Index:
[thread]
[date]
[subject]
[author]
From: Jeremy Robinson <jpr2108@columbia.edu>
To : <CPC@emoglen.law.columbia.edu>
Date: Tue, 03 May 2005 22:35:00 -0400
Paper #2: Reigning in the Beast: Informational Privacy and theConstitution
Here is my second paper (footnotes are included in the attached Word
document).
Computers, Privacy and the Law
Second Paper
Jeremy P. Robinson
Reigning in the Beast: Informational Privacy and the Constitution
Introduction
If the past term has made anything clear, it is that a multi-pronged
approach is necessary to adequately protect informational privacy - one
that addresses the data collection practices of both government and the
private sector and ensures the security of information technologies. In my
view, the best solution is to combine comprehensive privacy legislation
applicable to the private sector with a strategy to control the collection
of personal data by government. In this paper, I take up the latter task.
The point could be made that the Privacy Act of 1974 already requires the
government to apply fair personal information practices. However, this law
is riddled with loopholes and, consequently, has proven to be ineffective
in controlling the acquisition of vast amounts of personal data by
government. Accordingly, I focus on the Constitution - that final bulwark
against the abuse of government power. In particular, I consider whether a
defensible argument can be made for constitutional protection of
informational privacy.
Informational Privacy and the Constitution
The Fourth Amendment provides the focal point of many arguments seeking to
ground informational privacy rights in the Constitution. At first glance,
the Fourth Amendment's protection against unreasonable searches and
seizures seems to hold promise. In aid of such arguments, the Supreme
Court's decision in Kyllo v. United States demonstrates a willingness to
preserve a meaningful sense of those rights that are protected by the
Fourth Amendment when threatened by the invasive surveillance capabilities
of new technologies. But this really only begs the question we started
with, namely, does this provision protect informational privacy?
>From a pro-privacy perspective, the primary difficulty with the Fourth
Amendment is that it lies so close to the heart of informational privacy
and yet has not been interpreted in a way that is favorable to the
inclusion of such a right. For example, it is well-established law that
visual observation is not a "search" under the Fourth Amendment. The
Supreme Court has also recently upheld a state law requiring individuals to
identify themselves to police upon request. Furthermore, the Court has
held that there is no reasonable expectation of privacy in data transferred
to third parties. Perhaps most decisively, the Court has also explicitly
held that the Fourth Amendment "?cannot be translated into a general
constitutional "right to privacy.""
In contrast, the First and Fourteenth Amendments provide more fertile
ground in which to root a right of informational privacy. The First
Amendment does so because it has been interpreted to protect a right of
anonymity. The Fourteenth Amendment's Due Process clause is also useful
in light of the fact that it has been interpreted (in conjunction with
various other amendments) to protect a "penumbral" right to privacy. I do
not suggest that the Fourteenth Amendment can be used merely due to its
association with the term "privacy." Instead, it is the fact that the
Supreme Court's jurisprudence in this area, from Griswold v. Connecticut to
Lawrence v. Texas, protects the individual's ability to make personal
decisions relating to reproductive and sexual rights. In protecting the
individual's decision-making authority, the Court is really protecting
individual autonomy (albeit in a limited capacity).
My argument for the constitutional protection of informational privacy
requires the following three steps. Unfortunately, there is not the space
to explain each step in great detail.
The Constitution Protects Personal Authority. Independently, the First and
Fourteenth Amendments clearly fall short of protecting informational
privacy. However, in combination we can see that the right of anonymity
and the right of autonomy protect a sphere of individual decision-making
authority - one that lies at the intersection of liberty (i.e., defined as
freedom from state interference) and the individual's ability to exercise
control over his or her life. For ease of reference, I will use the
phrase "personal authority" to refer to this intersection of liberty and
individual control.
Personal Authority is a Fundamental Right. The next necessary step is to
establish the concept of personal authority as a fundamental liberty
interest that is deeply rooted in American history and tradition. A good
argument that personal authority is such a fundamental right can be
constructed from the fact that the very legitimacy of the U.S. government
is premised on the concept of the consent of the governed. In other words,
it is only by virtue of the people's exercise of personal authority that
the state obtains its authority to govern. I can think of no better
example to support this argument than the Declaration of Independence,
which states explicitly:
"We hold these truths to be self-evident, that all men ? are endowed with
their Creator with certain unalienable Rights, that among these are Life,
Liberty and the pursuit of Happiness. That to secure these rights,
Governments are instituted among Men, deriving their powers from the
consent of the governed ?" [emphasis added]
Personal Authority and Informational Privacy. The final step in this
argument must establish a conceptual link between personal authority and
informational privacy. To establish such a connection, we must recognize
that informational privacy is no longer about secrecy or confidentiality.
Traditional notions of privacy as secrecy have been virtually eliminated by
the rapid development of new technologies such as thermal imaging devices,
GPS and RFID tags (to list only a few) and the emergence of an American
surveillance society. If privacy is to mean anything these days, it must
as a practical necessity concern control over one's personal information.
