CS 340 test 1 module 3
EMPLOYEE MONITORING monitoring methods -_____________ "electronic sweatshop" -_______________: #, length, duration, idle time -______________: even on break, who with argument that this brings up privacy issues, employers say that is not an issue this is their job
-electronic quotas -phone call monitoring -location monitoring
EMPLOYEE MONITORING: why monitor? -guard _________ - prevent ___________ -___________ evaluations -liability for __________
-guard trade secrets -prevent abuses of computer resources -performance evaluations -liability for harassment
by law, NSA may not ________ Americans what are the exceptions of this?
"spy on" -if the American is connected to the terror suspect by at least 2 other people (no longer 6 degrees of separation between people now its more like 4.74). some one that worked at NSA after the leaks said it is typical policy for them to go as far as 3 people of separation really -phone call meta data (time/duration of calls, geo location, serial number of phone, phone numbers of participants, etc) is NOT considered private information support for this practice comes from the THIRD PARTY DOCTRINE
fallout of the leak: changes and impact: -in 2014, president Obama issued a policy change, allowing tech companies to....? - President Obama also ordered a change in how.....? -2014 update from NSA chief Admiral Michael S. Rogers.....?
-publicly disclose government requests for consumer data -the meta data was stored and accessed -tech companies want to be legally compelled before they turn over information -tech companies "more reluctant" to turn over information on foreigners in foreign lands -tech companies speaking out about internal changes
_______________: "the enumeration in the constitution of certain rights, shall not be construed to deny or disparage others retained by the people." meaning?
9th amendment meaning: yes, the constitution lists out certain rights but there may be rights that are not listed that are very important. just because privacy is not listed out does not mean it is not important.
EXAMPLES OF CONSUMER BACKLASH explain the FAcebook Beacon example
Fandango, eBay and 42 other online businesses paid Facebook to do "word of mouth" advertising. FB users surprised to learn information about their purchases was shared with friends (beacon was based on an opt-out policy). beacon was strongly criticized, and FB switched to an opt-in policy regarding Beacon
EXAMPLES OF CONSUMER BACKLASH: explain the marketplace: households example
Lotus development corporation teamed up with credit reporting company Equifax to develop a CD with information on 120 million Americans. planned to sell CD to small businesses so they could create mailing lists based on certain criteria such as household income. more than 30,000 consumers complained to Lotus about invasion of privacy and they dropped the plans to sell the CD.
who created cookies? what did he originally create it for and what are they used for now?
Lou Montulli originally: to allow for shopping cart functionality (online memory). effort made to not allow the sharing of these between sites now: third party cookies- site to site. behavioral targeting- ad network, relationship with same advertiser
explain the Catalano case study
Michele catalano was looking for info about pressure cookers and her husband in the same time frame was Googling backpacks. A terrorism task force showed up at their house to see if they were terrorists. the Gov knew what they were Googline because they were on Catalano's work computer and his employer saw these searches and got suspicious and turned it into the gov
NASA v. Nelson case (2011)
Nelson was agry about the extensive background checks NASA put him through when considering him for a job so he sued them. court sided with NASA saying in this modern time you should expect potential employers to do this
SARA BAASE, A GIFT OF FIRE: what does she say about disclosing information and secondary use of information?
disclosing information: in privacy analysis determining the ethics of an action of information gathering "the critical point is whether the user is told and thus can make an informed choice" secondary use of information: occurs when the information is used "for a purpose other than the one for which it was supplied" (ex: you give company your address so they can ship you your purchase and they give it to other people to use to send you more targeted mailing)
what was the Griswold V Connecticut (US supreme court 1965) case?
about birth control. there was an old 1879 law that prohibited the use of any drug for the purpose of preventing conception. Griswold and dr. Buxton opened a planned parenthood type of thing and gave people birth control. they were prosecuted for this and convicted appealed to the US supreme court challenging conviction under the 14th amendment (states cant restrict your federal freedoms) outcome: supreme court said Connecticut was taking away federal freedoms that people have to handle private matters (whether to have children, take birth control etc) so law is overturned
____________: aka pixel tag, web bug. it is an invisible image- transparent, has no color to it (1 X 1) embedded on a web page. image is NOT placed there by website, but by other companies for ad tracking. this information is bundled into a profile
beacon
what are the benefits and harms of privacy?
