Page 89 - Privacy in a Cyber Age Policy and Practice
P. 89

76  PRIVACY IN A CYBER AGE

           In 2005, one such company—ChoicePoint—had records on over 220 mil-
                     5
           lion people.  Professor Christopher Slobogin notes that the amount of
           information culled by corporate data miners
              can provide the inquirer with a wide array of data about any of us, including
              basic demographic information, income, net worth, real [sic] property holdings,
              social security number, current and previous addresses, phone numbers and
              fax numbers, names of neighbors, driver records, license plate and VIN
              numbers, bankruptcy and debtor filings, employment, business and criminal
              records, bank account balances and activity, stock purchases, and credit card
              activity. 6
           For example, in 2009, a law professor at Fordham University gained minor
           notoriety when he assigned his class to create a dossier on Justice Anto-
           nin Scalia using only the information they could find online. The result
           was a fifteen-page document “that included the justice’s home address
           and home phone number, his wife’s personal e-mail address and the TV
                                 7
           shows and food he prefers.”  Some privacy merchants even keep dossiers
           on the crimes a person has committed, their divorces, political leanings,
           and their interests in topics that include religion, the Bible, gambling, and
                            8
           adult entertainment.  Other companies amass lists of “victims of sexual
           assault, and lists of people with sexually transmitted diseases. Lists of
           people who have Alzheimer’s, dementia and AIDS. Lists of the impotent
           and depressed.” 9
              Although several data-mining companies allow individuals to opt out
           of their databases, people must contact each company individually, and
           even then information may still linger in some search results or websites.
           Google, for example, generally does not remove search results if the infor-
           mation contained is truthful and not illegal. 10
              The privacy merchants are limited by laws that Congress (and states)
           have enacted that carve out subsets of data, particularly medical and financial
           records, in which the privacy merchants cannot freely trade. However,
           very little attention has been paid to the fact that information is fungible.
           Through a process that might be called “privacy violating triangulation”
           (PVT), one can readily derive much about a person’s medical, financial,
           or other protected private side by using “innocent facts” that are not privi-
           leged by law. A piece of seemingly benign information—for instance, the
           number of days a person failed to show up for work, or whether the person
           purchased a wig—suggests volumes about one’s medical condition. By
           building a portfolio of many such apparently innocuous facts, one could
           infer a great deal, effectively violating the realm of privacy surrounding
           individuals’ most sensitive information. Thus, a study of Facebook shows
           “how the on-line social network data could be used to predict some
   84   85   86   87   88   89   90   91   92   93   94