首页 > 最新文献

Information Privacy Law eJournal最新文献

英文 中文
Alan Westin's Privacy Homo Economicus 艾伦·威斯汀的《隐私经济人
Pub Date : 2014-05-19 DOI: 10.31235/osf.io/ta2z3
C. Hoofnagle, Jennifer M. Urban
Homo economicus reliably makes an appearance in regulatory debates concerning information privacy. Under the still-dominant U.S. “notice and choice” approach to consumer information privacy, the rational consumer is expected to negotiate for privacy protection by reading privacy policies and selecting services consistent with her preferences. A longstanding model for predicting these preferences is Professor Alan Westin's well-known segmentation of consumers into “privacy pragmatists,” “privacy fundamentalists,” and “privacy unconcerned.” To be tenable as a protection for consumer interest, “notice and choice” requires homo economicus to be broadly reliable as a model. Consumers behaving according to the model will know what they want and how to get it in the marketplace, limiting regulatory approaches to information privacy. While notice and choice is undergoing strong theoretical, empirical, and political critique, U.S. Internet privacy law largely reflects these assumptions. This Article contributes to the ongoing debate about notice and choice in two main ways. First, we consider the legacy Westin's privacy segmentation model itself, which as greatly influenced the development of the notice-and-choice regime. Second, we report on original survey research, collected over four years, exploring Americans’ knowledge, preferences, and attitudes about a wide variety of data practices in online and mobile markets. Using these methods, we engage in considered textual analysis, empirical testing, and critique of Westin’s segmentation model. Our work both calls into question longstanding assumptions used by Westin and lends new insight into consumers’ privacy knowledge and preferences. A close textual look at factual and theoretical assumptions embedded in the segmentation model shows foundational flaws. With testing, we find that the segmentation model lacks validity in important dimensions. In analyzing data from nationwide, telephonic surveys of Internet and mobile phone users, we find an apparent knowledge gap among consumers concerning business practices and legal protections for privacy, calling into question Westin’s conclusion that a majority of consumers act pragmatically. We further find that those categorized as “privacy pragmatists” act differently from Westin’s model when directly presented with the value exchange — and thus the privacy tradeoff — offered with these services. These findings reframe the privacy pragmatist and call her influential status in U.S. research, industry practice, and policy into serious question. Under the new view, she cannot be seen as “pragmatic” at all, but rather as a consumer making choices in the marketplace with substantial deficits in her understanding of business practices. This likewise calls into question policy decisions based on the segmentation model and its assumptions. We conclude that updated research and a policy approach that addresses both rationality and knowledge gaps are key.
经济人确实出现在有关信息隐私的监管辩论中。在美国仍然占主导地位的消费者信息隐私“通知和选择”方法下,理性的消费者应该通过阅读隐私政策和选择符合其偏好的服务来协商隐私保护。Alan Westin教授将消费者分为“隐私实用主义者”、“隐私原教旨主义者”和“不关心隐私的人”,这是预测这些偏好的一个长期模型。为了保护消费者利益,“注意与选择”要求经济人作为一种模式具有广泛的可靠性。根据该模型行事的消费者将知道他们想要什么,以及如何在市场上得到它,从而限制了对信息隐私的监管手段。虽然通知和选择正在经历强烈的理论、经验和政治批判,但美国互联网隐私法在很大程度上反映了这些假设。本文主要从两个方面对正在进行的关于通知和选择的辩论做出了贡献。首先,我们考虑了遗留的威斯汀隐私分割模型本身,它极大地影响了通知和选择制度的发展。其次,我们报告了原始调查研究,收集了四年多的时间,探索了美国人对在线和移动市场各种数据实践的知识、偏好和态度。使用这些方法,我们对威斯汀的分割模型进行了深思熟虑的文本分析、实证测试和批评。我们的研究对威斯汀长期以来的假设提出了质疑,并对消费者的隐私知识和偏好提供了新的见解。仔细研究分割模型中嵌入的事实和理论假设,就会发现基本缺陷。通过测试,我们发现该分割模型在一些重要维度上缺乏有效性。在分析全国范围内对互联网和移动电话用户的电话调查数据时,我们发现消费者在商业惯例和隐私法律保护方面存在明显的知识差距,这就对威斯汀的结论——大多数消费者的行为都是务实的——提出了质疑。我们进一步发现,那些被归类为“隐私实用主义者”的人,在直接面对这些服务提供的价值交换(因此是隐私权衡)时,其行为与威斯汀的模型不同。这些发现重新定义了隐私实用主义者,并对她在美国研究、行业实践和政策中的影响力提出了严肃的质疑。在新的观点下,她根本不能被视为“务实的”,而是被视为在市场上做出选择的消费者,她对商业惯例的理解存在重大缺陷。这同样使基于分割模型及其假设的政策决策受到质疑。我们的结论是,更新的研究和解决理性和知识差距的政策方法是关键。
{"title":"Alan Westin's Privacy Homo Economicus","authors":"C. Hoofnagle, Jennifer M. Urban","doi":"10.31235/osf.io/ta2z3","DOIUrl":"https://doi.org/10.31235/osf.io/ta2z3","url":null,"abstract":"Homo economicus reliably makes an appearance in regulatory debates concerning information privacy. Under the still-dominant U.S. “notice and choice” approach to consumer information privacy, the rational consumer is expected to negotiate for privacy protection by reading privacy policies and selecting services consistent with her preferences. A longstanding model for predicting these preferences is Professor Alan Westin's well-known segmentation of consumers into “privacy pragmatists,” “privacy fundamentalists,” and “privacy unconcerned.” To be tenable as a protection for consumer interest, “notice and choice” requires homo economicus to be broadly reliable as a model. Consumers behaving according to the model will know what they want and how to get it in the marketplace, limiting regulatory approaches to information privacy. While notice and choice is undergoing strong theoretical, empirical, and political critique, U.S. Internet privacy law largely reflects these assumptions. This Article contributes to the ongoing debate about notice and choice in two main ways. First, we consider the legacy Westin's privacy segmentation model itself, which as greatly influenced the development of the notice-and-choice regime. Second, we report on original survey