benefits: -necessary to develop relationships -safety and security -creativity harms: -concealment of wrongdoing -lack of community support
______________: process in which the brain converts a sequence of actions into an automatic routine (ex: putting toothpaste on your toothbrush before you put it in your mouth)
chunking**
TYPES OF DATA MINING: -____________: combining info from different data bases using an identifier each has in common -___________ analyzing data to determine common characteristics of people likely to engage in a behavior (uses: find new customers, ID terror suspects)
computer matching computer profiling
what is judge Posner's view of privacy?
concealment. he does NOT embrace privacy as a stand alone right. No right to privacy, people only want this to conceal wrongdoing or prevent embarrassment
____________: small text file that stores information (stored client side, on hard drive)
cookies
____________: searching and analyzing masses of data to find patterns and develop new info
data mining
privacy is a contested issue. some people think it should be a stand alone right, some people think it is a _____________(meaning it relates only to other rights you may have, there isn't just a right to privacy)
derivative
what is spokeo.com
the website that teacher used in lecture to show how much information you can find about someone so fast (she used her dad)
how did target figure out a teen girl was pregnant before her father?
they have algorithms that predict things such as pregnancy. she was purchasing certain things like unscented lotion, vitamins, soap, cotton balls which was all put together into the pregnancy prediction score, showing that its likely that she is pregnant. so they started sending her coupons for baby clothes, cribs, diapers etc.
_______________________: "the first time a site is visited, it installs a tacking file, which assigns the computer a unique ID number. later, when the user visits another site affiliated with the same tracking company, it can take note of where that use was before, and where he is now. this way, over time the company can build a robust profile."
third party tracking files
social psychologists have determined that when you go through major life events (pregnancy, divorce, graduate, get married etc.) your shopping habbits become flexibile in ways that were both predictable and potential gold mines for retailers.
true
third party cookies allow people to track what you have seen across different sites
true
true/false: most european countries have specific laws and regulations protecting an individual's (consumer) privacy
true
-true/false: current technology makes it feasible, practical and worth economic sense to gather information about each and every purchase -who does this information have value to?
true manufacturers, merchants, similar sellers, other customers
true/ false: profiles are bought and sold
true ex: "fans of 50 first dates", "southern women"
Does the 4th amendment apply to employee monitoring?
usually not relavent, unless the government is your employer. 4th amendment is protecting citizens from the government. private employer relationships, 4th amendment is likely not relavent.
______________: political campaigns combine voter information with other information available
microtargeting
some protections of privacy take the form of negative or positive rights, but most are?
negative rights
what was the Kyllo v. US (US supreme court 2001) case?
neighbors complained about Kyllo saying he was a drug dealer. police could not get a search warrant for his house because they did not have enough probable cause. then they use thermal image technology to detect that he is growing weed, so they take it to the judge and use that as probable cause for a warrant. Kyllo appealled and court decided that you cannot use technology to search somewhere that you do not have a warrant for issue: whether use of thermal imaging camera constituted a search under the 4th amendment and therefore resulting evidence not admissible as there was no valid search warrant
is there an explicit constitutional guarantee of privacy?
no. there is not the word "privacy anywhere in the constitution. but many people think it can be derived from other constitutional provisions
are privacy concerns new? (did they exist before use of computers)
no. they existed before computers: paper files, wire taps, phone taps, spies
Where is Edward Snowden now?
Russia has given him a place of exhile where he can live, he just asked for an extension for his Russian visa. he is working for Russian government to stop spying against russia
__________: is a liberty or entitlement owed to a person because he or she is a person.
a right
INFORMATION DISCLOSURES: -_____________: to gain admission to the Super Bowl since 2002; Facebook's tag suggestions -___________: location to 100m -_____________: allowing store to track your purchases in exchange for discounts etc. -____________ -____________: tiny wireless transmitter. give more info about the product being purchased than bar code and easier to scan, they are not turned off when the item is purchased, other people can read the items -___________ -__________ :can make suggestions about what you might want to watch based on your previous viewing habits -____________: allows you engine power to be cut off from a far incase your car is stolen, can help locate your car, and if you are in an accident sends responders to you -____________: records info about automobile. after an accident investigators can retrieve the data collected in the 5 seconds before the accident (speed etc)
- facial recognition software -enhanced 911 -rewards and loyalty programs -body scanners -RFID tags -implanted chips -DVR -OnStar, mbrace -automobile "black boxes"
comparing US and European policies: -US focus is on _______________ (issues relate to finding a balance between an organization's legitimate business interests and accommodating an individual's privacy interests - continental Europe focus is on _________ and the idea that the worker's dignity must not be different because the worker is at his/her place of work (italian prohibition of most remote surveillance. French labor code, article 120-2, bars measures that are not justified by the nature of task or proportional to the objective of the business)
- ownership of resources -human dignity
United States Foreign Intelligence Surveillance Court (FISC): -what does this court do? -stats of approval?
