22
Information Privacy in the Digital Age – Introduction Spring 2016 Dr. Tal Zarsky [University of Haifa – Faculty of Law]

Ottawa haifaintro2016

  • Upload
    mgeist

  • View
    165

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ottawa haifaintro2016

Information Privacy in theDigital Age – Introduction

Spring 2016Dr. Tal Zarsky[University of Haifa – Faculty of Law]

Page 2: Ottawa haifaintro2016

Introduction to Introduction:

Various privacy problems addressed in the public debate and technological discourse

Strive to address both theory and practice Will map out main issues here addressed

Page 3: Ottawa haifaintro2016

Why Privacy is “Exploding” Now• Collection:

Omnipresent, Quantity leap, Quality leap

• Analysis:Digital environment, easy to “warehouse”

• Use: Narrowcasting, tailored content and the “feedback loop”

Page 4: Ottawa haifaintro2016

The Challenge of Identifying Privacy ProblemsPrivacy concerns:• Privacy is a “tricky” concept• Three “mega” problems stemming from the

collection of personal data:(1) Fear the data will be used by government, or passed on to it(2) Fear of the collection of personal data per se (collection on its own is bad enough)(3) Fear of the specific detriments stemming from the use of personal data (the “so what?” approach)

Page 5: Ottawa haifaintro2016

Identifying the problems – Fear of Collection per se Specific concerns:• Loss of control over data, self-

monitoring, conformity, inability to form intimacy, loss of autonomy

Overall response – social adaptation

Page 6: Ottawa haifaintro2016

Identifying the problems:Metaphors we live by The powerful metaphors (and the

problems they cause): “1984” Kafka (“The Trial”, “The Castle”) “Brave New World” Bentham’s “Panopticon”

Page 7: Ottawa haifaintro2016

Common responses to “Privacy claims” Privacy creates:• Social costs: reputation, search

expenses (waste)• Security costs (inability to track

terrorists, criminals, diseases)• Free Speech Arguments (Sorrell)

Page 8: Ottawa haifaintro2016

Identifying “actual” problems• Abuse• Discrimination:

(1) In general(2) Problematic Factors(3) Based on prior patterns of behavior

• Autonomy and Manipulation

Page 9: Ottawa haifaintro2016

Autonomy: Difficult and problematic concept “insight” into the users preferences

allows content providers to effectively manipulate them

On the other hand, autonomy possibly compromised when personal data analyzed without consent.

Page 10: Ottawa haifaintro2016

Overview of solutions (1) “The Right of Privacy” (1890) Torts – the Four Privacy Torts (Prosser, 1960): Intrusion,

Disclosure of Private Facts, False Light, Appropriation – garden variety of rights

The EU Directive – and overall perspective (understanding secondary sale & secondary Use; Opt In vs. Opt Out)

The Fair Information Practices – Notice, Access, Choice, Security and Enforcement In the EU – also purpose specification, minimization, proportionality.

The U.S. Patchwork – Protected realms - Health (HIPPA) Protected Subjects - Children (COPPA) Protected forms of Data (“Sensitive Data”)

Page 11: Ottawa haifaintro2016

Overview of solutions (2) Why Torts (usually) fail – and the realm of today’s

data collection Example: DoubleClick and “cookies”

The contractual and property perspective (for example: default and mandatory rules) The technological solution (P3P, Lessig)

The shortcoming Market failures (high information and transactional

costs) – people are happy to sell their privacy for very very cheap!

Negative externalities (inferences from one group to another, and from group to individual

Loss of Benefits (loss of subsidy to start ups, loss of data derived from analysis)

Page 12: Ottawa haifaintro2016

Classic Privacy Themes Theories of Privacy and their Critiques The Privacy Torts/Privacy and/in the

media Privacy and the Government

Digital Surveillance, National Security Using Private Data Sets/Data Mining

Privacy in the Commercial Realm Online Privacy/Behavioral

Marketing/Privacy by Design

Page 13: Ottawa haifaintro2016

Classic Privacy Themes (2) Anonymity, Pseudonymity, Identity and

Transparency Data Security, Cyber-security, Cyber Crime Social Networks and Online Social Networks

Uniqueness of exposing a social graph Medical Privacy

The curious case of genetic information Privacy in the Workplace (monitoring,

evaluating, recruiting)

Page 14: Ottawa haifaintro2016

Data Protection and the EU 1995 – the EU adopts the Data

Protection Directive A Directive sets a minimal standard.

Broad spectrum of levels of adoption throughout the continent.

Directive premised on FIPPs. Sets jurisdictional boundaries and relies

upon the work of DPAs.

Page 15: Ottawa haifaintro2016

Foundations of EU Privacy Law European member states adopt data

protection laws. EU Charter of Rights now includes

privacy and data protection. Therefore court can strike down

Directives. Digital Rights Ireland.

ECJ – relevant court Growingi set of case law.

Page 16: Ottawa haifaintro2016

Regulating Data Transfers Data may not be sent beyond the EU –

unless specific exceptions apply: Specific agreement (safe harbor) Adequate country (Israel, Canada). Consent Internal compliance programs.

And other options… Faces substantial challenges in the

age of cloud computing.

Page 17: Ottawa haifaintro2016

Next for the EU – the GDPR Regulation vs. Directive Subject to substantial lobbying

pressures. Enhanced Jurisdiction Additional provisions. Substantial fines.

Page 18: Ottawa haifaintro2016

Extending the EU’s Influence EU Market is substantial

Yet effects firm’s outside the EU. International firms apply a uniform

standard – the EU standard. Difficult to explain to domestic

consumers why they are worse off. A new form of colonialism?

Yet some countries push back.

Page 19: Ottawa haifaintro2016

US/EU Safeharbor (cancelled) U.S. received special “treatment”:

U.S. firms registered and were supervised by the FTC.

In Schrems, the agreement was struck down. Argument: insufficient redress w/r/t the

risk of government surveillance. Important lesson regarding the power of the

individual.

Page 20: Ottawa haifaintro2016

Shield Agreement Yet to be approved. Supplemented by laws providing

redress by EU citizens towards the USG. Main complaint against Safeharbor – too

lax enforcement by the FTC: Lack of incentives. Lack of manpower.

Discussions as to how this could be corrected.

Page 21: Ottawa haifaintro2016

Next Steps on the International Level GDPR compliance Agreements in Asia

Page 22: Ottawa haifaintro2016

Additional European Sources Council of Europe (CoE) OECD documents. ECtHR rulings (based on the HR

charter).