research, collected over four years, exploring Americans’ knowledge, preferences, and attitudes about a wide variety of data practices in online and mobile markets. Using these methods, we engage in considered textual analysis, empirical testing, and critique of Westin’s segmentation model. Our work both calls into question longstanding assumptions used by Westin and lends new insight into consumers’ privacy knowledge and preferences. A close textual look at factual and theoretical assumptions embedded in the segmentation model shows foundational flaws. With testing, we find that the segmentation model lacks validity in important dimensions. In analyzing data from nationwide, telephonic surveys of Internet and mobile phone users, we find an apparent knowledge gap among consumers concerning business practices and legal protections for privacy, calling into question Westin’s conclusion that a majority of consumers act pragmatically. We further find that those categorized as “privacy pragmatists” act differently from Westin’s model when directly presented with the value exchange — and thus the privacy tradeoff — offered with these services. These findings reframe the privacy pragmatist and call her influential status in U.S. research, industry practice, and policy into serious question. Under the new view, she cannot be seen as “pragmatic” at all, but rather as a consumer making choices in the marketplace with substantial deficits in her understanding of business practices. This likewise calls into question policy decisions based on the segmentation model and its assumptions. We conclude that updated research and a policy approach that addresses both rationality and knowledge gaps are key.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124065881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Voter Privacy in the Age of Big Data 大数据时代的选民隐私
Pub Date : 2014-04-26 DOI: 10.2139/SSRN.2447956
I. Rubinstein
In the past several election cycles, presidential campaigns and other well-funded races for major political offices have become data-driven operations. Presidential campaign organizations and the two main parties (and their data consultants) assemble and maintain extraordinarily detailed political dossiers on every American voter. These databases contain hundreds of millions of individual records, each of which has hundreds to thousands of data points. Because this data is computerized, candidates benefit from cheap and nearly unlimited storage, very fast processing, and the ability to engage in data mining of interesting voter patterns. The hallmark of data-driven political campaigns is voter microtargeting, which political actors rely on to achieve better results in registering, mobilizing and persuading voters and getting out the vote on or before Election Day. Voter microtargeting is the targeting of voters in a highly individualized manner based on statistical correlations between their observable patterns of offline and online behavior and the likelihood of their supporting a candidate and casting a ballot for him or her. In other words, modern political campaigns rely on the analysis of large data sets in search of useful and unanticipated insights, an activity that is often summed up with the phrase “big data.” Despite the importance of big data in U.S. elections, the privacy implications of data-driven campaigning have not been thoroughly explored much less regulated. Indeed, political dossiers may be the largest unregulated assemblage of personal data in contemporary American life. This Article seeks to remedy this oversight. It proceeds in three parts. Part I offers the first comprehensive analysis of the main sources of voter data and the absence of legal protection for this data and related data processing activities. Part II considers the privacy interests of individuals in both their consumer and Internet-based activities and their participation in the political process, organizing the analysis under the broad rubrics of information privacy and political privacy. That is, it asks two interrelated questions: first, whether the relentless profiling and microtargeting of American voters invades their privacy (and if so what harm it causes) and, second, to what extent do these activities undermine the integrity of the election system. It also examines three reasons why political actors minimize privacy concerns: a penchant for secrecy that clashes with the core precept of transparent data practices; a tendency to rationalize away the problem by treating all voter data as if it were voluntarily provided or safely de-identified (and hence outside the scope of privacy law) while (falsely) claiming to follow the highest commercial privacy standards; and, a mistaken embrace of commercial tracking and monitoring techniques as if their use has no impact on the democratic process. Part III presents a moderate proposal for addressing the harms
在过去的几个选举周期中,总统竞选和其他资金充足的主要政治职位竞选已经成为数据驱动的行动。总统竞选组织和两大主要政党(以及他们的数据顾问)收集并维护每一位美国选民极其详细的政治档案。这些数据库包含数亿条单独的记录,每条记录都有数百到数千个数据点。由于这些数据是计算机化的,因此候选人可以从廉价且几乎无限的存储、非常快的处理以及对有趣的选民模式进行数据挖掘的能力中受益。数据驱动的政治运动的特点是选民微目标,政治行为者依靠微目标在选举日当天或之前登记、动员和说服选民以及动员选民投票方面取得更好的结果。选民微目标(Voter microtargeting)是以高度个性化的方式针对选民,其依据是选民可观察到的离线和在线行为模式与他们支持某位候选人并为其投票的可能性之间的统计相关性。换句话说,现代政治活动依赖于对大数据集的分析,以寻找有用的和意想不到的见解,这种活动通常用“大数据”这个词来概括。尽管大数据在美国选举中很重要,但数据驱动的竞选活动对隐私的影响尚未得到彻底探讨,监管更少。事实上,政治档案可能是当代美国生活中最大的不受监管的个人数据集合。本文试图弥补这一疏忽。本文分为三个部分。第一部分首次全面分析了选民数据的主要来源以及对这些数据和相关数据处理活动缺乏法律保护的情况。第二部分考虑了个人在其消费和基于互联网的活动以及他们参与政治过程中的隐私利益,在信息隐私和政治隐私的广泛规则下组织分析。也就是说,它提出了两个相互关联的问题:第一,对美国选民进行无情的定性和微观定位是否侵犯了他们的隐私(如果是的话,它会造成什么伤害);第二,这些活动在多大程度上破坏了选举制度的完整性。它还研究了政治行为者将隐私问题最小化的三个原因:对保密的偏好与透明数据实践的核心原则相冲突;通过将所有选民数据视为自愿提供或安全去识别(因此不在隐私法的范围内)来合理化问题的倾向,同时(错误地)声称遵循最高的商业隐私标准;而且,错误地接受商业跟踪和监控技术,好像它们的使用对民主进程没有影响一样。第三部分提出了一个温和的建议,以解决第二部分中确定的危害,包括:(1)强制性披露和免责制度,要求政治行为者对其竞选数据做法更加透明;(2)对商业数据经纪人的新的联邦隐私限制和补充的“不跟踪”机制,使个人(也恰好是选民)能够决定商业公司是否以及在多大程度上可以跟踪或瞄准他们的在线活动。文章最后问道,即使是这个温和的提议,是否也与宪法第一修正案保障的政治言论权相冲突。它有两个论点。首先,最高法院可能会支持强制性的隐私披露和免责声明,这些原则是在主要的竞选资金案件中发展和重申的,这些案件比其他形式的监管更重视透明度。第二,法院将继续根据长期存在的第一修正案原则将商业隐私法规视为符合宪法的,尽管它们可能给政治行为者带来任何附带负担,尽管法院最近在索雷尔诉艾美思健康案(Sorrell v. IMS Health)一案中做出了很容易区分的决定。
{"title":"Voter Privacy in the Age of Big Data","authors":"I. Rubinstein","doi":"10.2139/SSRN.2447956","DOIUrl":"https://doi.org/10.2139/SSRN.2447956","url":null,"abstract":"In the past several election cycles, presidential campaigns and other well-funded races for major political offices have become data-driven operations. Presidential campaign organizations and the two main parties (and their data consultants) assemble and maintain extraordinarily detailed political dossiers on every American voter. These databases contain hundreds of millions of individual records, each of which has hundreds to thousands of data points. Because this data is computerized, candidates benefit from cheap and nearly unlimited storage, very fast processing, and the ability to engage in data mining of interesting voter patterns. The hallmark of data-driven political campaigns is voter microtargeting, which political actors rely on to achieve better results in registering, mobilizing and persuading voters and getting out the vote on or before Election Day. Voter microtargeting is the targeting of voters in a highly individualized manner based on statistical correlations between their observable patterns of offline and online behavior and the likelihood of their supporting a candidate and casting a ballot for him or her. In other words, modern political campaigns rely on the analysis of large data sets in search of useful and unanticipated insights, an activity that is often summed up with the phrase “big data.” Despite the importance of big data in U.S. elections, the privacy implications of data-driven campaigning have not been thoroughly explored much less regulated. Indeed, political dossiers may be the largest unregulated assemblage of personal data in contemporary American life. This Article seeks to remedy this oversight. It proceeds in three parts. Part I offers the first comprehensive analysis of the main sources of voter data and the absence of legal protection for this data and related data processing activities. Part II considers the privacy interests of individuals in both their consumer and Internet-based activities and their participation in the political process, organizing the analysis under the broad rubrics of information privacy and political privacy. That is, it asks two interrelated questions: first, whether the relentless profiling and microtargeting of American voters invades their privacy (and if so what harm it causes) and, second, to what extent do these activities undermine the integrity of the election system. It also examines three reasons why political actors minimize privacy concerns: a penchant for secrecy that clashes with the core precept of transparent data practices; a tendency to rationalize away the problem by treating all voter data as if it were voluntarily provided or safely de-identified (and hence outside the scope of privacy law) while (falsely) claiming to follow the highest commercial privacy standards; and, a mistaken embrace of commercial tracking and monitoring techniques as if their use has no impact on the democratic process. Part III presents a moderate proposal for addressing the harms ","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Digital Files Dealers and Prohibition in the Context of the French 3 Strikes (HADOPI) Law 法国三次罢工(HADOPI)法背景下的数字文件经销商与禁止
Pub Date : 2014-04-14 DOI: 10.2139/SSRN.2422933
Sylvain Dejean, R. Suire
Illegal digital file consumption is widely believed to influence sales of cultural goods. Online piracy is now regulated and prohibited in some countries, especially in France, where HADOPI is a legal authority in charge of Peer-­‐to-­‐Peer (P2P) protocol monitoring. We claim that prohibitions on digital markets share some characteristics of other criminal activities such as those of the drug market. Prohibition of a good or service can lead to the emergence of a black market embedded in a social network. Based on an original and representative 2012 French survey, we show that such a social and offline organisation is observed. Indeed, offline swapping is now the largest way to exchange digital files. We show that offline swapping is embedded in a hierarchical social network where different behaviours are observed. On one hand, there are wholesalers of digital files who provide more than they receive from this offline network and maintain online downloading activity through P2P technology. On the other hand, there are also the “simple” consumers who consume only from offline swapping and never provide files to others. They never use monitored P2P technology because HADOPI acts as a deterrent. Our econometric analysis suggest that this “fear” of HADOPI plays a significant role in structuring this offline swapping network, as the position in the swapping network is driven by the feeling of being threatened by HADOPI.
人们普遍认为,非法消费数字文件影响了文化产品的销售。网络盗版现在在一些国家受到监管和禁止,特别是在法国,HADOPI是负责点对点(P2P)协议监控的合法机构。我们认为,对数字市场的禁令与毒品市场等其他犯罪活动具有某些共同特征。禁止某种商品或服务可能会导致嵌入社交网络的黑市的出现。根据2012年法国一项具有独创性和代表性的调查,我们发现这样的社交和线下组织是可以观察到的。事实上,离线交换是目前最大的数字文件交换方式。我们表明,离线交换是嵌入在一个分层的社会网络中,不同的行为被观察到。一方面,数字文件批发商提供比他们从线下网络获得的更多的数字文件,并通过P2P技术维持在线下载活动。另一方面,也有“简单”消费者,他们只从离线交换中消费,从不向其他人提供文件。他们从不使用受监控的P2P技术,因为HADOPI起到了威慑作用。我们的计量经济学分析表明,这种对HADOPI的“恐惧”在构建这种离线交换网络中起着重要作用,因为交换网络中的位置是由受到HADOPI威胁的感觉驱动的。
{"title":"Digital Files Dealers and Prohibition in the Context of the French 3 Strikes (HADOPI) Law","authors":"Sylvain Dejean, R. Suire","doi":"10.2139/SSRN.2422933","DOIUrl":"https://doi.org/10.2139/SSRN.2422933","url":null,"abstract":"Illegal digital file consumption is widely believed to influence sales of cultural goods. Online piracy is now regulated and prohibited in some countries, especially in France, where HADOPI is a legal authority in charge of Peer-­‐to-­‐Peer (P2P) protocol monitoring. We claim that prohibitions on digital markets share some characteristics of other criminal activities such as those of the drug market. Prohibition of a good or service can lead to the emergence of a black market embedded in a social network. Based on an original and representative 2012 French survey, we show that such a social and offline organisation is observed. Indeed, offline swapping is now the largest way to exchange digital files. We show that offline swapping is embedded in a hierarchical social network where different behaviours are observed. On one hand, there are wholesalers of digital files who provide more than they receive from this offline network and maintain online downloading activity through P2P technology. On the other hand, there are also the “simple” consumers who consume only from offline swapping and never provide files to others. They never use monitored P2P technology because HADOPI acts as a deterrent. Our econometric analysis suggest that this “fear” of HADOPI plays a significant role in structuring this offline swapping network, as the position in the swapping network is driven by the feeling of being threatened by HADOPI.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Harms and the Effectiveness of the Notice and Choice Framework 隐私危害与通知与选择框架的有效性
Pub Date : 2014-03-29 DOI: 10.2139/SSRN.2418247
J. Reidenberg, N. C. Russell, Alexander J. Callen, S. Qasir, Thomas B. Norton
In the last fifteen years, the Federal Trade Commission and the White House have promoted notice and choice as the preferred mechanism for protecting consumers’ privacy online. But law and policy scholars doubt the efficacy of this mechanism. Research shows that consumers rarely read website privacy policies, that such policies are often too complex for users to understand, and that website policy statements do not match consumers’ privacy expectations. Efforts to ameliorate theses issues through technological tools, such as privacy filters and do-not-track codes, have been unsuccessful. Further, these tools do not address whether notice and choice theory aligns with the actual privacy harms that consumers experience. This alignment remains unexplored. This article, thus, proposes to examine the relationship between the notice and choice theory and users’ actual privacy concerns. The article takes a novel approach that examines privacy litigation and FTC enforcement actions. This focus on the wrongs litigated in the real world reveals the most important harms that consumers experience and provides a better understanding of the efficacy of the notice and choice framework.The data set compiled to support the research for the article consists of all federal class action complaints alleging online privacy violations filed during the last ten years and the Federal Trade Commission complaints and settlements addressing online privacy. The article next addresses the roles that jurisdiction and competence play in framing claims and identifies a typology of the wrongful acts experienced by consumers. The research shows that four types of claims appear in both private litigation and public enforcement with respect to personal information: (1) unauthorized disclosure, (2) surreptitious collection, (3) failure to secure, and (4) undue retention. The article then applies this typology to map “zones of effectiveness” for the notice and choice regime. The article identifies which wrongs a proper notice and choice regime can and cannot address. The research demonstrates that while some wrongful practices might be avoided by the inclusion of specific statements in a notice, others will be incurable through notice. The latter set of wrongs is, thus, outside the “zone of effectiveness” of a notice and choice regime. Lastly, the article concludes with a discussion of whether and how the harms that consumers experience match the outcomes of litigation and FTC settlement orders.This research is supported by the National Science Foundation grant 1330214 “TWC SBE: Option: Frontier: Collaborative: Towards Effective Web Privacy Notice and Choice: A Multi-Disciplinary Prospective.”
在过去的15年里,联邦贸易委员会(Federal Trade Commission)和白宫一直把通知和选择作为保护消费者在线隐私的首选机制。但法律和政策学者对这一机制的有效性表示怀疑。研究表明,消费者很少阅读网站的隐私政策,这些政策往往过于复杂,用户无法理解,网站的政策声明也不符合消费者的隐私期望。通过技术工具改善这些问题的努力,如隐私过滤器和不跟踪代码,都没有成功。此外,这些工具并没有解决通知和选择理论是否与消费者所经历的实际隐私损害相一致。这种一致性仍未被探索。因此,本文建议研究通知与选择理论与用户实际隐私关注之间的关系。本文采用了一种新颖的方法来研究隐私诉讼和联邦贸易委员会的执法行动。这种对现实世界中错误诉讼的关注揭示了消费者所经历的最重要的伤害,并提供了对通知和选择框架的有效性的更好理解。为支持这篇文章的研究而汇编的数据集包括过去十年中所有指控侵犯在线隐私的联邦集体诉讼,以及联邦贸易委员会针对在线隐私的投诉和和解。接下来的文章讨论了管辖权和能力在构建索赔中所起的作用,并确定了消费者所经历的不法行为的类型。研究表明,在私人诉讼和公共执法中都出现了四种类型的个人信息索赔:(1)未经授权的披露,(2)秘密收集,(3)未能保护,(4)不当保留。然后,本文将这种类型应用于通知和选择制度的“有效区域”地图。本文指出了适当的通知和选择制度能够解决和不能解决的错误。研究表明,虽然在通知中加入具体声明可以避免一些不法行为,但其他不法行为通过通知将无法治愈。因此,后一组错误不在通知和选择制度的“有效范围”之内。最后,本文最后讨论了消费者所遭受的损害是否与诉讼结果和联邦贸易委员会和解令相匹配,以及如何相匹配。本研究由美国国家科学基金会1330214基金资助“TWC SBE:选项:前沿:协作:迈向有效的网络隐私声明和选择:多学科前景”。
{"title":"Privacy Harms and the Effectiveness of the Notice and Choice Framework","authors":"J. Reidenberg, N. C. Russell, Alexander J. Callen, S. Qasir, Thomas B. Norton","doi":"10.2139/SSRN.2418247","DOIUrl":"https://doi.org/10.2139/SSRN.2418247","url":null,"abstract":"In the last fifteen years, the Federal Trade Commission and the White House have promoted notice and choice as the preferred mechanism for protecting consumers’ privacy online. But law and policy scholars doubt the efficacy of this mechanism. Research shows that consumers rarely read website privacy policies, that such policies are often too complex for users to understand, and that website policy statements do not match consumers’ privacy expectations. Efforts to ameliorate theses issues through technological tools, such as privacy filters and do-not-track codes, have been unsuccessful. Further, these tools do not address whether notice and choice theory aligns with the actual privacy harms that consumers experience. This alignment remains unexplored. This article, thus, proposes to examine the relationship between the notice and choice theory and users’ actual privacy concerns. The article takes a novel approach that examines privacy litigation and FTC enforcement actions. This focus on the wrongs litigated in the real world reveals the most important harms that consumers experience and provides a better understanding of the efficacy of the notice and choice framework.The data set compiled to support the research for the article consists of all federal class action complaints alleging online privacy violations filed during the last ten years and the Federal Trade Commission complaints and settlements addressing online privacy. The article next addresses the roles that jurisdiction and competence play in framing claims and identifies a typology of the wrongful acts experienced by consumers. The research shows that four types of claims appear in both private litigation and public enforcement with respect to personal information: (1) unauthorized disclosure, (2) surreptitious collection, (3) failure to secure, and (4) undue retention. The article then applies this typology to map “zones of effectiveness” for the notice and choice regime. The article identifies which wrongs a proper notice and choice regime can and cannot address. The research demonstrates that while some wrongful practices might be avoided by the inclusion of specific statements in a notice, others will be incurable through notice. The latter set of wrongs is, thus, outside the “zone of effectiveness” of a notice and choice regime. Lastly, the article concludes with a discussion of whether and how the harms that consumers experience match the outcomes of litigation and FTC settlement orders.This research is supported by the National Science Foundation grant 1330214 “TWC SBE: Option: Frontier: Collaborative: Towards Effective Web Privacy Notice and Choice: A Multi-Disciplinary Prospective.”","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"875 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114149326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Transparency, Participation and EU Institutional Practice: An Inquiry into the Limits of the ‘Widest Possible’ 透明度、参与与欧盟制度实践:对“最广泛可能”限制的探讨
Pub Date : 2014-03-26 DOI: 10.2139/SSRN.2416242
P. Leino
The recent years have witnessed a growing concern in the EU institutions for the ways in which openness and citizen participation are believed to distract efficient decision-making. Various examples of such attitudes can be easily identified, demonstrating how the EU institutions still fail to possess a deeper understanding of the role of transparency in legitimate governance. This paper discusses the ways in which the right of public access often turns into institutional politics with the institutions and the Member States in fact buttressing their own interests. This has serious consequences for the understanding of citizens’ rights to participate in democratic decision-making. These questions are examined in the areas of legislative matters and international relations. The problems identified are then placed in the context of wider administrative culture in the relevant EU institutions, reflected in their responses to the citizens’ concerns. The paper concludes with a few remarks on the wishes of the European Council to create greater legitimacy for the Economic and Monetary Union, and the role of openness in that discussion.
近年来,欧盟各机构越来越担心,开放和公民参与被认为会分散有效决策的注意力。这种态度的各种例子可以很容易地找到,表明欧盟机构仍未能对透明度在合法治理中的作用有更深入的理解。本文讨论了公共获取权往往演变为制度政治的方式,机构和成员国实际上是在支持自己的利益。这对理解公民参与民主决策的权利产生了严重后果。这些问题在立法事项和国际关系领域进行审查。然后将确定的问题置于相关欧盟机构更广泛的行政文化背景下,反映在他们对公民关切的回应中。文章最后对欧洲理事会(European Council)希望为经济与货币联盟(Economic and Monetary Union)创造更大合法性的愿望以及开放性在这一讨论中的作用发表了一些评论。
{"title":"Transparency, Participation and EU Institutional Practice: An Inquiry into the Limits of the ‘Widest Possible’","authors":"P. Leino","doi":"10.2139/SSRN.2416242","DOIUrl":"https://doi.org/10.2139/SSRN.2416242","url":null,"abstract":"The recent years have witnessed a growing concern in the EU institutions for the ways in which openness and citizen participation are believed to distract efficient decision-making. Various examples of such attitudes can be easily identified, demonstrating how the EU institutions still fail to possess a deeper understanding of the role of transparency in legitimate governance. This paper discusses the ways in which the right of public access often turns into institutional politics with the institutions and the Member States in fact buttressing their own interests. This has serious consequences for the understanding of citizens’ rights to participate in democratic decision-making. These questions are examined in the areas of legislative matters and international relations. The problems identified are then placed in the context of wider administrative culture in the relevant EU institutions, reflected in their responses to the citizens’ concerns. The paper concludes with a few remarks on the wishes of the European Council to create greater legitimacy for the Economic and Monetary Union, and the role of openness in that discussion.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123721649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Looking at China's Facebook (RenRen) through the Lens of European Data Protection Principles 从欧洲数据保护原则看中国的Facebook(人人网)
Pub Date : 2013-04-29 DOI: 10.2139/ssrn.2257907
Kunbei Zhang, A. Schmidt
Social networking systems (SNS) are emerging as a cultural phenomenon in China and a Chinese SNS industry is rapidly developing. While greatly enriching their users' lives, these systems bring issues of private law data protection to the fore. The paper tests the data protection quality of RenRen (China's Facebook), by investigating how RenRen with its privacy arrangements of Chinese heritage would be understood in Europe anno 2013. The research method mainly consists in processing specific information on RenRen's compliance with EU data protection principles as well as observing privacy policies issued by RenRen. As presented in the conclusion section, the authors demonstrate that the differences between Chinese and EU private law data protection practices could well be converging as a result of the trend towards informational globalization, but that this trend is not yet sufficiently understood. As such this paper should be of interest to a broad readership including those interested in informational privacy, social networking and Chinese data protection law.
社交网络系统(SNS)作为一种文化现象正在中国兴起,中国的社交网络产业正在迅速发展。在极大地丰富用户生活的同时,这些系统也将私法数据保护问题带到了前台。本文通过调查2013年欧洲如何理解人人网及其中国传统隐私安排,来检验人人网(中国的Facebook)的数据保护质量。研究方法主要包括处理人人网遵守欧盟数据保护原则的具体信息,以及遵守人人网发布的隐私政策。正如结论部分所述,作者论证了由于信息全球化的趋势,中国和欧盟私法数据保护实践之间的差异很可能正在趋同,但这一趋势尚未得到充分理解。因此,本文应该引起广大读者的兴趣,包括那些对信息隐私、社交网络和中国数据保护法感兴趣的读者。
{"title":"Looking at China's Facebook (RenRen) through the Lens of European Data Protection Principles","authors":"Kunbei Zhang, A. Schmidt","doi":"10.2139/ssrn.2257907","DOIUrl":"https://doi.org/10.2139/ssrn.2257907","url":null,"abstract":"Social networking systems (SNS) are emerging as a cultural phenomenon in China and a Chinese SNS industry is rapidly developing. While greatly enriching their users' lives, these systems bring issues of private law data protection to the fore. The paper tests the data protection quality of RenRen (China's Facebook), by investigating how RenRen with its privacy arrangements of Chinese heritage would be understood in Europe anno 2013. The research method mainly consists in processing specific information on RenRen's compliance with EU data protection principles as well as observing privacy policies issued by RenRen. As presented in the conclusion section, the authors demonstrate that the differences between Chinese and EU private law data protection practices could well be converging as a result of the trend towards informational globalization, but that this trend is not yet sufficiently understood. As such this paper should be of interest to a broad readership including those interested in informational privacy, social networking and Chinese data protection law.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126508263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy, Law, Code and Social Networking Sites 隐私,法律,代码和社交网站
Pub Date : 2013-01-13 DOI: 10.4337/9781849805025.00021
L. Edwards
The problems created by the rise of social networks for user privacy have become well known throughout the world since the early paper co-authored by Edwards with Ian Brown of Oxford on data self regulation (http://ssrn.com/abstract=1148732). Reconciling the desire to self-disclose information with the simultaneous desire that this information be protected remains a difficult task, exacerbated by the increasing service provider monetisation of users data via profiling and targeted marketing both when interacting on and off the network itself. Building on the earlier work, this chapter analyses how law, code and norms all currently offer some but insufficient solutions to the problems of online social network privacy when faced with the market drive to make profits. The issues for children and young people are given particular attention, drawing on the work of inter alia boyd, palfrey and Livingstone. Although the law may provide some protections through traditional European DP law remedies, current law suffers from the general illusory nature of consent in the online consumer standard term contract environment. Regulation of SNS terms of service using ideas drawn from EU unfair contracts law may offer some help, bu tbest privacy protection is likely to arise from serious regulation of code in the shape of the defaults for disclosure on the sites themselves. The paper also proposes a user-friendly start up routine where users will shape their privacy preferences in a meaningful fashion and surveys some future solutions posited in the draft EC Data Protection Regulation.
自爱德华兹与牛津大学的伊恩•布朗(Ian Brown)就数据自我监管发表早期论文以来,社交网络兴起所带来的用户隐私问题已为全世界所熟知(http://ssrn.com/abstract=1148732)。协调自我披露信息的愿望与同时保护这些信息的愿望仍然是一项艰巨的任务,而越来越多的服务提供商通过分析和有针对性的营销在网络上和网络外进行交互时将用户数据货币化,这加剧了这一任务。在之前工作的基础上,本章分析了当前法律、法规和规范如何在面对市场盈利驱动时为在线社交网络隐私问题提供了一些但不足的解决方案。儿童和年轻人的问题受到特别关注,借鉴了博伊德、帕尔弗里和利文斯通等人的工作。尽管法律可以通过传统的欧洲DP法律补救措施提供一些保护,但现行法律在在线消费者标准期限合同环境中普遍存在“同意”的虚幻性。借鉴欧盟《不公平合同法》的理念来监管社交网站的服务条款可能会有所帮助,但最好的隐私保护可能来自于对网站本身默认披露形式的代码的严格监管。该文件还提出了一个用户友好的启动程序,用户将以有意义的方式塑造他们的隐私偏好,并调查了欧盟数据保护条例草案中提出的一些未来解决方案。
{"title":"Privacy, Law, Code and Social Networking Sites","authors":"L. Edwards","doi":"10.4337/9781849805025.00021","DOIUrl":"https://doi.org/10.4337/9781849805025.00021","url":null,"abstract":"The problems created by the rise of social networks for user privacy have become well known throughout the world since the early paper co-authored by Edwards with Ian Brown of Oxford on data self regulation (http://ssrn.com/abstract=1148732). Reconciling the desire to self-disclose information with the simultaneous desire that this information be protected remains a difficult task, exacerbated by the increasing service provider monetisation of users data via profiling and targeted marketing both when interacting on and off the network itself. Building on the earlier work, this chapter analyses how law, code and norms all currently offer some but insufficient solutions to the problems of online social network privacy when faced with the market drive to make profits. The issues for children and young people are given particular attention, drawing on the work of inter alia boyd, palfrey and Livingstone. Although the law may provide some protections through traditional European DP law remedies, current law suffers from the general illusory nature of consent in the online consumer standard term contract environment. Regulation of SNS terms of service using ideas drawn from EU unfair contracts law may offer some help, bu tbest privacy protection is likely to arise from serious regulation of code in the shape of the defaults for disclosure on the sites themselves. The paper also proposes a user-friendly start up routine where users will shape their privacy preferences in a meaningful fashion and surveys some future solutions posited in the draft EC Data Protection Regulation.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Prescription to Balance Secrecy and Disclosure in Drug-Approval Processes 在药物审批过程中平衡保密和公开的新处方
Pub Date : 2012-12-12 DOI: 10.36646/mjlr.46.1.new
Gerrit M. Beckhaus
To obtain approval to market a drug, a manufacturer must disclose significant amounts of research data to the government agency that oversees the approval process. The data often include information that could help advance scientific progress, and are therefore of great value. But current laws in both the United States and Europe give secrecy great weight. This Article proposes an obligatory sealed-bid auction of the sensitive information based on the experience with similar auctions in mergers and acquisitions, to balance manufacturers' interest in secrecy and the public interest in disclosure.