-FISC court operates in the "special-needs" exception. oversees requests for surveillance warrants by federal law enforcement and intelligence agencies -stats: tons of requests submitted and approved each year. in 35 year history only 11 requests have been denied ("rubber stamping" court?)
EMPLOYEE MONITORING: -not a new concept, changing methods. now impacts both _______________ -____________: more precise, more detailed, unseen. the workplace as a "____________" (bentham came up with this. a way of designing prisons where basically prisoners cant tell when they are being watched so they need to behave like they are all the time)
-both blue and white collar workers -computer monitoring
cases asserting employer rights to read email: -usually the courts side with ________ about this -much emphasis is placed on the employer's _________________ -courts may rule differently if there is evidence employer was __________________________ -know Bourke v. Nissan -know Smyth v. Pillsbury -know US v. Hamilton
-employer -ownership of the equipment the employee is using -trying to snoop on personal, union, or whistle-blowing activities -Bourke was an employee at an infinity dealership (owned by Nissan) she was applauded for using emails to sell cars. They had a training program and had her open her emails to show an example of what she would send to a customer and something inappropriate came up and she was fired. She sued and said it was private email. Court sided with Nissan -Similar to above. Smith was expressing opinions in email that were read by boss and he was fired. He sued. Court sided with Pillsbury -goes into the area of privilege Examining whether emails sent to wife using employee account were confidential. Court said that he waived his right of spousal privilege by using his company email
June 2013 interview of Snowden in Hong Kong -Why did snowden do this? -why did he not choose to be anonymous with the leak? -what is his biggest fear?
-when he got into a higher position he started seeing unjust things a lot more than the average employee and eventually he just could'nt stay quiet anymore saying it was up to the public to determine if these programs are right or wrong not them. -he thinks the public is owed an explanation from the people that disclose things like this. he wants to be on the record saying the truth about these things -that nothing will change
Snowden leaked information about these programs: 1. 2. 3. 4. 5. 6.
1. PRISM (one of the more famous leaks. PRISM was a NSA program that demanded information from tech companies like google etc.) 2. details on MAINWAY (cell calls that were recorded, the database had the information about these calls) 3. BOUNDLESS INFORMANT (data visualization tool that identified trends) 4. TEMPORA (british intercept program, info on the internet was intercepted without people knowing) 5. BULLRUN (dealt with the NSA trying to break inscription strategies) 6. STELLARWIND (ten year program 2001-2011, collecting metadata on American's Internet. IP addresses, email addresses, Bcc: addresses)
privacy concerns have been exacterbated by cyber technology in atleast 4 ways, i.e. by the: 1. 2. 3. 4.
1. amount of personal information that can now be collected 2. speed at which personal information can now be transferred and exchanged 3. duration of time in which personal information can now be retained 4. kind of personal information (such as transactional information) that can be acquired
limitations of the Privacy Act (from william Petrocelli Low Profile: How to avoid the privacy invaders) 1. 2. 3. 4.
1. applies only to government databases not private ones (ex: a private company like amazon does not have to follow these principles) 2. applies only to records that use a personal identifier: name, number 3. no agency is in charge of enforcement, individual agencies choose what is exempt 4. inter-agency sharing of info for "routine use" (each agency is able to decide what "routine use" means)
technology has 2 major impacts on privacy: 1. ____________________ -_____________(data storage) -_____________ (new data) -_____________ (new data) -_______________ (data access) 2. _______________ -large data stores -small mistakes may have large impact
1. new technologies -databases (data storage) -imaging systems (new data) -sensors, monitors (new data) - web & the Internet (data access) 2. issues of scale
what are the 3 dictionary definitions of privacy? the book, page 229 talks about privacy as a notion of _________ and describes privacy as ______________
1. seclusion 2. secrecy or concealment 3. freedom from intrusion (negative right) access, "zone of inaccessibility"
_______________: section 1: "all persons born or naturalized in the United States, and subject to jurisdiction there of, are citizens of the united states and the state wherein...." meaning?
