Page 48 - Privacy in a Cyber Age Policy and Practice
P. 48

MORE COHERENT, LESS SUBJECTIVE, AND OPERATIONAL  33

           This element of cybernation can be operationalized, as a first order of
           approximation, by determining whether or not the information is stored
           or instantly erased. As a second order of approximation, if information is
           stored, the degree of cybernation can be approximated by determining the
           length of time the information is kept.
             In regard to the collation of information about the same person, espe-
           cially when building dossiers is involved, the risk to privacy increases when
           information collected and stored by one agent is combined or linked with
           information collected and stored by other agents. For example, some civil
           rights advocates much prefer state or regional databases to federal ones,
           not taking into account that these local databases are often linked to each
           other and thus in effect act like one central database. Although the volume
           of information in each state or local database may well be lower than the
           amount stored in a national database, that the state and local databases are
           linked to each other means that those who have access to them have access
           to the same amount of information that would be gathered in a national
           database. Many civil rights advocates would also be greatly concerned if
           the FBI amassed information on most Americans, including those who
           have not been charged with any crime or are under any suspicion—but
           they pay less mind to data brokers who keep such information and sell
                         69
           access to the FBI.  The law must adapt to these technological develop-
           ments, treat all linked databases as if they were one, and impose limits on
           collection accordingly.
             The risk to privacy is also lower when personal information is merely
           stored and collated than when the same information is analyzed to fer-
           ret out other information and draw conclusions about the person not
           revealed by the raw data. For first approximation purposes, this dimen-
           sion can be operationalized by considering whether such analysis is car-
           ried out at all; that is, analysis is contrasted with the mere use of raw
           information. Additional measurements are needed to establish how much
           and what kinds of new information are gained through analyses. In par-
           ticular, it is essential that when the collection and use of sensitive infor-
           mation is banned, so too should analysis that is used to divine the same
           information from insensitive information be banned. It seems that no
           such bans are yet in place. They are clearly needed because without them
           limits on collecting and cybernating sensitive information face the grave
           danger of being eroded.
             Finally, risks to privacy are fewer when information collected by one
           party such as a hospital or the IRS, even information that has been ana-
           lyzed or compiled into dossiers, is inaccessible to other parties or is only
           made available to other parties under special circumstances. The Federal
           Privacy Act of 1974, for instance, limits the conditions and the degree to
   43   44   45   46   47   48   49   50   51   52   53