TECH – Mayer & Narayanan – Privacy Substitutes
[…] there exist a spectrum of possible designs that vary in their privacy an d functionality 3 characteristics. Cast in economic terms, technology enables a robust production -possibility frontier between privacy and profit, publ ic benefit, and other values. 2 Recent scholarship has challenged the efficacy of notice and choice models for technology privacy. E.g. […]
SOCIAL – Lerman – Big Data and Its Exclusions
[…] size is beyond the ability of typical database sof tware tools to ca pture, store, manage, and analyze.” MCKINSEY GLOBAL INSTITUTE , BIG DATA : THE NEXT FRONTIER FOR INNOVATION , COMPETITION , AND PRODUCTIVITY 1 (June 2011). See also CHRIS EATON ET AL ., UNDERSTANDING BIG DATA 3 (2012) (explaining that “the term […]
Tene & Polonetsky – Privacy and Big Data Making Ends Meet
[…] risk or un certainty may weigh different ly depending on the risk profile of differing societies. The U.S., for example, established by explorers who push ed the frontier in a lawless atmosphere , continues to highly reward entrepreneurship, innovation, research and discovery. The qu intessential American hero is the lone entrepreneur who against all […]
Lerman – Big Data and Its Exclusions
[…] size is beyond the ability of typical database sof tware tools to ca pture, store, manage, and analyze.” MCKINSEY GLOBAL INSTITUTE , BIG DATA : THE NEXT FRONTIER FOR INNOVATION , COMPETITION , AND PRODUCTIVITY 1 (June 2011). See a lso CHRIS EATON ET AL ., UNDERSTANDING BIG DATA 3 (2012) (explaining that “the […]
Thierer_The Pursuit of Privacy in a World Where Information Control Is Failing
[…] devices as their primary means of connecting to the Web.” 114 Importantly, Do Not Track would not slow the “arms race” in this arena as some have suggested. 115 If anything, a Do Not Track mandate will speed up that arms race and have many other unintended consequences. 116 Complex definitional ques‐ tions also remain unanswered, such as how to define and then limit “tracking” in various contexts. 117 In sum, in light of the global, borderless nature of online speech and data flows, the Do Not Track and Eraser Button schemes likely will not be effective. 118 The regulatory experience with spam, objectionable content, and copyrighted content suggests serious challenges lie ahead for top‐down regulatory efforts. 113. Sidney Hill, Internet Tracking May Not Be Worth the Headaches, T ECH NEWS WORLD , Dec. 29, 2010, http://www.technewsworld.com/story/Internet‐Tracking‐ May‐Not‐Be‐Worth‐the‐Headaches‐71543.html. 114. Id. 115. See Rainey Reitman, Mozilla Leads the Way on Do Not Track, E LEC . FRONTIER FUND , Jan. 24, 2011, https://www.eff.org/deeplinks/2011/01/mozilla‐leads‐the‐ way‐on‐do‐not‐track (“The header‐based Do Not Track system appeals because it calls for an armistice in the arms race of online tracking.”); Christopher Soghoian, What the US government can do to encourage Do Not Track, S LIGHT PARANOIA , Jan. 27, 2011, http://paranoia.dubfire.net/2011/01/what‐us‐government‐can‐do‐to‐ encourage.html. (“[O]pt out mechanisms . . . [could] finally free us from this cycle of arms races, in which advertising networks innovate around the latest browser privacy control.”). 116. A BELSON ET AL ., supra note 72, at 159 (“Too often, well‐intentioned efforts to regulate technology are far worse than the imagined evils they were intended to prevent.”). 117. Lauren Weinstein, Risks in Mozilla’s Proposed Firefox “Do Not Track” Header Thingy, L AUREN WEINSTEIN ’S BLOG (Jan. 24, 2010, 12:09 AM), http://lauren.vortex.com/archive/000803.html. 118. “Many behavioral targeting companies are based outside the US—making […]
Thierer_A Framework for Benefit Cost Analysis in Digital Privacy Debates
[…] is funded, in part, by the growth of targeted advertising that relies on use of consumer 191 See MCKINSEY GLOBAL INST ., BIG DATA : THE NEXT FRONTIER FOR INNOVATION , COMPETITION , AND PRODUCTIVITY 15 (2011); Omer Tene & Jules Polonetsky, Privacy in the Age of Big Data: A Time for Big Decisions […]