14th amendment meaning: anyone born in theUS is a citizen and has the privileges and immunities of a US citizen that cannot be taken away. due process clause. equal provisions clause
_____________: codified 5 principles related to government handling of information 1. 2. 3. 4. 5.
1974 Privacy act 1. notice/awareness (give notice make people aware that this is happening) 2. choice/consent 3. Access Participation (you have a right to hear the record of information kept about you- idea that gov shouldnt keep secret files on anyone) 4. integrity/security (dont let just anyone access that info and dont let inappropriate changes occur to that information) 5. Enforcement/Redress (when there's a problem with the info, when you want something corrected they have to have a policy for you to be able to see that through)
what is the case that asserts the privacy right of the employee?
2010 New Jersey case, Stengart v. Loving Care -stengart was suing employer for gender discrimination. she used her company email to email her attorney -NJ s. Ct. held Stengart had a responsible expectation of privacy in her emails to her attorney due to Loving Care's ambiguous privacy policy, allowance of personal use on the computer & importance of attorney client privilege
______________: "no soldier shall in time of peace be quartered in any house, without the consent of the owner, nor in time of war, but in a manner to be prescribed by law." meaning?
3rd amendment meaning: : based on old colonial practice means you do not have to keep soldiers in your house
____________: "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall no be violated, and no warrants shall be issue, but upon probable cause supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things being seized" meaning?
4th amendment meaning: aimed at colonial practice of "enter and seize" says no search warrants without probable cause
______________: "no person shall be held to answer for a capitol; or otherwise infamous crime, unless on a presentment or indictment of a grand jury, except in case arising in the land of naval forces..." meaning?
5th amendment meaning: cant be tried for the same offense
______% of employers monitor Internet use _____% block some sites from being accessed
76% 65%
NY times article "NSA able to foil baseic safegaurds of privacy on the web": -claims NSA has been waging a "secret war" code named ___________ on encryption. 1. the use of supercomputers to _________ 2. "collaberation" with tech companies to build "entry points" into their products (created weaknesses, backdoors. shared keys) 3. targeted computers to _________ before encryption took place, or at destination after message decrypted internet technology companies: claimed tactics against internet companies by NSA -___________ cooperation -____________ their encryption keys -__________ their software/hardware without the companies knowing it -forcing their cooperation through _________________
BULLRUN break codes snare messages -voluntary cooperation -stealing -altering -court orders in the United States Foreign Intelligence Surveillance court
give examples of laws that impact consumer and citizen privacy
Fair Credit Reporting Act, 1970 Right to financial privacy Act, 1978 Cable Communications Policy Act (about your cable subscriptions) video protection privacy Act 1988 (a reporter got a supreme court nominee's video rental history and published it in the news) Driver's Protections Privacy Act 1994 (deals with the information you hand over to the DMV when you get a license, handling policies with that info. Many states were selling their citizens vital statistics and information) children's online privacy protection act COPPA, 1998 (deals with protecting information about children under the age of 13 be shared online and be in record) Health Insurance Portability and Accountability Act HIPPA, 2001 (limits how doctors, hospitals, pharmacies and insurance companies can use medical information collected from patients) genetic information nondiscrimination act (designed to prevent discrimination in the areas of medical benefits and employment based on genetic information)
what was the Katz v. US (supreme court 1967) case?
Katz opened a bar and was suspected of being a bookie/being involved with the mafia. FBI had warrants for the tap of the phone in his bar but he would place his bets in a public phone booth outside of the bar. FBI tried to get warrant to record conversations at this phone booth but judge said no. so they placed a listening device right outside of the phone booth, saying it was a public place and this is just what someone would be able to hear if they were just walking by. court said he had a reasonable expectation of privacy so FBI had to throw out all of this evidence argument: it was outside in a not protected space court said "4th amendment protects people, not just places" "what one seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."
EXAMPLES OF CONSUMER BACKLASH explain Netflix prize example
Netflix offered $1 million prize to any group that could come up with a significantly better algorithm for predicting user ratings. released more than 100 million movie ratings from a half million customers (stripped ratings of private information). Researchers demonstrated that ratings are not truly anonymous if a little more information from individuals was available (so they started using their gender and zip code). US federal trade commission complaint and lawsuit, netflix canceled sequel to Netflix Prize
third party doctrine was established in what case?
