Computers, Privacy & the Constitution

View   r2  >  r1  ...
ZebJohnsonFirstPaper 2 - 24 Apr 2017 - Main.ZebulunJohnson
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
-- ZebulunJohnson - 05 Apr 2017
Changed:
<
<
The Limitations of the 4th Amendment – What it Can and Cannot Do
>
>

The Limitations of the 4th Amendment – What it Can and Cannot Do

 As we’ve discussed in class, the threat posed to individuals from big data derives not from individual data points, but from a reconstituted behavioral identity which can be exploited. Individuals face the danger of data exploitation from two distinct directions. The first danger comes from the data which individuals voluntarily (on its face) grant to entities in exchange for goods/services. In this relationship, generally the consumer allows the commercial gathering of data by larger entities, as by doing so the consumer is promised free or improved software and hardware. The second danger comes from the taking of data from larger entities by the government. In this relationship, the government uses the power of the law to compel entities to hand over the data they’ve collected on individuals, force entities to begin collecting data on individuals, or both.
Line: 10 to 10
 
Changed:
<
<
The Dual Relationships of Data
>
>

The Dual Relationships of Data

 The current privacy framework between individuals and larger entities, known as “notice and choice”, was adopted by the FTC in the 1970’s. This framework addresses privacy concerns through ensuring user notice and consent. The framework is designed to “preserve user autonomy,” “flexible, inexpensive to implement, and easy to enforce,” and “legitimize information practice.” Through TOS’s and EULAs, the common viewpoint is that individuals voluntarily give up information in return for goods and services. Though this viewpoint might be incorrect or flawed, under the current privacy framework the transfer and collection of data is viewed as a legitimate agreement between two parties.

In contrast, the privacy framework between individuals and the government primarily comes from the Fourth Amendment protections against unreasonable searches and seizures by the government, which do very little to curb the mass collection of data. Currently, the various government agencies conduct mass surveillance through contract, secrecy, or force. Through contract, corporations are incentivized to leave exploits open for individual surveillance or to deliver gathered data in return for a fee. If there is no contract, the data is stolen either through trade with other governments or governmental teams. If there is no contract, the data cannot be stolen, and an entity refuses to comply with a request for data, the government has the ability to use the power of the law as a bludgeon to enforce compliance.

Changed:
<
<
Possess v. Access

There are two levels of government action against an individual’s property which have widely been addressed. The first is that of possession. The state cannot take possession of an individual’s property without extreme circumstances. We see this in a range of difficulty: from the possession of the person through the criminal system, of real property through the nearly highly situational takings clause, and of chattel for evidence. Each of these have standards, each of them have developed over hundreds of years, and each of them demonstrate the value our society places on making possession by the state difficult.

This is the only level of government action which the 4th amendment would protect against, as it is the only action which is unreasonable.

Now, it could be argued that data is not actual property. This argument would be worth exploring if our legal system did not already protect data as property through copyright laws. Add in something about how copyrights are special, maybe individuals should have the copyright to their own data?

The second level of government action, that of government access to information, would not be protected by the 4th amendment. Should the government have simple probable cause, they could probably ask a corporation to send them the data. This would more likely be viewed as recordings in decurity cameras than anything else. Law enforcement would simply have to ask, and it would be handed over. Why would a warrant be required?

>
>

Possess v. Access


ZebJohnsonFirstPaper 1 - 05 Apr 2017 - Main.ZebulunJohnson
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="WebPreferences"
-- ZebulunJohnson - 05 Apr 2017

The Limitations of the 4th Amendment – What it Can and Cannot Do

As we’ve discussed in class, the threat posed to individuals from big data derives not from individual data points, but from a reconstituted behavioral identity which can be exploited. Individuals face the danger of data exploitation from two distinct directions. The first danger comes from the data which individuals voluntarily (on its face) grant to entities in exchange for goods/services. In this relationship, generally the consumer allows the commercial gathering of data by larger entities, as by doing so the consumer is promised free or improved software and hardware. The second danger comes from the taking of data from larger entities by the government. In this relationship, the government uses the power of the law to compel entities to hand over the data they’ve collected on individuals, force entities to begin collecting data on individuals, or both.

While there are many arguments that the Fourth Amendment should prevent the government from forcibly collecting data, such a robust interpretation of the Fourth Amendment would in fact do little to curb the dangers posed by data exploitation. As long as the aforementioned relationship between individuals and private entities is viewed as voluntary, the Fourth Amendment can do little to prevent government collection of data.

The Dual Relationships of Data

The current privacy framework between individuals and larger entities, known as “notice and choice”, was adopted by the FTC in the 1970’s. This framework addresses privacy concerns through ensuring user notice and consent. The framework is designed to “preserve user autonomy,” “flexible, inexpensive to implement, and easy to enforce,” and “legitimize information practice.” Through TOS’s and EULAs, the common viewpoint is that individuals voluntarily give up information in return for goods and services. Though this viewpoint might be incorrect or flawed, under the current privacy framework the transfer and collection of data is viewed as a legitimate agreement between two parties.

In contrast, the privacy framework between individuals and the government primarily comes from the Fourth Amendment protections against unreasonable searches and seizures by the government, which do very little to curb the mass collection of data. Currently, the various government agencies conduct mass surveillance through contract, secrecy, or force. Through contract, corporations are incentivized to leave exploits open for individual surveillance or to deliver gathered data in return for a fee. If there is no contract, the data is stolen either through trade with other governments or governmental teams. If there is no contract, the data cannot be stolen, and an entity refuses to comply with a request for data, the government has the ability to use the power of the law as a bludgeon to enforce compliance.

Possess v. Access

There are two levels of government action against an individual’s property which have widely been addressed. The first is that of possession. The state cannot take possession of an individual’s property without extreme circumstances. We see this in a range of difficulty: from the possession of the person through the criminal system, of real property through the nearly highly situational takings clause, and of chattel for evidence. Each of these have standards, each of them have developed over hundreds of years, and each of them demonstrate the value our society places on making possession by the state difficult.

This is the only level of government action which the 4th amendment would protect against, as it is the only action which is unreasonable.

Now, it could be argued that data is not actual property. This argument would be worth exploring if our legal system did not already protect data as property through copyright laws. Add in something about how copyrights are special, maybe individuals should have the copyright to their own data?

The second level of government action, that of government access to information, would not be protected by the 4th amendment. Should the government have simple probable cause, they could probably ask a corporation to send them the data. This would more likely be viewed as recordings in decurity cameras than anything else. Law enforcement would simply have to ask, and it would be handed over. Why would a warrant be required?


Revision 2r2 - 24 Apr 2017 - 22:51:19 - ZebulunJohnson
Revision 1r1 - 05 Apr 2017 - 18:48:06 - ZebulunJohnson
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM