Beyond terrorism: data collection and responsibility for privacy
https://doi.org/10.1108/03055720610716647Abstract
Abstract Purpose – The purpose of this paper is to examine privacy rights and the relationship between those rights and business and government interests in data collected from individuals. Design/methodology/approach – This paper approaches legal issues from the perspective of the consumer or citizen. Findings – While conducting research for this paper, it was found that the issues facing the citizenry on privacy protection have been addressed extensively in the not too distant past. The distinguishing characteristic is the speed with which data can be collected and disseminated and the infinitely more vast amount of personal data being collected not only by the government and businesses with whom consumers conduct transactions, but also by independent data brokers. Originality/value – Privacy rights are ephemeral and difficult to measure. Businesses, therefore, appear to have difficulty determining the value of protecting consumers’ privacy. Additionally, governments from which citizens derive many social services accumulate substantial personal information given in exchange for those services. Businesses and governments are increasingly negligent in protecting the data collected on individuals, which has been revealed by a series of reported data breaches, disclosures, thefts, and surveillance activities. This paper addresses the inherent value in protecting the privacy interests of individuals and proposes that more robust privacy laws, derived from established tort law, be developed and used by concerned persons. Keywords: Data collection, Law, Privacy, Human rights, Knowledge management, Consumers Paper type: Conceptual paper
References (35)
- Associated Press (2006a), "Bush officials defend financial monitoring", The Journal, p. A3. Associated Press (2006b), "Sailors' data, Social Security, found on internet", The Journal, p. A3. Associated Press (2006c), "Some question expansion of presidential power", The Journal, p. A3, available at: www.journal-news.net/custserv/index.asp.
- Bazan, E. and Elsea, J. (2006), "Presidential authority to conduct warrantless electronic surveillance to gather foreign intelligence information", Congressional Research Service memorandum. Boyd v. US (1886), 116 US 616. Business for Social Responsibility (BSR) (2005), "BSR issue briefs: privacy (consumer and employee)",available at: www.bsr.org/CSRResources/IssueBriefDetail.cfm?DocumentID= 50970 (accessed June 20, 2006).
- Cauley, L. (2006), "NSA has massive database of Americans' phone calls", USAToday, available at: www.usatoday.com/news/washington/2006-05-10-nsa-x.htm (accessed June 14, 2006).
- Church Committee (1976), Intelligence Activities and the Rights of Americans. Book II, Final Report, US Senate, Washington, DC.
- Dam, K.W. and Lin, H.S. (Eds) (1996), Cryptography's Role in Securing the Information Society, Computer Science and Telecommunications Board, National Research Council, Washington, DC, available at: www.nap.edu/readingroom/books/crisis
- Epstein, R. (1998), Testimony before the Senate Judiciary Subcommittee on the constitution, federalism and property rights.
- Gayton, C. (2006), "Legal issues for the knowledge economy in the twenty-first century", VINE, Vol. 36 No. 1, pp. 17-26.
- Gayton, C. and Vaughn, R. (2004), Legal Aspects of Engineering, 7th ed., Kendall-Hunt Publishing, Dubuque, IA.
- Gonzales, A.R. (2006), "Prepared statement of Hon. Alberto R. Gonzales, Attorney General of the United States", February, available at: http://149.101.1.32/ag/speeches/2006/ ag_speech_060206.html
- Goo, S. (2006), "Concerns raised over AT&T privacy policy", The Washington Post, p. D5. Hamdi v. Rumsfeld (2004), 542 US 507.
- Harrow, R. Jr (2005), No Place to Hide, Simon & Schuster, New York, NY.
- Holtzman, D. (2006), "Viewpoint: the privacy pirates -corporate policies on the collection and management of personal data do precious little to protect your privacy", BusinessWeek, available at: http://businessweek.com/print/technology/content/jul2006/tc20060724_ 816608.htm (accessed August 9, 2006).
- Koh, H. (2006), Testimony of Professor Harold Hongju Koh, Dean, Yale Law School, before the Senate Judiciary Committee regarding wartime executive power and the National Security Agency's Surveillance Authority.
- Litman, J. (2000), "Information privacy/information property", Stanford Law Review, Vol. 52, p. 1283.
- Marquis, G. (2003), "From the 'dossier' society to database networks", Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination, Routledge, London.