为了获得药品上市许可,制造商必须向监督审批过程的政府机构披露大量的研究数据。这些数据通常包括有助于推动科学进步的信息,因此具有很大的价值。但美国和欧洲的现行法律都给予保密很大的权重。本文在借鉴企业并购拍卖经验的基础上,提出对敏感信息实行强制密封拍卖,以平衡企业保密利益和公众披露利益。
{"title":"A New Prescription to Balance Secrecy and Disclosure in Drug-Approval Processes","authors":"Gerrit M. Beckhaus","doi":"10.36646/mjlr.46.1.new","DOIUrl":"https://doi.org/10.36646/mjlr.46.1.new","url":null,"abstract":"To obtain approval to market a drug, a manufacturer must disclose significant amounts of research data to the government agency that oversees the approval process. The data often include information that could help advance scientific progress, and are therefore of great value. But current laws in both the United States and Europe give secrecy great weight. This Article proposes an obligatory sealed-bid auction of the sensitive information based on the experience with similar auctions in mergers and acquisitions, to balance manufacturers' interest in secrecy and the public interest in disclosure.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facebook, Privacy and the Challenges of Protecting Minors on Social Networking Sites Facebook,隐私和在社交网站上保护未成年人的挑战
Pub Date : 2011-04-20 DOI: 10.2139/SSRN.1878035
Aspasia Tsaoussi
Online social networking services such as Facebook, Twitter and LinkedIn have proliferated in recent years. In this paper, we will focus on the impact of Facebook, which is the network with the most users worldwide (as of March 2011 Facebook had more than 640 million registered users). Facebook has multiple uses: it is potentially and concurrently a dating site, a friend locator, and a public relations tool. We examine both the positive and the negative repercussions of the Facebook phenomenon. We then look more closely at one of its main effects: the fact that it serves to efface the boundaries in the traditional public/private dichotomy. Supposedly Facebook protects its users through privacy settings. Yet users add personal details (like email addresses, cell phone numbers, and photos). If something goes wrong, questions arise as to the legal relationship that users have agreed to. Who has access to their personal information? What is the meaning of the Facebook disclaimer in its “Terms of Service” (the online equivalent of “fine print” in contracts of adhesion)? Perhaps only lawyers know that under Facebook’s ToS, users give up copyright control of any material posted. As a result, laypersons at best remain partially protected. Privacy issues and data protection concerns (esp. protecting users who cannot protect themselves, such as minors under 18 who regularly use the medium) clash with freedom of expression/freedom of speech/freedom of information. The legislator concerned with efficiently regulating the use of online social networks needs to accommodate these conflicts, devising wise and balanced solutions.
近年来,Facebook、Twitter和LinkedIn等在线社交网络服务激增。在本文中,我们将重点关注Facebook的影响,这是全球用户最多的网络(截至2011年3月,Facebook拥有超过6.4亿注册用户)。Facebook有多种用途:它可能同时是一个约会网站、朋友定位器和公共关系工具。我们考察了Facebook现象的正面和负面影响。然后,我们更仔细地研究了它的主要影响之一:它有助于消除传统公共/私人二分法的界限。据说Facebook通过隐私设置来保护用户。但用户可以添加个人详细信息(如电子邮件地址、手机号码和照片)。如果出现问题,用户同意的法律关系就会出现问题。谁有权访问他们的个人信息?Facebook的“服务条款”(相当于网络上的附则合同中的“小字”)中的免责声明是什么意思?也许只有律师知道,根据Facebook的服务条款,用户放弃了对发布的任何内容的版权控制。因此,外行最多只能得到部分保护。私隐问题及资料保护(特别是保护不能保护自己的用户,例如经常使用媒体的18岁以下未成年人)与言论自由/言论自由/资讯自由相冲突。立法者关注有效地规范在线社交网络的使用,需要适应这些冲突,设计明智而平衡的解决方案。
{"title":"Facebook, Privacy and the Challenges of Protecting Minors on Social Networking Sites","authors":"Aspasia Tsaoussi","doi":"10.2139/SSRN.1878035","DOIUrl":"https://doi.org/10.2139/SSRN.1878035","url":null,"abstract":"Online social networking services such as Facebook, Twitter and LinkedIn have proliferated in recent years. In this paper, we will focus on the impact of Facebook, which is the network with the most users worldwide (as of March 2011 Facebook had more than 640 million registered users). Facebook has multiple uses: it is potentially and concurrently a dating site, a friend locator, and a public relations tool. We examine both the positive and the negative repercussions of the Facebook phenomenon. We then look more closely at one of its main effects: the fact that it serves to efface the boundaries in the traditional public/private dichotomy. Supposedly Facebook protects its users through privacy settings. Yet users add personal details (like email addresses, cell phone numbers, and photos). If something goes wrong, questions arise as to the legal relationship that users have agreed to. Who has access to their personal information? What is the meaning of the Facebook disclaimer in its “Terms of Service” (the online equivalent of “fine print” in contracts of adhesion)? Perhaps only lawyers know that under Facebook’s ToS, users give up copyright control of any material posted. As a result, laypersons at best remain partially protected. Privacy issues and data protection concerns (esp. protecting users who cannot protect themselves, such as minors under 18 who regularly use the medium) clash with freedom of expression/freedom of speech/freedom of information. The legislator concerned with efficiently regulating the use of online social networks needs to accommodate these conflicts, devising wise and balanced solutions.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115134944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Law Enforcement Surveillance Reporting Gap 执法监督报告差距
Pub Date : 2011-04-10 DOI: 10.2139/SSRN.1806628
Christopher Soghoian
