Blog

  • Information Privacy Law- Charlie O’Toole

    By: Charlie O’Toole

    Responding to these articles:

    http://fortune.com/2015/06/18/shutterfly-lawsuit-facial-recognition/

     http://www.natlawreview.com/article/tag-you-re-it-biometric-information-privacy-act-class-action-against-shutterfly

    In June, 2015, Brian Norberg filed a class action lawsuit in Illinois federal court claiming that Shutterfly, an online vendor of photo prints, had violated an Illinois statute governing the collection of biometric data. The case, Norberg v. Shutterfly, Inc., Case No. 15-cv-5351 (N.D. Ill.), came about when Norberg somehow noticed that, despite his never having used Shutterfly himself, the website had employed facial recognition software to analyze and store a record of his face from a photograph uploaded and tagged with his name by an acquaintance. Judge Charles Norgle, of the Northern District of Illinois, denied Shutterfly’s motion to dismiss in an order dated December 29, 2015.

    This case, along with a handful of similar ones filed recently, rely on an Illinois statute that requires companies to disclose to consumers when they collect biometric data (such as fingerprints or voice recordings) and how that data may be used. 740 Ill. Comp. Stat. 14 (2008). Illinois and Texas are so far the only two states with laws expressly governing the collection of this kind of data. David Almeida and Mark Eisen note in their National Law Review article that the Illinois statute appears to be modeled in part on federal privacy statutes like Fair Credit Reporting Act, in that it provides a private cause of action, and also assigns relatively high statutory damages ($1,000–$5,000 per violation).

    In United States v. Spokeo, Inc., No. CV12-05001MMM(JHx) (C.D. Cal., June 7, 2012), the FTC determined that an aggregator of personal information constituted a consumer reporting agency under the FCRA. Spokeo ultimately signed a consent decree, agreeing to pay a fine of $800,000 and reform its internal practices to comply with the FCRA, but its founder issued a credible statement claiming not to have known that Spokeo, which started as an aggregator of social media information, was regulated by the FCRA. Similarly, Shutterfly and its peer defendants in these more recent cases could plausibly have had no idea that a statute governing the collection of data gleaned from retinal scans and fingerprint readers could expose them to liability for using facial recognition software. Indeed, as Shutterfly pointed out in its motion to dismiss, the Illinois statute expressly excludes photographs from its scope, though Norberg successfully argued that a “faceprint” of the kind stored by Shutterfly’s software is not the same thing as the photograph itself.

    Whatever the outcome of this round of privacy litigation, the Shutterfly case highlights the uneasy tension between the federalist/sectoral U.S. privacy law regime and the realities of an increasingly data-focused marketplace. On the one hand, consumers have reason for concern over the collection of more and more kinds of personal information. In particular, as new kinds of personal information become eligible for electronic collection, storage, and organization, various kinds of data aggregation may reveal or suggest information about people that they never contemplated disclosing, publicly or otherwise. On the other hand, the exploitation of “Big Data” is a major source of untapped social value, from businesses targeting advertising to consumers who are likely to be interested in their products, to analyzing anonymized health records organized by zip code in order to help prevent obesity. Caryn Roth et al., Community-level determinants of obesity, BMC Medical Informatics & Decision Making 14:36 (2014), http://www.biomedcentral.com/1472-6947/14/36.

    Fragmenting U.S. privacy law by means of a sectoral system allows for the tailoring of legal standards for the public and private sectors, and for different industries that use information differently. In theory, this system could work better for industry and consumers, as laws can be tailored to strike the right balance between all the competing interests in each domain. The same benefits are often claimed for a federalist system of government—to take an example from the area of privacy law, the FCRA can set out a floor for acceptable data security, while individual states can strengthen one or more aspects of the law depending on their constituents’ special needs or preferences. It is arguably important for the U.S. to maintain its sectoral approach to privacy law to serve as a counterpoint to the E.U.’s influence in spreading an omnibus regime throughout much of the rest of the world. Having a major economic power using a different approach could serve as a good demonstration of the costs and benefits of each system. However, as industry continues to collect and configure data in new, unanticipated ways, deterrence effected by the threat of class actions, buttressed by the statutory damages imposed by most privacy-focused laws, may be a bridge too far.

     

  • Congress Considers Changes to FCRA to Expand Consumer Credit Files and Limit Use of Credit Reports for Employment Decisions

    Congress Considers Changes to FCRA to Expand Consumer Credit Files and Limit Use of Credit Reports for Employment Decisions

    By: Eline Declerck

    https://www.carltonfields.com/congress-considers-changes-to-fcra-to-expand-consumer-credit-files-and-limit-use-of-credit-reports-for-employment-decisions-01-21-2016/ (1/21/2016)

    This article written by Jeffrey Rood of Carltonfields discusses two bills amending the Fair Credit Reporting Act that are currently making their way through Congress: “the Credit Access and Inclusion Act,” introduced on December 12, 2015, and “the Equal Employment for All Act,” introduced on September 16, 2015. Both bills are intended to benefit consumers.

    The purpose of the Credit Access and Inclusion Act is to encourage utility and telecom companies and landlords to furnish all payment data, both positive and negative, to Credit Reporting Agencies (“full-file reporting”). Research has shown that most utility and telecom companies either report only negative information (delinquencies, defaults, and collections), or do not report at all. This is mainly caused by regulatory uncertainty on the legality of furnishing data to Credit Reporting Agencies. The amendment aims to address that uncertainty by affirmatively allowing full-file reporting.

    Supporters of the bill argue that the increased reporting will help consumers with little credit history but who have a record of paying their utility, telecom, and rent payments on time. A more complete credit history will increase their access to affordable credit markets. Opponents however believe that the supporters are underestimating the number of consumers that will see their credit score lowered by this increased reporting. They disagree with the assertion that a low credit score would be better than no score, especially given the impact on employment chances and loans.

    Given that both arguments have merit, a compromise could consist of permitting consumers to voluntary opt-in to full-file reporting – an option also mentioned in the article and which the opponents are not opposing. A voluntary opt-in would put consumers in control rather than giving utility and telecom providers a too broad discretion. It would allow consumers to benefit from full-file reporting while protecting those consumers who would be worse off. It would also be consistent with existing legislation in certain States that are prohibiting utility and telecom providers from sharing payment data without the customer’s consent.

    The Equal Employment for All Act is intended to limit employers’ ability to use credit reports for “employment purposes,” one of the statutorily permissible purposes under the Fair Credit Reporting Act. The amendment would prohibit the use of consumer credit checks against prospective and current employees for the purposes of making adverse employment decisions. The bill follows the trend of State legislations that are increasingly limiting employers’ ability to use credit reports for employment purposes.

    Support of the bill argue that credit reports are often inaccurate and claim that they bear little to no correlation to job performance or ability to succeed in the workplace. Opponents say that use of credit reports for employment purposes is limited and underline their importance for employees who are in charge of financial assets. Also, at least one study shows that living beyond one’s means and experiencing financial difficulties are the two biggest indicators of employee fraud.

    Again, both sides seem to have valid arguments. A possible compromise could be to include limited exceptions to the prohibition for employee positions in charge of financial assets or especially vulnerable to employee fraud. But according to the article, this bill has little change of passing in the current Congress. Unlike the Credit Access and Inclusion Act, this bill does not have bipartisan support and similar legislation stalled in Congress in 2010.

    The discussions regarding these amendments show the difficulties in regulating consumer data flows, especially in the context of credit reports. Credit reports are of significant importance for consumers as they directly impact their ability to loan money, find employment and rent an apartment. Credit reports should be accurate and consumers prefer having control over which data is reported and for which purposes they are used. Banks, employers and landlords on the other hand want to receive as much information as possible in order to be able to take informed decisions and limit their risks. Finding common ground and establishing rules suitable for all situations is not an easy task.

