Computers, Privacy & the Constitution

Scientific and Technological Advancements and Changes in Privacy Protection Standards

-- By YoungLanYea - 06 Mar 2022

I. Introduction

The concept of the right to privacy first arose from the reckless infringement of personal matters following the development of science and technology.

When was "the development of science and technology"? Surely in prehistory, right? Science and technology were intrinsic to all human existence long before writing.

The rapid development of science and technology continuously affected the courts' privacy protection standards(1) to change. It is obvious that science, technology and privacy are closely related. Below, I will analyze how the development of science and technology has affected privacy protection standards, focusing on the Fourth Amendment case laws, and derive its implications.

But conflating searches and seizures in criminal investigation and prosecution with "the privacy protection standard" causes confusion here and throughout the draft. Constitutional civil liberties constrain state action. What the state may or may not do is axiomatically, or at least apparently axiomatically, differentiated from what parties may agree in their civil relations with one another to permit. Your decision to assume away this distinction results in reductions on both sides: we seem to have only the rights in our private relations that can withstand the compelling interests of the state in investigating and punishing crime, on the one hand, and those rights are somehow extensively restricted because the state supposedly acquires the power to do directly whatever we have otherwise permitted to anyone else in civil or familial life.

II. Fourth Amendment Cases and Privacy Standards

1. Katz v. United States (2) - “reasonable expectation of privacy"

Katz is a historical precedent that overturned the Olmstead case,(3) that an infringement on tangible personal property would constitute a search under the Fourth Amendment. This change was an inevitable result of technology development and the court no longer could insist on its earlier finding that the Fourth Amendment was “limited to certain areas or to tangible objects." (4)

Justice Harlan's concurrence opinion became the new privacy standard, the so-called “reasonable expectation of privacy” standard. First, an individual must subjectively expect a space of privacy, and second, society must recognize that expectation as reasonable. A “just trust in privacy” must be ensured through the history, language and context of the Fourth Amendment. (5)

This can be criticized for being unstable because what is ‘reasonable’ can change over time. As personal information gets more exposed with digitization, the expectation level of privacy protection may be lowered. However, the Harlan standard remains the dominant standard for privacy protection.

2. Recent precedent trends since establishment of “reasonable expectation of privacy”

(1) Kyllo v. United States(6)

The majority opinion cautions us that technological advances should not undermine the right to privacy. If privacy is threatened due to technological development, the existing privacy protection standards should not be applied mechanically, but should be dealt with through reinterpretation. The statement “to extend the holding of Katz to this case would leave the homeowner at the mercy of advancing technology”(7) emphasizes this point. This was a predictable purposive Fourth Amendment interpretation when considering home as a place to protect from unlawful searches and seizures.(8)

(2) United States v. Jones(9)

Justice Scalia held that the reasonable expectation of privacy is not an exclusive criterion, but rather applies in parallel with the physical intrusion of tangible property criterion. This differs from the Harlan standard. In Jones, the court did not apply the test of the expectation of privacy but applied the trespassory test to determine whether the Fourth Amendment was violated. Justice Scalia did not consider the trespassory test to be excluding the expectation of privacy test, and applied the trespassory test to the case as a minimum level of protection.

All of this could be reduced to one paragraph, with citations to cases that could be links. Communicating this sort of idea concisely is what law review writing is good at, specializes in. Here you are using almost 400 words to do what could be swiftly accomplished in 150.

III. Conclusion and Implications

For the past 40 years, the reasonable expectation of privacy standard has been applied as a criterion for judging the violation of the Fourth Amendment. Although the expectation of privacy test was able to accommodate various technological changes, it is necessary to examine whether it is still a sustainable rational standard despite the huge change in the privacy environment like today.

In reality, there is almost no space for reasonable expectation of privacy. The privacy infringement due to someone's intentional action or by digital environment itself is rapidly increasing. Our privacy exposure routes, such as the cloud, various social media, the Internet, smart devices, and CCTVs everywhere, are truly diverse and effective. You think you are wearing the clothes of privacy, but in fact, everyone's privacy is known to everyone.

