SlideShare une entreprise Scribd logo
1  sur  26
Privacy Law and Policy
Bryce Newell, J.D.
Ph.D. student, UW iSchool
Jan. 13, 2012
eReader Privacy
• Librarians Weigh Kindle Ebook Lending against
  Reader Privacy

• EFF's take on CA's newly enacted E-Reader
  Privacy Law

• Privacy Rights Re-―Kindled‖: eBook Reader
  Privacy
What is privacy?
Privacy: a Fundamental Right, or not?
• Fundamental Right
 ▫   Europe
 ▫   Canada
 ▫   Australia
 ▫   New Zealand
• Sectored Protection
 ▫ United States (except in some narrow constitutional
   areas)
Types of Privacy Protections
• Tort Privacy (common law / state law)
• Informational Privacy (largely guided by
  statutory law – i.e. federal legislation)

• Freedom from unreasonable search and
  seizure (4th Am.)
• Free speech (1st Am.)
• Fundamental decision (14th Am.)
US Privacy Milestones
• 1890 – right to privacy
  ▫ promoted in article by Warren and Brandeis (tort-based privacy)
• 1928 -- ―the right to be let alone‖
  ▫ (Brandeis dissent in Olmstead -- search and seizure)
• 1958 – nexus of anonymity and speech
  ▫ (NAACP v. Alabama) (disclosure of member list)
• 1960 – Prosser’s Torts
  ▫ based on Warren and Brandeis’s ideas
• 1967 – ―reasonable expectation‖
  ▫ (Katz v. US -- search and seizure)
• 1977 – no ―zone of privacy‖ where data is protected
  and used within broad police powers of state
  ▫ (Whalen v. Roe -- disclosure of prescription data)
Warren & Brandeis (1890)
• ―…now that modern devices afford abundant
  opportunities for the perpetration of such
  wrongs without any participation by the injured
  party, the protection granted by the law must be
  placed upon a broader foundation."
Warren & Brandeis
• The ―right to be let alone‖
• Elements of privacy from:
  ▫   defamation law
  ▫   IP law
  ▫   Contract law
  ▫   Property

  ▫ Olmstead v. US (1928)
Warren & Brandeis to Prosser
• Dean Prosser’s four torts (1960):
 ▫ appropriating the plaintiff's identity for the
   defendant's benefit
 ▫ placing the plaintiff in a false light in the public
   eye
 ▫ publicly disclosing private facts about the
   plaintiff
 ▫ unreasonably intruding upon the seclusion or
   solitude of the plaintiff
International Privacy Conventions
• Article 8 of the European Convention on Human
  Rights
 ▫ ―Everyone has the right to respect for his private
   and family life, his home and his correspondence.‖
• Article 17 of the International Covenant on Civil
  and Political Rights (UN)
Nissenbaum (2004): Cases
• Public Records Online
 ▫ Concerns? The info is already public…
• Consumer Profiling and Data Mining
 ▫ One view: targeted advertising is the most
   consumer friendly form of advertising
 ▫ Is the data really sensitive?
• RFID Tags and Surveillance
Surveillance
• US v. Jones (US v. Maynard)
• Toll roads, video cameras in public spaces, facial
  recognition (e.g. Google and PittPatt), GPS
  tracking….
• DC Police
• PATRIOT Act
  ▫ Lessens requirements for obtaining Wiretap
    warrants
  ▫ Sneak and Peak Warrants
Nissenbaum (2004): Principles
Three principles that dominate public deliberation

• 1) Protecting Privacy of Individuals Against
  Intrusive Government Agents
• 2) Restricting Access to Intimate, Sensitive, or
  Confidential Information
• 3) Curtailing Intrusions into Spaces or Spheres
  Deemed Private or Personal
Nissenbaum: Contextual Integrity
• Presiding norms of
  ▫ Appropriateness
  ▫ Distribution / Norms of information flow

• Considers the context, nature of information in
  relation to context, the roles of those receiving the
  info, their relationships to info subjects, terms of
  sharing, and terms of further dissemination.

• Is this practical?
• Is it a better way to visualize/protect privacy?
Nehf (2005)
• FTC history – law/industry self-regulation
• Market driven solutions led to widespread
  adoption of privacy policies
• But policies don’t protect information, only
  disclose how it is being sold, used, etc
• ―encouraging posting of privacy policies without
  regulating their content‖ = less info privacy for
  consumers ―than an efficient market would
  produce‖
Nehf (2005)
• ―Until privacy becomes a salient attribute
  influencing consumer choice, Web site operators
  will continue to take and share more personal
  information than consumers would choose to
  provide in a more transparent exchange.‖
Facebook
Facebook (2)
• ―Many of the most popular applications, or "apps,"
  on the social-networking site Facebook Inc. have
  been transmitting identifying information—in effect,
  providing access to people's names and, in some
  cases, their friends' names—to dozens of advertising
  and Internet tracking companies…
• ―The issue affects tens of millions of Facebook app
  users, including people who set their profiles to
  Facebook's strictest privacy settings. The practice
  breaks Facebook's rules, and renews questions
  about its ability to keep identifiable information
  about its users' activities secure.‖
                      - Wall Street Journal, Oct 18, 2010
Facebook (3)
• Who can see what?
 ▫ Public
 ▫ Friends
 ▫ Apps

• Facebook settles with the
  FTC: http://www.nytimes.com/2011/11/30/tech
  nology/facebook-agrees-to-ftc-settlement-on-
  privacy.html
Online Behavioral Advertising
• ABC News Story [link]

• For discussion of someof the recently proposed
  "Do Not Track" legislation in Congress look here,
  here, and here.
Problems
• ―…there is no single definition of what it means to be
  tracked, so expressing a preference does not
  guarantee users that they will be able to block all
  web sites and content that they may view as being
  associated with tracking behavior.‖
                                      - From Microsoft.com



• Industry self-regulation does not provide for any
  enforcement mechanism beyond current FTC
  powers (e.g. to prosecute for engaging in deceptive
  practices)
What Do “They” Know?
• The Open Data Partnership allows a glimpse
  into what information is being collected and by
  whom.
 ▫ http://www.evidon.com/partners/open_data_par
   tnership - contains list of 1021 companies that
   engage in online behavioral advertising, many of
   which also have multiple advertising products.
Who Knows?


   * Ghostery results from NAI’s
   Opt-Out page.
FTC Report
• FTC report calls for ―browser based do-not-track
  mechanism‖ in December 2010
• Industry self-regulation
 ▫ Browsers build in do not track options
 ▫ Industry groups set up opt-out mechanisms (DAA,
   NAI)
 ▫ BUT self-regulation has no teeth (enforcement
   mechanism) and may only mean you don’t see
   targeted ads, not that you won’t be tracked.
• FTC sues Chitika, reaches settlement
AdChoices Evolution
Recent Legislation
• Europe
  ▫ 2009 amendments to the EU ePrivacy Directive
    require member states to implement by May 25, 2011
• United States
  ▫   S. 913: Do-Not-Track Online Act of 2011
  ▫   S. 799: Commercial Privacy Bill of Rights Act of 2011
  ▫   H.R. 1528: Consumer Privacy Protection Act of 2011
  ▫   H.R. 654: Do Not Track Me Online Act
  ▫   H.R. 1895: Do Not Track Kids Act of 2011
  ▫   California: S.B. 761

Contenu connexe

Plus de Brian Rowe

Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
Brian Rowe
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information Classism
Brian Rowe
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101
Brian Rowe
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free Culture
Brian Rowe
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipen
Brian Rowe
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy Ignite
Brian Rowe
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managment
Brian Rowe
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101
Brian Rowe
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
Brian Rowe
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9th
Brian Rowe
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
Brian Rowe
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Brian Rowe
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
Brian Rowe
 

Plus de Brian Rowe (20)

Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
Ecc 2013
Ecc 2013 Ecc 2013
Ecc 2013
 
Freeing Culture: Ending Information Classism
Freeing Culture: Ending Information ClassismFreeing Culture: Ending Information Classism
Freeing Culture: Ending Information Classism
 
WLA Lecture
WLA LectureWLA Lecture
WLA Lecture
 
UW Law Blogging 101
UW Law Blogging 101UW Law Blogging 101
UW Law Blogging 101
 
UW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free CultureUW Bothell Intro to Copyright and Free Culture
UW Bothell Intro to Copyright and Free Culture
 
Copyright for coders and creatives digipen
Copyright for coders and creatives digipenCopyright for coders and creatives digipen
Copyright for coders and creatives digipen
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
TIG Privacy Ignite
TIG Privacy IgniteTIG Privacy Ignite
TIG Privacy Ignite
 
TIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managmentTIG sharepoint for Knowledge managment
TIG sharepoint for Knowledge managment
 
Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101Lis 550 presentation Copyright 101
Lis 550 presentation Copyright 101
 
Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Fair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9thFair Use & Free Culture @ SCCC Nov 9th
Fair Use & Free Culture @ SCCC Nov 9th
 
Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference Digital Freedom @ Wisconsin Library Conference
Digital Freedom @ Wisconsin Library Conference
 
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
Creative Commons & Free Culture at Franklin Pierce Center for Intellectual Pr...
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
LSNTAP on RSS
LSNTAP on RSSLSNTAP on RSS
LSNTAP on RSS
 
Privacy for Libraries
Privacy for LibrariesPrivacy for Libraries
Privacy for Libraries
 
copyright 101 and fair use
copyright 101 and fair usecopyright 101 and fair use
copyright 101 and fair use
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Privacy law and policy

  • 1. Privacy Law and Policy Bryce Newell, J.D. Ph.D. student, UW iSchool Jan. 13, 2012
  • 2. eReader Privacy • Librarians Weigh Kindle Ebook Lending against Reader Privacy • EFF's take on CA's newly enacted E-Reader Privacy Law • Privacy Rights Re-―Kindled‖: eBook Reader Privacy
  • 4. Privacy: a Fundamental Right, or not? • Fundamental Right ▫ Europe ▫ Canada ▫ Australia ▫ New Zealand • Sectored Protection ▫ United States (except in some narrow constitutional areas)
  • 5. Types of Privacy Protections • Tort Privacy (common law / state law) • Informational Privacy (largely guided by statutory law – i.e. federal legislation) • Freedom from unreasonable search and seizure (4th Am.) • Free speech (1st Am.) • Fundamental decision (14th Am.)
  • 6. US Privacy Milestones • 1890 – right to privacy ▫ promoted in article by Warren and Brandeis (tort-based privacy) • 1928 -- ―the right to be let alone‖ ▫ (Brandeis dissent in Olmstead -- search and seizure) • 1958 – nexus of anonymity and speech ▫ (NAACP v. Alabama) (disclosure of member list) • 1960 – Prosser’s Torts ▫ based on Warren and Brandeis’s ideas • 1967 – ―reasonable expectation‖ ▫ (Katz v. US -- search and seizure) • 1977 – no ―zone of privacy‖ where data is protected and used within broad police powers of state ▫ (Whalen v. Roe -- disclosure of prescription data)
  • 7. Warren & Brandeis (1890) • ―…now that modern devices afford abundant opportunities for the perpetration of such wrongs without any participation by the injured party, the protection granted by the law must be placed upon a broader foundation."
  • 8. Warren & Brandeis • The ―right to be let alone‖ • Elements of privacy from: ▫ defamation law ▫ IP law ▫ Contract law ▫ Property ▫ Olmstead v. US (1928)
  • 9. Warren & Brandeis to Prosser • Dean Prosser’s four torts (1960): ▫ appropriating the plaintiff's identity for the defendant's benefit ▫ placing the plaintiff in a false light in the public eye ▫ publicly disclosing private facts about the plaintiff ▫ unreasonably intruding upon the seclusion or solitude of the plaintiff
  • 10. International Privacy Conventions • Article 8 of the European Convention on Human Rights ▫ ―Everyone has the right to respect for his private and family life, his home and his correspondence.‖ • Article 17 of the International Covenant on Civil and Political Rights (UN)
  • 11. Nissenbaum (2004): Cases • Public Records Online ▫ Concerns? The info is already public… • Consumer Profiling and Data Mining ▫ One view: targeted advertising is the most consumer friendly form of advertising ▫ Is the data really sensitive? • RFID Tags and Surveillance
  • 12. Surveillance • US v. Jones (US v. Maynard) • Toll roads, video cameras in public spaces, facial recognition (e.g. Google and PittPatt), GPS tracking…. • DC Police • PATRIOT Act ▫ Lessens requirements for obtaining Wiretap warrants ▫ Sneak and Peak Warrants
  • 13. Nissenbaum (2004): Principles Three principles that dominate public deliberation • 1) Protecting Privacy of Individuals Against Intrusive Government Agents • 2) Restricting Access to Intimate, Sensitive, or Confidential Information • 3) Curtailing Intrusions into Spaces or Spheres Deemed Private or Personal
  • 14. Nissenbaum: Contextual Integrity • Presiding norms of ▫ Appropriateness ▫ Distribution / Norms of information flow • Considers the context, nature of information in relation to context, the roles of those receiving the info, their relationships to info subjects, terms of sharing, and terms of further dissemination. • Is this practical? • Is it a better way to visualize/protect privacy?
  • 15. Nehf (2005) • FTC history – law/industry self-regulation • Market driven solutions led to widespread adoption of privacy policies • But policies don’t protect information, only disclose how it is being sold, used, etc • ―encouraging posting of privacy policies without regulating their content‖ = less info privacy for consumers ―than an efficient market would produce‖
  • 16. Nehf (2005) • ―Until privacy becomes a salient attribute influencing consumer choice, Web site operators will continue to take and share more personal information than consumers would choose to provide in a more transparent exchange.‖
  • 18. Facebook (2) • ―Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies… • ―The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. The practice breaks Facebook's rules, and renews questions about its ability to keep identifiable information about its users' activities secure.‖ - Wall Street Journal, Oct 18, 2010
  • 19. Facebook (3) • Who can see what? ▫ Public ▫ Friends ▫ Apps • Facebook settles with the FTC: http://www.nytimes.com/2011/11/30/tech nology/facebook-agrees-to-ftc-settlement-on- privacy.html
  • 20. Online Behavioral Advertising • ABC News Story [link] • For discussion of someof the recently proposed "Do Not Track" legislation in Congress look here, here, and here.
  • 21. Problems • ―…there is no single definition of what it means to be tracked, so expressing a preference does not guarantee users that they will be able to block all web sites and content that they may view as being associated with tracking behavior.‖ - From Microsoft.com • Industry self-regulation does not provide for any enforcement mechanism beyond current FTC powers (e.g. to prosecute for engaging in deceptive practices)
  • 22. What Do “They” Know? • The Open Data Partnership allows a glimpse into what information is being collected and by whom. ▫ http://www.evidon.com/partners/open_data_par tnership - contains list of 1021 companies that engage in online behavioral advertising, many of which also have multiple advertising products.
  • 23. Who Knows? * Ghostery results from NAI’s Opt-Out page.
  • 24. FTC Report • FTC report calls for ―browser based do-not-track mechanism‖ in December 2010 • Industry self-regulation ▫ Browsers build in do not track options ▫ Industry groups set up opt-out mechanisms (DAA, NAI) ▫ BUT self-regulation has no teeth (enforcement mechanism) and may only mean you don’t see targeted ads, not that you won’t be tracked. • FTC sues Chitika, reaches settlement
  • 26. Recent Legislation • Europe ▫ 2009 amendments to the EU ePrivacy Directive require member states to implement by May 25, 2011 • United States ▫ S. 913: Do-Not-Track Online Act of 2011 ▫ S. 799: Commercial Privacy Bill of Rights Act of 2011 ▫ H.R. 1528: Consumer Privacy Protection Act of 2011 ▫ H.R. 654: Do Not Track Me Online Act ▫ H.R. 1895: Do Not Track Kids Act of 2011 ▫ California: S.B. 761

Notes de l'éditeur

  1. Do-Not-Track Online Act of 2011 – possible amendment to Kerry act belowPros:provisions would apply to mobile phone network operators as well as Websites and online advertising networksSupported by Consumers Union, the Electronic Frontier Foundation, Consumer Action, the Center for Digital Democracy and the American Civil Liberties Unionwould force companies to respect a consumer’s decision to opt out of data collectionsupports a mandatory browser-based “Do Not Track” mechanism would allow the Federal Trade Commission to define the rules within a year of the bill being signed into law.Cons:Blanket opt-out is not ideal for advertising companies, who would prefer selective opt outProhibits gathering info from minors, but how is this to be accomplished?Commercial Privacy Bill of Rights Act of 2011Pros:would require companies to informusers up-front what data was being collected and to provide a clear way to opt out of the collection. Cons:does not explicitly address “do not track”