Schwartz_EU-US Privacy Collision
[…] JURISTISCHE WOCHENSCHRIFT [NJW] 1859. 2013] THE EU-U.S. PRIVACY COLLISION 1971 publication. 31 In an introduction to the publication, Thilo Weichert, the data protection commissioner of the German state of Schleswig- Holstein, noted the “amazing timeliness” of the essay for current dis- cussions of information privacy. 32 The European Court of Human Rights has also cited to this important concept from American law. 33 Second, the international debate about information privacy has never been confined to human rights or data trade. It has always been about both. The OECD Guidelines and the Council’s Convention both pay careful attention to individual privacy rights. The OECD’s rationale for the Guidelines mentions the dangers of “violations of fun- damental human rights” through the processing of personal data. 34 At the same time, it also talks about the “danger that disparities in na- tional legislations could hamper the free flow of personal data across frontiers.” 35 At a 2010 roundtable in Paris on the thirtieth anniversary of the OECD Guidelines, Michael Kirby, the Chairman of the OECD’s expert group on privacy from 1978 to 1980, noted that the initial impe- tus for the OECD’s work was “to contribute to (and defend) free flows deemed suitable to market information economies.” 36 Finally, the Council’s Convention on Privacy speaks in its Preamble of the goal of “reconcil[ing] the fundamental values of the respect for privacy and the free flow of information between peoples.” 37 B. The Data Protection Directive We now move from the early history of EU information privacy law to the Data Protection Directive. A popular tool of EU lawmak- ing, directives are generally not immediately binding but are “harmo- nizing” instruments; they require member states to enact national legis- ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– 31 Samuel D. Warren & Louis D. Brandeis, Das Recht auf Privatheit — […]
Kesan et al_Information Privacy and Data Control in Cloud Computing
[…] records phone numbers dialed, though the language of the statute also applies to other technological means. See “Pen Registers” and “Trap and Trace Devices” , ELEC . FRONTIER FOUND . SURVEILLANCE SELF -DEFENSE PROJECT , https://ssd.eff.org/wire /govt/pen -registers (last visited Apr. 9, 2012) (defining pen registers and trap and trace devices and explaining how […]
Kerr_The Next Generation Privacy Act
[…] criticisms$of$ the$ statute$and$ current$ reform$proposals$merely$tinker$ around$ the$ edges$ of$ the$statute.$The$proposals$retain$the$basic$structure$of$the$statute$and$only$”update”$a$few$isolated$aspects$of$its$overall$structure.$$Perhaps$the$best$way$to$appreciate$the$limited$nature$of$existing$criticism$ is$ to$appreciate$ the$reform$ proposals$recently$ advocated$by$ a$large$ and$ influential$set$of$civil$ liberties$ groups,$Internet$ companies,$and$privacy$scholars$known$as$the$Digital$Due$Process$Coalition.$72$$The$group$includes$non`profit$ organizations$ such$ as$ the$ American$ Civil$Liberties$Union$and$the$Electronic$ Frontier$Foundation$as$well$as$major$Internet$ businesses$ including$ Google,$ Apple,$ Facebook,$ Amazon,$Microsoft,$ and$ AT&T.73$Understanding$ the$Coalition’s$four$ principles$provides$a$ helpful$ illustration$ of$ the$ limited$ambitions$of$existing$ECPA$reform$proposals.$$$The$first$ proposal$ of$ the$Digital$ Due$ Process$ Coalition$would$impose$ a$ warrant$ requirement$for$ compelled$government$access$ to$stored$contents$ […]
Hartzog & Stutzman_Obscurity by Design
[…] Consumer Data (Dec. 18, 2012), available at http://www.ftc.gov/opa/2012/12/databrokers.shtm. 12.See, e.g., J AMES MANYIKA ET AL ., M CKINSEY GLOBAL INST ., B IG DATA : THE NEXT FRONTIER FOR INNOVATION , COMPETITION , AND PRODUCTIVITY (2011), available at http://www. mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation. 13.See, e.g., Daniel J. Solove, A Brief History of Information Privacy Law, in P […]