Ref - CIPP/US Textbook
In 1890, The Right to Privacy” in the Harvard Law Review, setting forth the essential definition of privacy as “the right to be let alone.”
Privacy has been defined as the desire of people to freely choose the circumstances and the degree to which individuals will expose their attitudes and behavior to others.
Classes of Privacy
Information Privacy- establishing rules that govern the collection and handling of personal information.
Financial information
Medical information
Government records
records of a person’s activities on the Internet.
Bodily Privacy - person’s physical being and any invasion thereof.
Genetic testing
Drug testing
body cavity searches.
Birth control
Abortion
adoption
Territorial Privacy Invasion - limitations on one's environment, invation into an individual’s territorial privacy typically takes the form of monitoring
Video surveillance
ID checks
workspace, home, or public space
Communications Privacy protection of the means of correspondence
Postal mail
telephone conversations
Bible, Quran,
Do Not Gossip - Privacy as social concept, Freedom of being watched
Legal
Justices of the Peace Act, enacted in 1361, included provisions calling for the arrest of “peeping Toms” and eavesdroppers.
1765 protected privacy of the home.
US Constitution
Word privacy doesn’t appear
Provisions:
Third - banning soldiers
Fourth - Search Warrant
Fifth - testify against yourself banned
14th - Due process under law, intrusions against bodily privacy
California - State Constitution - Nov 1974 Ammended to add privacy
UN - Universal Declaration of Human Rights
1948 - General Assembly - Legal Protection adopted - No one subjected to arbitrary interference with his privacy, family, home or correspondence.”
Article 12
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
Council of Europe, 1950
Purpose: The purpose of the Fair Information Practices is to set guidelines for handling, storing, and managing data with privacy, security, and fairness.
Rights of Individuals
Notice. Organizations should provide notice about their privacy policies and procedures, and should identify the purpose for which personal information is collected, used, retained and disclosed.
Choice and consent. Organizations should describe the choices available to individuals and should get implicit or explicit consent with respect to the collection, use, retention and disclosure of personal information. Consent is often considered especially important for disclosures of personal information to other data controllers.
Data subject access. Organizations should provide individuals with access to their personal information for review and update.
Controls on the Information. Organizations should focus on information security and information quality.
Information security. Organizations should use reasonable administrative, technical and physical safeguards to protect personal information against unauthorized access, use, disclosure, modification and destruction.
Information quality. Organizations should maintain accurate, complete and relevant personal information for the purposes identified in the notice.
Information Lifecycle. Organizations should address the lifecycle of information, including collection, use and retention, and disclosure.
Collection. Organizations should collect personal information only for the purposes identified in the notice.
Use and Retention.
Organizations should limit the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent.
Organizations should also retain personal information for only as long as necessary to fulfill the stated purpose.
Disclosure. Organizations should disclose personal information to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual.
Management - Duties of the Data Controller
Management and administration - organizations should define, document, communicate privacy policies
Monitoring and enforcement - organizations should monitor compliance with their privacy policies
FIPS today have an origin from 1973 report by the U.S. Department of Health, Education and Welfare Advisory Committee on Automated Systems.
No personal data record keeping system that is secret
People can find out what is stored on them
People can find a way to correct info on them
Europe/US published a set of privacy principles entitled “Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data".
most widely recognized framework for FIPs and have been endorsed by the U.S. Federal Trade Commission (FTC) and many other government organizations.19
Guidelines:
Collection Limitation Principle. There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
Data Quality Principle. Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up to date.
Purpose Specification Principle. The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are speci ed on each occasion of change of purpose.
Use Limitation Principle. Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [the Purpose Specification Principle] except: (a) with the consent of the data subject or (b) by the authority of law.
Security Safeguards Principle. Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.
Openness Principle. There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.
Individual Participation Principle. An individual should have the right: (a) to obtain from a data controller, or otherwise, con rmation of whether or not the data controller has data relating to him; (b) to have communicated to him, data relating to him, within a reasonable time, at a charge, if any, that is not excessive, in a reasonable manner, and in a form that is readily intelligible to him; (c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and (d) to challenge data rectified, completed or amended.
Accountability Principle. A data controller should be accountable for
Council of Europe passed the Convention for the Protection of Individuals with Regard to the Automatic Processing of Personal Data ("Convention 108"). This convention required member states of the Council of Europe that signed the treaty to incorporate certain data protection provisions into their domestic law.
APEC Privacy Subgroup was established under the auspices of the Electronic Commerce Steering Group in order to develop a framework for privacy practices. This framework was designed to provide support to APEC-member economic legislation that would both protect individual interests
APEC privacy principles spelled out in the framework are:
Notice
Collection Limitation
Uses of Personal Information
Choice
Integrity of Personal Information
Access and Correction
Accountability
In 2009, the Madrid Resolution was approved by the independent data protection and privacy commissioners (not the governments themselves)
Dual purposes for the Madrid Resolution:
Define a set of principles and rights guaranteeing
(1) the effective and internationally uniform protection of privacy with regard to the processing of personal data
(2) the facilitation of the international flows of personal data needed in a globalized world.
Principles
Principle of lawfulness and fairness
Purpose specification principle
Proportionality principle
Data quality
Openness principle
Accountability
Unprecedented accumulation of personal data, and the resulting potential for increased surveillance, also triggered an acute interest in privacy practices and the privacy rights of individuals.
United States passed its first national privacy law in 1970
Fair Credit Reporting Act, which focused solely on information about consumer credit.
Personal Information. In the United States, the terms personal information and personally identifiable information (PII) are generally used to define the information that is covered by privacy laws.
Possible to identify an individual
Names
Social Security numbers
Passport numbers
“Identifiable” to an individual.
Street address
Telephone number
Email address
Sensitive personal information
An important subset of personal information. what is considered sensitive varies depending on jurisdiction and particular regulations.
In the United States these are sensitive
Social Security numbers
Financial information
Driver’s license numbers
Health Information
Line between sensitive and personal - sensitive requires additional safeguards.
Nonpersonal Information
data elements used to identify the individual are removed, the remaining data becomes nonpersonal information, and privacy and data protection laws generally do not apply.
Also called deidentified or anonymized
Publicly Records
collected and Maintained by a government entity and available to the public.
Real Estate Records
Publicly available information
Generally available to a wide range of persons, i.e. in telephone books
Names
Addresses
Information published in newspapers or other public media.
Nonpublic information
not generally available or easily accessed due to law or custom.
Examples - medical records, financial records, customer databases, and adoption records
Data Subject
Data Subject –the collection, recording, organization, storage, updating or modification, retrieval, consultation and use of PI. It also includes the disclosure by transmission, dissemination or making available in any other form, linking, alignment, or combination, blocking, erasure, or destruction of PI.
individual about whom information is being processed (i.e. patient, employee, customer)
Data Controller
An organization that has the authority to decide how and why PI is to be processed.
It controls the use of PI by determining the purposes for its use and the manner in which the information is processed.
Data Processor
Individual or organization, often 3rd party outsourcing service, that processes data on behalf of the data controller.
Health Insurance Portability and Accountability Act (HIPAA) medical privacy rule, these data processors are called “business associates.
Data Protection Authority
Markets.
Businesses that are brand sensitive are especially likely to adopt strict privacy practices to build up their reputations as trustworthy organizations.
Technology.
Technology also can provide robust privacy protection.
Rapid advancement of technology such as encryption provides people with new and advanced means of protecting themselves.
Law.
Traditional approach to privacy regulation.
However, simply enacting more laws does not necessarily result in better privacy and security.
One very important source of privacy protections.
In practice actual protection also depends on markets, technology and self-regulation.
Self-regulation and co-regulation.
Self-regulation (and the closely related concept of co-regulation) is a complement to law that comes from the government. The term self-regulation can refer to any or all of three components: legislation, enforcement and adjudication.
Comprehensive
Comprehensive data protection laws govern the collection, use and dissemination of personal information in the public and private sectors
Official or agency, referred to as a data protection authority (DPA) in Europe, that ensures compliance with the law and investigates alleged breaches of the law’s provisions
Sectoral
- addresses a particular industry or sector Healthcare (HIPPA)
Co Regulatory
emphasizes industry development of enforceable codes or standards for privacy and data protection
Legal requirements by the government are set.
U.S. example is the Children’s Online Privacy Protection Act in the United States (COPPA), which allows compliance with codes to be sufficient for compliance with the statute once the codes have been approved by the FTC.
Self Regulatory
Creation of codes of practice for the protection of personal information by a company, industry or independent body.
PCI-DSS - code of practice for personal information (PCI-DSS) Payment Card Industry