- PSECU v. Fifth Third Bank and BJ's Wholesale Club (2005), USDC MD Pa, Case No. CV04-1554. Privacy Protection Study Commission (1977), Personal Privacy in an Information Society: The Report of the Privacy Protection Study Commission, US Government Printing Office, Washington, DC.
- Rotenberg, M. (2000), Testimony and statement of record of Marc Rotenberg, hearing on identity theft and data broker services before the Committee on Commerce, Science and Transportation.
- Songini, M. (2006), "Auditor's report criticizes Florida's voter database", ComputerWorld, June 26, p. 12. Stanford Encyclopedia of Philosophy (2002), "Privacy", May 14, available at: http://plato.stanford. edu/entries/privacy (accessed June 29 2006).
- Stiglitz, J. (1999), "On liberty, the right to know, and public discourse: the role of transparency in public life", Oxford Amnesty Lecture, Oxford, available at: http://siteresources.worldbank. org/NEWS/Resources/oxford-amnesty.pdf (accessed February 2, 2006).
- Stoneburner, G., Goguen, A. and Feringa, A. (2002), Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology (NIST), United States Department of Commerce, Washington, DC, available at: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf (accessed July 5, 2006).
- Swanson, J. (1992), The Public and the Private in Aristotle's Political Philosophy, Cornell University Press, New York, NY.
- Szeremeta, J. (2005), Understanding Knowledge Societies, United Nations Publishing Section, New York, NY.
- Tussman, J. (1977), Government and the Mind, Oxford University Press, New York, NY. United States Department of Justice et al. v. Committee for Freedom of the Press et al. (1989), 789 US 749. Universal Music Group (n.d.), "Universal Music Group privacy policy", available at: http:// privacypolicy.umusic.com (accessed June 14 2006). Beyond terrorism
- Vijayan, J. (2006a), "Judge dismisses data breach lawsuit", ComputerWorld, p. 12.
- Vijayan, J. (2006b), "School out to improve its marks on security", ComputerWorld, p. 6.
- Wack, K. (2006), "US threatens suit if Maine probes Verizon ties to NSA", Portland Press Herald, available at: http://pressherald.mainetoday.com/news/state/060804verizon.shtml (accessed August 9 2006).
- Weeks v. US (1914), 232 US 383. Whalen v. Roe (1977), 429 US 589, 605.
- Winseck, D. (2003), "Netscapes of power: convergence, network design, walled gardens, and other strategies of control in the information age", Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination, Routledge, London.
- Zureik, E. (2002), "Theorizing surveillance -the case of the workplace", in Lyon, D. (Ed.), Surveillance as Social Sorting, Routledge, London.
- Further reading Associated Press (2006), "AOL technology chief, two others leave after data-privacy breach", Wall Street Journal, p., p. 6.
- Garrison, W. and Ramamoorthy, C. (1970), Privacy and Security in Data Banks, Technical Memorandum No. 24, Information Systems Research Laboratory, Urbana-Champaign, IL.
- Healy, G. (2003), "Beware of total information awareness", available at: www.cato.org/daily/ 01-20-03.html (accessed June 14, 2006).
- Jensen, J. (1991), Army Surveillance in America, 1775-1980, Yale University Press, New Haven, CT. Lyon, D. (Ed.) (2003), Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination, Routledge, London.
- Medford, C. (2006), "AT&T: we own your records", Red Herring, June 22, available at: www. redherring.com (accessed August 9, 2006).
- OECD (1979), "Transborder data flows and the protection of privacy", Proceedings, Information Computer Communications Policy, Paris. About the author Cynthia M. Gayton holds a Bachelor of Arts degree in International Affairs from The George Washington University and a Juris Doctor degree from George Mason University in Arlington. Cynthia is a member of both the State Bar of Virginia and the District of Columbia Bar. Before joining the AIA, Cynthia had her own practice specializing in intellectual property and corporate law. In addition, she worked as an attorney at Morgan Lewis & Bockius, concentrating in complex antitrust litigation. Additionally, Cynthia is a part time adjunct professor of engineering law at The George Washington University School of Engineering and Applied Sciences. Cynthia is the co-author of Legal Aspects of Engineering, released in August of 2004 by Kendall/Hunt publishers and "Knowledge management in the large law firm" available at www.knowledgeboard.com Cynthia Gayton can be contacted at cgayton@gwu.edu To purchase reprints of this article please e-mail: reprints@emeraldinsight.com Or visit our web site for further details: www.emeraldinsight.com/reprints