Ch. 2 - Privacy

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Judge Richard Posner

Gives economic argument for privacy as a property right; some information should have property rights while some shouldn't. Any information that might be profitable but expensive to collect for a business should be given a property right. The main issue of Posner's views is that it seems to waive privacy in favor of economics.

Riley v. California (2014)

Held that police must obtain a warrant before searching a smartphone for information.

Free-Market View

- The freedom of individuals, as consumers or in businesses, to make voluntary agreements; - The diversity of individual tastes and values; - The flexibility of technological and market solutions; - The response of markets to consumer preferences; - The usefulness and importance of contracts; - The flaws of detailed or restrictive legislation and regulatory solutions (stifling innovation) - Emphasizes informed consent and freedom of contract - People and organizations have the right to use and disclose information that was obtained without any rights violations (like theft). - Prefers penalties to organizations that violate the rules - Can be associated with negative rights

Warren and Brandeis

People have a "right to privacy." Criticized newspapers and gossip columns. Believed that true personal information leaks should be lawfully prevented alongside false information leaks (slander). Beliefs excepted information of general interest (news). Critics argue that their views are too broad and conflict with other rights like freedom of press. Their views also allow some things that violate privacy, such as the sharing of information that one smokes cigarettes to a life insurance company; their views don't rule out targeted marketing (though they wouldn't support it).

Privacy as a Positive vs. Negative Right

Positive Right: Stop others from spreading information about us Negative Right: We can choose to refrain from giving information to those we don't wish to

Privacy Risks and Principles

Privacy Threat categories: - Intentional, institutional uses of personal info - Unauthorized use or release by "insiders" - Theft of info - Inadvertent leakage of info - Our own actions New Tech Threats: - Search query data - Smartphones with location data - Anything we do in cyberspace is recorded. We cannot directly protect our info, we depend on businesses and organizations to protect it.

Privacy Act of 1974

Restricts the way in which personal data can be used by federal agencies Individuals must be permitted access to information stored about them and may correct any information that is incorrect. Agencies must insure both the security and confidentiality of any sensitive information.

Katz v. US (1967)

Reversion of Olmstead v. US. Regardless of the location, a conversation is protected from unreasonable search and seizure under the Fourth Amendment if it is made with a "reasonable expectation of privacy." 4th amendment protects people, not places.

Stingray

Used to track mobile phones, state and federal (not supreme) ruled they violate 4th amendment if no warrant

Consumer Protection View

- Emphasize unsettling uses of personal information - Costly and disruptive results of errors in databases - Ease with which personal information leaks out - Consumers need protection from their own lack of knowledge, judgment, or interest. - Argue for more stringent consent requirements, legal restrictions on consumer profiling, prohibitions of certain types of contracts or agreements to disclose data, and prohibitions on businesses collecting or storing certain kinds of data - Prefer opt-in for secondary use of data rather than opt-out, and prevent waivers and broad consent agreements for secondary usage - Joe-Maria scenario too outlandish; power difference between individual and business, as well as spread of information quickly in a complex society

Key Aspects of Privacy

- Freedom from intrusion - Control of information about oneself - Freedom from surveillance - Personal Information - Providing Informed Consent (opt in or out) Bad Things - Invisible Information Gathering - Secondary Use (Use of information for something other than which it was provided for) - Data Mining - Computer Matching and Profiling (Use of collected info to match data to certain people)

Fair Information Principles

1. Inform people when you collect information. 2. Collect only the data needed. 3. Offer a way for people to opt out. 4. Keep data only as long as needed. 5. Maintain accuracy of data. 6. Protect security of data. 7. Develop policies for responding to law enforcement requests for data.

Olmstead v. US (1928)

1928, the government can tap your phone without a warrant or court order. Interpreted the 4th amendment to only apply to physical possessions and material things.

Smith v. Maryland (1979)

3rd Party Doctrine: Established that police do not need a warrant for pen register data (the record of who you were calling and when), because there is no reasonable expectation of privacy when you voluntarily transmit that data to a third party (the phone company). VERY IMPORTANT JUSTIFIES NSA

Market-Oriented Solution

Advocate that many volunteer organizations will provide consumer education, develop guidelines, monitor the activities of business and government, and pressure businesses to improve policies.

E-Government Act of 2002

An act to enhance the management and promotion of electronic Government services and processes by establishing a Federal Chief Information Officer within the Office of Management and Budget, and by establishing a broad framework of measures that require using Internet-based information technology to enhance citizen access to Government information and services, and for other purposes.

Profiling

Analysis that finds groups of people most likely to engage in a behavior

Kyllo v. US (2001)

Law enforcement officials cannot examine the inside of a home with a thermal-imaging device unless they obtain a warrant. Court interpreted this action as using a non-publicly available tool to perform a search into a house from outside that reveals the same info as a physically intrusive search

Security Camera Tradeoff

Increase security, decreased privacy

US v. Jones (2012)

Jones was arrested for drug possession and without a judicial approval, they put a tracker on his jeep. By doing so, the court was able to convict Jones of some charges. The SCOTUS ruled that those charges are not valid because the tracker was put on the car without a search warrant, which violates the 4th Amendment.

Noninvasive

New tech makes noninvasive (doesn't actively cause damage) but deeply revealing searches, like packet sniffing, imaging systems, location trackers

U.S. v. Miller (1976)

No right to privacy in bank records; rights not violated when 3rd party transmits entrusted information to government

Judith Jarvis Thomson

People cannot have a "right" to something that is not clearly defined, so privacy must be considered within context. You can inadvertently or intentionally waive your right to certain privacies. For instance, going out in public waives your right to not be seen by others, unlike if you stay at home.

Positive Rights (Claim-Rights)

Rights that state that some group of people is obligated to provide certain things for others (ex. unemployment benefits from govt)

Fourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. - Sets limits on the government to search and seize our stuff - Bypassed by new database technology and similar stuff

Negative Rights (Liberties)

The rights to act without interference; rights to life, liberty, property as examples


संबंधित स्टडी सेट्स

PSYC 300 Exam 4 Studyguide - TAMU Dr. Edens

View Set

BACC 512 CHAPTER 12 Current Liabilities

View Set

Unit Test: Alcohol, Tobacco, and Other Drugs

View Set

Adam Smith and Free Market Economy

View Set

Structure, Function, and Regulation of the Heart

View Set