Page 37 - Privacy in a Cyber Age Policy and Practice
P. 37

22  PRIVACY IN A CYBER AGE

                                                   21
           in the very conceptual and legal status of privacy.”  (Many other scholars
                                               22
           have also criticized the third-party doctrine. )
              Another doctrine that speaks to the cybernation challenge in effect
           takes the opposite tack. It assumes that personal information belongs to
           the person to whom it applies, that the individual has a right to keep this
           information private that extends beyond primary collection, and that only
           the person can agree to secondary usages of the information—even when
                                                     23
           they have already consented to primary collection.  (Some refer to this
           doctrine as the fundamental rights approach; others refer to it as the infor-
           mation as property approach.) Europeans often cite this doctrine, which is
           at the foundation of the European Data Protection Directive and the Euro-
                                             24
           pean General Data Protection Regulation ; for this reason, this chapter
           refers to it as the European approach.
              At first blush, it may seem that the European approach governs a wholly
           different area of privacy than the CAPD, which, to reiterate, deals with
           the right to privacy vis-à-vis the government rather than vis-à-vis pri-
           vate actors such as marketers and data brokers. The European model is
           nonetheless relevant because it turns out that, to generalize, governments
           regularly use personal information collected by private actors. Thus, the
           limitations imposed on private actors affect the scope of government
           intrusions. To illustrate: It is difficult to imagine the conditions, short of
           an extreme national emergency, under which the U.S. government could
           require all American citizens to turn over to law enforcement records of
           their purchases on the Internet, their e-mails, and their other transactions.
           However, because the same American citizens “disclose” this information
           to private corporations, and these corporations aggregate this information,
           the government, in effect, can use the resulting databases without seeking
           permission for these secondary usages. 25
              The drafters of the European approach, however, realized that if the
           European Union were to follow its limitations on secondary usages, many
           common goods would suffer greatly. They hence introduced a large num-
           ber of areas in which secondary usages of personal information do not
                        26
           require consent.  According to the European approach, the government
           need not ask the consent of those whose personal information it collects
           and uses if the collection is for a considerable list of public purposes, such
           as public health or security. Thus, the Data Protection Directive excludes
           from its requirement that “controllers” gain personal consent to record and
           process personal information in any instance in which “the processing is
           carried out under a contract, or in the context of a quasi-contractual rela-
           tionship of trust, with the data subject and is necessary for its discharge,”
           when “the data come from sources generally available to the public and
           their processing is intended solely for correspondence purposes,” and
   32   33   34   35   36   37   38   39   40   41   42