In the digital age, privacy is about information control not secrecy. In
this way, personal authority lies at the very heart of informational
privacy.
Weaving all of the above together, I propose that a defensible (perhaps
only plausible) argument can be advanced for the protection of
informational privacy under either the First or Fourteenth Amendments. To
choose one, I suggest that the liberty protected by the Due Process clause
of the Fourteenth Amendment provides the best constitutional "hook" upon
which to protect informational privacy.
Postscript. In the alternative, the above argument could also be used to
attempt to ground informational privacy in the Ninth Amendment. However, I
do not think it necessary or feasible to awaken this sleeping tiger just
yet.
-Jeremy Robinson
╨╧рб▒с hicy hicy hicy hicy hicy hicy ■hicy |he BeastreNP┼@st.puters, Privacy and the LawSecond Paper
Jeremy P. Robinshicion
Reigning in the Beast:
Informational Privacy and thhicye Constitution
Introduction
If the past term has made hicyanything clear, it is that a multi-pronged approach is nehicycessary to adequately protect informational privacy Ц onehicy that addresses the data collection practices of both govhicyernment and the private sector and ensures the security ohicyf information technologies. In my view, the best solutiohicyn is to combine comprehensive privacy legislation applicahicyble to the private sector with a strategy to control the hicycollection of personal data by government. In this paperhicy, I take up the latter task.
The point could be made hicythat the Privacy Act of 1974 already requires the governmhicyent to apply fair personal information practices. Howevehicyr, this law is riddled with loopholes and, consequently, hicyhas proven to be ineffective in controlling the acquisitihicyon of vast amounts of personal data by government. Accohicyrdingly, I focus on the Constitution Ц that final bulwarkhicy against the abuse of government power. In particular, Ihicy consider whether a defensible argument can be made for chicyonstitutional protection of informational privacy.
Inforhicymational Privacy and the Constitution
The Fourth Amendmehicynt provides the focal point of many arguments seeking to hicyground informational privacy rights in the Constitution. hicy At first glance, the Fourth AmendmentТs protection againhicyst unreasonable searches and seizures seems to hold promihicyse. In aid of such arguments, the Supreme CourtТs decisihicyon in Kyllo v. United States demonstrates a willingness hicyto preserve a meaningful sense of those rights that are phicyrotected by the Fourth Amendment when threatened by the ihicynvasive surveillance capabilities of new technologies. Bhicyut this really only begs the question we started with, nahicymely, does this provision protect informational privacy? hicy
From a pro-privacy perspective, the primary difficultyhicy with the Fourth Amendment is that it lies so close to thhicye heart of informational privacy and yet has not been inthicyerpreted in a way that is favorable to the inclusion of shicyuch a right. For example, it is well-established law thahicyt visual observation is not a УsearchФ under the Fourth Ahicymendment. The Supreme Court has also recently upheld a hicystate law requiring individuals to identify themselves tohicy police upon request. Furthermore, the Court has held thicyhat there is no reasonable expectation of privacy in datahicy transferred to third parties. Perhaps most decisively,hicy the Court has also explicitly held that the Fourth Amendhicyment УЕcannot be translated into a general constitutionalhicy Уright to privacy.ФФ
In contrast, the First and Fourtehicyenth Amendments provide more fertile ground in which to rhicyoot a right of informational privacy. The First Amendmenhicyt does so because it has been interpreted to protect a rihicyght of anonymity. The Fourteenth AmendmentТs Due Proceshicys clause is also useful in light of the fact that it has hicybeen interpreted (in conjunction with various other amendhicyments) to protect a УpenumbralФ right to privacy. I do hicynot suggest that the Fourteenth Amendment can be used merhicyely due to its association with the term Уprivacy.Ф Instehicyad, it is the fact that the Supreme CourtТs jurisprudencehicy in this area, from Griswold v. Connecticut to Lawrence vhicy. Texas, protects the individualТs ability to make persohicynal decisions relating to reproductive and sexual rights.hicy In protecting the individualТs decision-making authorithicyy, the Court is really protecting individual autonomy (alhicybeit in a limited capacity).
My argument for the constihicytutional protection of informational privacy requires thehicy following three steps.
The Constitution Protects Personhicyal Authority. Independently, the First and Fourteenth Amhicyendments clearly fall short of protecting informational phicyrivacy. However, in combination we can see that the righhicyt of anonymity and the right of autonomy protect a spherehicy of individual decision-making authority Ц one that lies hicyat the intersection of liberty (i.e., defined as freedom hicyfrom state interference) and the exercise of control overhicy oneТs life. For ease of reference, I will use the phrahicyse Уpersonal authorityФ to refer to this intersection of hicyliberty and individual control.
Personal Authority is a hicyFundamental Right. The next necessary step is to establihicysh the concept of personal authority as a fundamental libhicyerty interest that is deeply rooted in American history ahicynd tradition. A good argument that personal authority ishicy such a fundamental right can be constructed from the fachicyt that the very legitimacy of the U.S. government is premhicyised on the concept of the consent of the governed. In ohicyther words, it is only by virtue of the peopleТs exercisehicy of personal authority that government obtains its authorhicyity to govern. I can think of no better example to suppohicyrt this argument point than the Declaration of Independenhicyce, which states explicitly:
УWe hold these truths to behicy self-evident, that all men Е are endowed with their Creahicytor with certain unalienable Rights, that among these arehicy Life, Liberty and the pursuit of Happiness. That to sechicyure these rights, Governments are instituted among Men, dhicyeriving their powers from the consent of the governed ЕФ hicy[emphasis added]
Personal Authority and Informational Prhicyivacy. The final step in this argument must establish a hicyconceptual link between personal authority and informatiohicynal privacy. To establish such a connection, we must rechicyognize that informational privacy is no longer about secrhicyecy or confidentiality. Traditional notions of privacy ahicys secrecy have been virtually eliminated by the emergencehicy of a surveillance society in the U.S. and the rapid devehicylopment of new technologies such as thermal imaging devichicyes, GPS and RFID tags (to list only a few). If privacy ihicys to mean anything these days, as a practical necessity ihicyt must be about control over oneТs personal information. hicy In the digital age, privacy is about information controlhicy not secrecy. In this way, personal authority lies at thhicye very heart of informational privacy.
Weaving all of thicyhe above together, I propose that a defensible (perhaps ohicynly plausible) argument can be advanced for the protectiohicyn of informational privacy under either the First or Fourhicyteenth Amendments. To choose one, I suggest that the libhicyerty protected by the Due Process clause of the Fourteenthicyh Amendment provides the best constitutional УhookФ upon hicywhich to protect informational privacy.
Postscript. In hicythe alternative, the above argument could also be used tohicy attempt to ground informational privacy in the Ninth Amehicyndment. However, I do not think it feasible or necessaryhicy to awaken this sleeping tiger just yet.
See Solove, hicyDaniel J. and Hoofnagle, Chris Jay, "A Model Regime of Prhicyivacy Protection (Version 2.0)" (April 5, 2005), GWU Law hicySchool Public Law Research Paper No. 136, pp. 9 and 19 (ahicyrguing that the government can easily circumvent the Privhicyacy Act by obtaining the information it wants from privathicye sector data brokers). See URL= HYPERLINK "http://ssrhicyn.com/abstract=699701" http://ssrn.com/abstract=699701 hicy
Kyllo v. United States, 533 U.S. 27 (2001) (holding thicyhat the use of a thermal imaging device to detect heat emhicyanating from a home constituted an illegal search).
Dohicyw Chemical Co. v. United States, 476 U.S. 227 (1986).
hicyHiibel v. Sixth Judicial District Court, No. 03Ч5554 (US hicy2004). An officer need only have a Уreasonable suspicionhicyФ that the individual is involved in wrongdoing.
Unitehicyd States v. Miller, 425 U.S. 435 (1976) and Smith v. Maryhicyland, 442 U.S. 735 (1979).
Katz v. United States, 389 hicyU.S. 347, 350 (1967)
McIntyre v. Ohio Elections Commishicysion, 514 U.S. 334 (1995) and Watchtower Bible & Tract SohicycТy of N.Y. v. Village of Stratton, 536 U.S. 150 (2002).
hicy
Griswold v. Connecticut, 381 U.S. 479 (1965).
Lawrehicynce v. Texas, 123 S. Ct. 2473 (2003).
My argument herehicy recalls the structure of Justice DouglasТ argument from hicythe УpenumbrasФ in Griswold.
70"їJ6Б]БХЄ8$H$`Д╨dUnrl J nehaidefnБTtt6"0АЕАл@0АiireuPertnu CmoRSecocemsan ep i e ctl m
HaJ$$Д╨@&dA@Є б╨]Д╨^Д╨fЩ
╞2JД
ШШШ@"rInooP \ml otmoenceyOtdn ep io- @АT$(4@ЗzР Зz"pcА@tH @╨a$@&`Д╨
╞`вxа4 ╚#\'Ё*Д.2м5@9aJ8ШШ@n\oaaoosАЗzЗzЁ╨ББr4di P \ml otmoenceyias CDiunV@ЗzР Зz"pen:enjbjт=т=т=т=т=т=т=ND ■ hici
hicy hicy hicy hicy hicy hicy hicy ord Document╒═╒Ь.УЧINKSsmV=т=т=т=N
hicy hicy hicy hicy hicy hicy hicy * + U ■ f hicy o lmentЧ two-pronged approach is necessary to adequately protect hicyinforAhpüearrmalft Word 9.0PP┼0
-----------------------------------------------------------------
Computers, Privacy, and the Constitution mailing list
Index:
[thread]
[date]
[subject]
[author]