No, only to a small number of commercial harvesters of behavior, the world's "privacy invasion subcontractors," "the platforms," also knowm as the Parasite with the Mind of God.

If this state continues, the reasonable expected space of privacy will soon disappear. And according to the test of the expectation of privacy, our privacy would no longer be protected. This is the reason why a new standard of judgment is needed.

Moreover, the trend of declining rational expectation of privacy is cleverly designed and implemented by the power house of information. Therefore, there will be no reversal of the current trend of decreasing privacy. Power house of information here refers to large multinational IT companies that possess and manage huge amounts of information. Information power will continue to lower the hurdle of ‘reasonable expectation of privacy’ as it is these IT companies’ interest to keep their business prosperous by preventing any blockage of information flow. A lot of our information is already stored and managed in their clouds without us having to decide.

It should be recognized today that clandestine privacy breaches can become an instrument of oppression and dictatorship by the information powers. Cloud, social media, and other web browsing are all concentrating our information on a handful of conglomerates. They collect information globally and it is difficult to predict what kind of power they will have and how they will be used. By them, our privacy will continue to be exposed whether we like it or not. In view of these changes, a new privacy protection standard is called for. As science and technology continue to develop, the privacy protection standards will likely evolve as the struggle to prevent the destruction of the sacred realm of privacy by the courts will persist.

The best route to improvement is to make clear what the failure to differentiate between state action and private accumulation of wealth and power obscures in this draft. How the state takes advantage of the privacy invasion subcontractors expands state power to some extent, but the power actually being amplified is that of the private intermediaries, whom you don't discuss as social actors, but only as technology components (such as "the cloud").

This is an excellent opportunity to improve the draft along the lines I have tried to describe: technology, politics and law as three indispensable legs on which our understanding sits. Not all science and technology but one technology pattern in particular is at stake here: the one in which simple services in the net are performed for the masses by intermediaries who collect thereby an immense flow of information on human behavior, at once immensely detailed and utterly comprehensive, uniting an intimate knowledge of each individual it awareness of the patterns of behavior across humankind. Organizing the technology in this way isn't "necessary"; the Net embracing humanity could work in many other, better ways.

Law that constrains government power interacts with this arrangement of the Net in complex ways. You are writing about one. It helps to make precise the relation between specific technology and law. If you do that here, it becomes evident why the 4th Amendment fails to address important 21st century questions. Because I spent weeks on that in class, the argument doesn't need any re-presentation. The politics put in the end the state and the platforms on the same side; they need one another too much to let the rights of people get in the way. Our ability to change this arrangement in favorem libertatis comes via two routes: we have the power as people individually and collectively to use technology differently, and we have — where we do have — constitutional civil liberties we can assert against government.


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.

Notes

1 : 1: In this paper, ‘the privacy protection standard’ refers to the principle applied to the judgment of privacy infringement under the 4th Amendment.

2 : 2: Katz v. United States, 389 U.S. 347 (1967).

3 : 3: Olmstead v. United Sates, 277 U.S. 438 (1928).

4 : 4: Matthew Tokson, Knowledge and Fourth Amendment Privacy, 111 Nw. U. L. Rev. 139, 142 (2016).

5 : 5: Richard Sobel, Barry Horwitz, Gerald Jenkins, The Fourth Amendment Beyond Katz, Kyllo and Jones: Reinstating Justifiable Reliance As a More Secure Constitutional Standard For Privacy, 22 B.U. Pub. Int. L.J. 1, 6 (2013).

6 : 6: Kyllo v. United States, 533 U.S. 27(2001).

7 : 7: Kyllo v. United States, 533 U.S. 27, 28, 121 S. Ct. 2038, 2040, 150 L. Ed. 2d 94 (2001).

8 : 8: Mark Mancini, The Need for Doctrine: Scalian Originalism and Canadian Purposivism, Advocates for the Rule of Law, Mar. 26, 2016, http://www.ruleoflaw.ca/the-need-for-doctrine-scalian-originalism-and-canadian-purposivism/.

9 : 9: United States v. Jones, 132 S. Ct. 945, 962 (2012).


Navigation

Webs Webs

r2 - 27 Mar 2022 - 14:11:02 - EbenMoglen
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM