called black budget, where it would
           receive less scrutiny and bolster other data-sifting efforts.” 55
              Minimization is one way of addressing the volume issue, as pointed
                                                                     56
           out by Swire in his groundbreaking article on Jones and mosaic theory.
           Accordingly, when the FBI taps a phone, even for an extended period of
           time, the intrusion can be reduced significantly if the FBI either stops lis-
           tening when it hears that the conversation is not relevant to the investiga-
           tion (e.g., a child is calling the suspect under surveillance) or locks away
           those segments of the taped correspondence that turn out to be irrele-
               57
           vant.  For this rule to be integrated into the doctrine, it may be waived for
           insensitive information. That is, there would be no need to minimize if the
           child asked, say, to watch TV, but there would be a need to minimize if she
           asked, say, about medical news concerning a family member.
              Another example of a safeguard against excessive privacy intrusions is
           the requirement that certain content be deleted after a specific time period.
           Most private companies that utilize CCTV erase video footage after a set
           number of days, such as after a week. Admittedly, their reasons for doing
           so may be simply economic; however, the effect is still to limit the volume
           of collection and potential for subsequent abuse. Note that that there are
   26   27   28   29   30   31   32   33   34   35   36