Third party facilitated surveillance has become a routine tool for law enforcement agencies. There are likely hundreds of thousands of such requests per year. Unfortunately there are few detailed statistics documenting the use of many modern surveillance methods. As such, the true scale of law enforcement surveillance, although widespread, remains largely shielded from public view.Prior to the widespread adoption of the Internet and mobile phones, law enforcement agencies’ use of third party facilitated electronic surveillance was largely limited to real-time interception of communications content ("wiretapping") and non-content data (through the use of "pen register" and "trap and trace" orders). In order to increase its ability to perform effective oversight, Congress mandated that annual reports be created documenting the use of these surveillance powers. These reports are intended to enable policy makers as well as the general public to determine the extent to which such surveillance methods are used, and in the words of Senator Patrick Leahy, provide a "far more reliable basis than anecdotal evidence on which to assess law enforcement needs and make sensible policy in this area."The existing surveillance statistics might be sufficient if law enforcement agencies’ surveillance activities were limited to wiretaps and pen registers. However, over the last decade, law enforcement agencies have enthusiastically embraced many new sources of investigative and surveillance data for which there are no mandatory reporting requirements. As a result, most modern surveillance now takes place entirely off the books and the true scale of such activities, which vastly outnumber traditional wiretaps and pen registers, remains unknown. In this article, I examine the existing electronic surveillance reporting requirements and the reports that have been created as a result. Some of these have been released to public, but many have only come to light as a result of Freedom of Information Act requests or leaks by government insiders. I also also examine several law enforcement surveillance methods for which there are no existing legally mandated surveillance reports. Finally, I propose specific legislative reporting requirements in order to enable some reasonable degree of oversight and transparency over all forms of law enforcement electronic surveillance.
第三方监控已成为执法机构的常规工具。每年可能有数十万个这样的请求。不幸的是,很少有详细的统计数据记录许多现代监测方法的使用情况。因此,执法部门监控的真实规模尽管广泛存在,但在很大程度上仍不为公众所知。在广泛采用互联网和移动电话之前,执法机构对第三方电子监控的使用主要局限于实时截获通信内容(“窃听”)和非内容数据(通过使用“笔录”和“陷阱和追踪”命令)。为了增强其进行有效监督的能力,国会要求创建年度报告,记录这些监督权力的使用情况。这些报告旨在使政策制定者和公众能够确定此类监视方法的使用程度,用参议员帕特里克·莱希(Patrick Leahy)的话来说,这些报告提供了“比轶事证据可靠得多的基础,以评估执法需求,并在这一领域制定明智的政策”。如果执法机构的监视活动仅限于窃听和笔录,现有的监视统计数据可能就足够了。然而,在过去十年中,执法机构热情地接受了许多新的调查和监视数据来源,这些来源没有强制性的报告要求。其结果是,大多数现代监视活动现在完全是秘密进行的,此类活动的真实规模远远超过传统的窃听和笔录,目前仍不得而知。在本文中,我将研究现有的电子监视报告需求以及由此创建的报告。其中一些已经向公众发布,但许多是由于《信息自由法》(Freedom of Information Act)的要求或政府内部人士泄露才被曝光的。我还研究了几种没有现有法律规定的监视报告的执法监视方法。最后,我提出具体的立法报告要求,以便对所有形式的执法电子监视进行某种程度的合理监督和透明度。
{"title":"The Law Enforcement Surveillance Reporting Gap","authors":"Christopher Soghoian","doi":"10.2139/SSRN.1806628","DOIUrl":"https://doi.org/10.2139/SSRN.1806628","url":null,"abstract":"Third party facilitated surveillance has become a routine tool for law enforcement agencies. There are likely hundreds of thousands of such requests per year. Unfortunately there are few detailed statistics documenting the use of many modern surveillance methods. As such, the true scale of law enforcement surveillance, although widespread, remains largely shielded from public view.Prior to the widespread adoption of the Internet and mobile phones, law enforcement agencies’ use of third party facilitated electronic surveillance was largely limited to real-time interception of communications content (\"wiretapping\") and non-content data (through the use of \"pen register\" and \"trap and trace\" orders). In order to increase its ability to perform effective oversight, Congress mandated that annual reports be created documenting the use of these surveillance powers. These reports are intended to enable policy makers as well as the general public to determine the extent to which such surveillance methods are used, and in the words of Senator Patrick Leahy, provide a \"far more reliable basis than anecdotal evidence on which to assess law enforcement needs and make sensible policy in this area.\"The existing surveillance statistics might be sufficient if law enforcement agencies’ surveillance activities were limited to wiretaps and pen registers. However, over the last decade, law enforcement agencies have enthusiastically embraced many new sources of investigative and surveillance data for which there are no mandatory reporting requirements. As a result, most modern surveillance now takes place entirely off the books and the true scale of such activities, which vastly outnumber traditional wiretaps and pen registers, remains unknown. In this article, I examine the existing electronic surveillance reporting requirements and the reports that have been created as a result. Some of these have been released to public, but many have only come to light as a result of Freedom of Information Act requests or leaks by government insiders. I also also examine several law enforcement surveillance methods for which there are no existing legally mandated surveillance reports. Finally, I propose specific legislative reporting requirements in order to enable some reasonable degree of oversight and transparency over all forms of law enforcement electronic surveillance.","PeriodicalId":179517,"journal":{"name":"Information Privacy Law eJournal","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117050532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Information Privacy Law eJournal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1