Smith v. Maryland (US supreme court 1979) -deals with 4th amendment, reasonable expectation of privacy -because users "convey" phone # to the phone company, no expectation of privacy in the #s you dial -"this court consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties: third party doctrine
what is Lotame?
a data management intelligence company
what was the Illinois v. Caballes (US supreme court 2005) case?
drug sniffing dog as technology. Caballes pulled over for traffic violation. officer had drug dog with him and he let it out to pee and the dog started giving the officer his drug detection alert so the officer searched the mans car and found drugs. Caballes tries to appeal these drug charges using Kyllo case saying drug sniffing dog is technology and he didnt have a search warrant to use that technology. officers do NOT need a warrant to use drug dogs Caballes looses because court says this search is ok and different from Kyllo because this particular technology (drug sniffing dog) only detects illegal behavior (drugs), but things like the heat sensor is used for many different things.
EXAMPLES OF CONSUMER BACKLASH explain Instagram's proposed change to terms of service
late 2012: Instagram announced changes (privacy policy, Terms of service). legal experts- Instagram and FB would have right to use photos in ads without permission. Instagram CEO- new policy misunderstood. changed advertising section of terms of service agreement back to original version.
_____________: leaked details of the inter workings of NSA's surveillance infrastructure. American citizen charged with theft of government property and violating the ____________ (unauthorized communications of national defense information, willful communication of classified intelligence to unauthorized persons)
edward snowden espionage act
increasing numbers of states are considering and passing bills prohibiting ____________ (some provisions may include students at universities) _______ states have considered legislation these states have passed legislation: MI, DE, NJ, MD, IL, AR, CO, NV, NM, OR, UT, WA & CA
employer snooping 24 states
EXAMPLES OF CONSUMER BACKLASH: explain Malls Track Shoppers' Cell phones
in 2011 2 malls recorded movement of shopper by tracking locations of cell phones (how much time people spend in each store, do people who shop at X also shop at Y, are there unpopular areas of the mall etc). small signs informed shoppers of study and said if you want to opt-out you have to turn off your phone. after protest, mall quickly halted study
EXAMPLES OF CONSUMER BACKLASH explain iPhone Apps Upload Adress books
in 2012 a programmer discovered Path was uploading iPhone address books without permission. Internet pointed out this practice violated Apple's guidelines. CEO of Path apologized; app rewritten. Twitter, Foursquare, and Instagram also implicated for same practice
what is Ghostery?
in lecture an exmaple of something you can install on your computer to block tackers.
THREATS TO YOUR PRIVACY: ________________ (often institutional. government- law enforcement, census, tax collection. private- marketing, sales) ________________ (individuals with access to information) _______________ (hackers, security breaches) ______________ (negligence, carelessness) _____________ (trading privacy for convenience)
intentional threats unauthorized use by "insiders" theft of information leaking information your own acts
what was the US v Antoine Jones (US supreme court 2012)?
issue: does the use of a device on a vehicle to monitor movement constitute a search under the 4th amendment? jones was a nightclub owner suspected of being involved in a drug ring. the police get a warrant to place a GPS tracking device on his car but the warrant expired 3 days before they actually put it on his car. it is legal for police to follow someone around so they argued that this was pretty much just like they were following him. supreme court disagreed, said probable cause is needed before putting a tracking device on someones car. therefore, placing this tracking device on his car was a search in meaning of the 4th amendment after this decision was released FBI released statement saying they are going to have to turn off over 3,000 tracking devices that are important in ongoing cases
explain the City of Ontario, CA v. Quon (supreme court 2010) case
oCity provided text message pager to police officer oPreviously, city had announced a computer usage, Internet & Email policy, specifying Employees to have no expectation of privacy and confidentiality oPager provided through Arch Wireless; unlike computers. City told Quon & others they'd treat text messages like email oPolicy was when employee went over could write a check instead of having messages audited. Continued. oEventually, so many officers went over monthly limit, the chief looked into this to see if limit was too low (work-related) or if these overages were due to personal messages, and transcripts of messages were obtained oWith the audit found that many were not work related and some sexually explicit oIA received transcripts and compared it to Quon's work schedule times and dates • Aug: 456 messages, 57 work related • Average 28/day, 3 work related • He was punished oJoint lawsuit alleging 4th amendment violation and SCA by obtaining and reviewing transcript of messages. • Important point: 4th amendment challenge may be appropriate here because government entity acting as Quon's employer oLower courts: • District: if audit was to determine if wasting time, unconstitutional; if to ensure officers not paying hidden fees, it would be constitutional. Jury decided what purpose was; said it was to gauge efficiency or char limits and therefore constitutional • Court of appeals: search had legitimate purpose but was not reasonable in scope; could have been performed in a way that did not violate 4th amendment rights. Court found violation oAt supreme court: determining whether Quon had a reasonable expectation of privacy • Impact on reasonableness of Quon's expectation of privacy • Did the coverage policy of check writing change the computer use policy? • Warrantless searches can be ok under 4th amendment for exigent circumstances or special needs that are non-investigative in nature • What evaluating the char, limit a special need? • Holding: • "Under the circumstances a reasonable employee would be aware that sound management principles might require the audit of messages to determine whether the pager was being used appropriately. Given that the city issued the pagers to Quon and other SWAT team members in order to help them more.. • The supreme court says that the search was reasonable oThe cell phone was paid for and provided by the city so they cant have an expectation of privacy with it
ownership of transaction information: - often the agreement that you enter into is in the fine print -rarely it is _______ (consumer must explicitly give permission before the organization can share info -but most times it is _________ (organization can share info until consumer explicitly forbids it). businesses prefer this, it is a lot easier to maintain and to implement
opt-in opt-out
_____________: response to the tragedy of 9/11. allows for more kinds of surveillance. has been subjected to a lot of criticism related to privacy because of these different kinds of exceptions for search warrants and surveillance
patriot act
advertisers- no loner paying for random ad placement on a site, they are now....?
paying instead to follow users around the Internet with personalized marketing messages
____________: "the gathering, assembling, and collating of data about individuals in databases which can be used to identify, segregate, categorize and generally make decisions about individuals known to the decision maker only through their computerized profile" what is the main objective associated with this?
profiling better targeted advertising
privacy as a __________ right (very important): rational people will agree to recognize some privacy rights due to general benefits to society
prudential
______________: disclosure in the day to day living. records kept for legitimate governmental purposes. in the past, this information was buried in paper; cyber-technology makes accessing these records simple
public records
what were the Riley v. California and US v. Wurie cases? when are warrantless searches constitutional?
questions presented: -whether evidence admitted at trial, obtained in a search of cell phone, violated petitioner's 4th amendment rights? -whether the 4th amendment permits the police, without a warrant, to review the call log of a cell phone found on a person lawfully arrested? facts: -riley case: Riley is arrested for a traffic violation. when he was arrested police took his cell phone and looked into it and saw he was involved in a gang and increased the charges. -wurie: he was involved in a drug deal and taken to jail. his phone kept getting calls from a number giving the location of a house where they found more drugs and firearms. these were warrantless searches. reasonableness test for warrantless searches: -chimel/Grant/robinson rules on search incident to an arrest: they can search people for officer safety (search for weapons etc.) and evidence preservation the court does NOT extend Robinson to data on cell phones, distinguishing a "qualitative and quantitative sense" from other objects carried on the person. much more information is stored, often going back years, creating an extensive digital record. these searches did violate the 4th amendment
_______________: identifying the individual from a set of anonymous data
re-identification identification based on searches performed (ex: hobbies, sports teams, health)
what is Warren and Brandels definition of privacy?
seclusion, freedom from intrusion. around 1890 Warrens daughter was engaged and she was very well known in the community so people took an interest in the wedding and published things about what happened at the wedding, warren did not like this. they say privacy is "the right to be left alone" and it is a stand alone right (not derivative). and it exists though it is not recognized or explicitly stated
in the US, historically consumer privacy has relied on ____________ and _____________ laws are typically last resort or responsive to an event. highly __________ and ___________
social norms and market forces reactive and unsystematic
public records vary by _________ but often includes: -marriage, birth, divorce, wills -arrest, convictions -census, property tax -in some states _________ becomes part of the public record (Urban Meyer's wife example)
state 911 calls. exmaple: urban Meyer's wife example- she calls after the SEC game. things such as gate code, address are beeped out but she was talking about details of medication he takes and that was not beeped out. interesting to see in a different law under different context would protect that information