Page 85 - Privacy in a Cyber Age Policy and Practice
P. 85

PRIVACY:  A PERSONAL SPHERE, NOT HOME-BOUND  71

                            74
           in Riley v. California,  the Court ruled that the warrantless search of the
           contents of a smartphone incident to arrest constitutes a Fourth Amendment
           violation because the volume and bandwidth of information contained on
           smartphones is much higher than the information contained on other
           sources. The Court wrote, “many of these devices are in fact minicomputers
           that also happen to have the capacity to be used as a telephone. They could
           just as easily be called cameras, video players, rolodexes, calendars, tape
                                                                    75
           recorders, libraries, diaries, albums, televisions, maps, or newspapers.”
           Their storage capacity is far beyond physical storage capabilities, and most
           people now carry around “a cache of sensitive personal information” in the
           form of a smartphone. Cell phones that contain vast quantities of data, the
           Court held, are thus qualitatively and quantitatively different than physical
                                                76
           containers the Court had previously analyzed.  In short, there are some
           precedents for using volume as a criterion.
             Sensitivity is the second criterion. Privacy scholars and lawmakers have
           often articulated and operationalized the observation that some kinds of
           information are more sensitive than others, albeit using a variety of terms
           including “intimate information” and “revealing information.” In the
           United States, Congress has ranked many types of information according
           to sensitivity. An individual’s medical information is granted a high level of
           protection; financial information is not regarded as sensitive but nearly so.
           Additional types of information entitled to a relatively high level of pro-
           tection include education records (Family Educational Rights and Privacy
           Act), genetic information (twenty-seven state legislatures had regulated the
                                                                   77
           disclosure of identifiable genetic information in some way as of 2008 ),
                                                        78
           and journalistic sources (Privacy Protection Act of 1980 ). The FTC has
           classified five categories of information, namely financial information,
           health information, social security numbers, information collected from
                                                         79
           children, and geo-location information, as sensitive data.  The result of
           this piecemeal consideration is a crazy patchwork quilt. However, given
           that many kinds of information have already been ranked, it would not
           take a great deal of legislation to systematically rank the level of sensitivity
           of all the major kinds of information.
             Cybernation is the third criterion. It concerns the scope of processing
           and secondary uses of information. It includes storing, collating, analyzing,
           and distributing discrete items of information in concert with numerous
           others. To demonstrate this difference, an example that encompasses all
           three criteria follows. First, consider a situation in which the volume of
           information collected is low, the sensitivity of that information is low, and
           the information is only minimally cybernated. This occurs when private
           enterprises employ CCTV to enhance their security. The footage contains
           a low volume of information; basically only whether a given person was at
   80   81   82   83   84   85   86   87   88   89   90