  • PRG News Roundup: February 17th

    Apple and the US Government are at impasse after the government secured a court order requiring Apple’s assistance in unlocking one of the San Bernardino killer’s iPhone. http://www.nytimes.com/2016/02/18/technology/apples-stance-highlights-a-more-confrontational-tech-industry.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=first-column-region&region=top-news&WT.nav=top-news&_r=0

     

    In a report on the NSA’s data collection program under Section 702 of the FISA, it turns out the NSA is collecting much less information on American citizens than previously thought.  http://www.nytimes.com/2016/02/17/us/report-says-networks-give-nsa-less-data-than-long-suspected.html?ref=topics

     

    NYU ITP’s Lauren McCarthy created an app in which a real person follows you around for a day of their choosing, in an art project seeking to replicate online social media in the real world. http://www.forbes.com/sites/reehines/2016/02/17/a-follower-who-actually-follows-you-around-stalker-app-promises-to-keep-a-close-eye-on-you/#1524ce7b3494

     

    The Sixth Circuit decided U.S. v. Houston in which the police were allowed to mount a camera on a telephone pole outside of the residence of Rocky Joe Houston. http://www.ca6.uscourts.gov/opinions.pdf/16a0031p-06.pdf

     

    The South Dakota legislature passed a bill to prohibit transgender youth from using bathrooms and locker rooms of their identified gender.http://www.csmonitor.com/USA/Society/2016/0217/South-Dakota-bathroom-bill-opens-up-conversation-about-transgender-rights-video
  • OPPORTUNITY TO STUDY TRANSATLANTIC PRIVACY LAW IN AMSTERDAM THIS SUMMER

    Ivir-privacylaw-2016-banner

    Please see below re: a summer study opportunity below at the UvA:

    Online activities quite often involve transfers of personal data between the European Union (EU) and the United States (US), for example when using online search, social networks and many mobile apps. Both regions are governed by different rules on the protection of informational privacy and personal data. The EU’s stance on data protection law made the headlines when its highest court ruled that individuals have a right to be forgotten vis-à-vis search engines and when it annulled the EU-US Safe Harbour scheme which backed the exchange of personal data between the two regions. The EU has strengthened its data protection legislation further with the adoption of a new regulation that aims to modernize individuals’ rights for the digital age. With such rapid developments happening we are excited to announce the opportunity to learn how these latest trends are shaping the legal landscape, on both sides of the Atlantic, in a one-week intensive summer course.

    Register now and join us in the fourth Summer Course on Privacy Law and Policy organised by the Institute for Information Law (IViR) at the University of Amsterdam (UvA). The course will take place m 4 to 8 July 2016, and will be hosted in De Rode Hoed, a historic Dutch building on one of the most beautiful canals in Amsterdam. The focus of the course is on privacy law and policy related to the internet, electronic communications, online and social media. It will explore the broader trends as well as the recent developments and explains how businesses, governments, and other stakeholders can achieve their goals within the changing legal framework. The interactive seminars will be led by distinguished European and US academics, regulators and pfroractitioners investigating the EU and US legal frameworks and how these regimes operate together. The aim is not only to provide practical information about the latest development, but also looks at the bigger picture to gain an insight into where this area of law may be headed

    .Foto De Rode Hoed

    For additional information, contact details and to register online visit http://ivir.nl/courses/plp.
    Hope to see you in Amsterdam this summer!

  • PRG News Roundup: February 10th

  • PRG News Roundup: February 3rd

    The discovery that the university is monitoring UC Berkeley network traffic has sparked outrage among faculty members who see such undisclosed surveillance as a significant threat to privacy.http://www.nytimes.com/2016/02/02/technology/at-uc-berkeley-a-new-digital-privacy-protest.htmlhttp://www.dailycal.org/2016/02/02/web-cyber-controversy/.

    A federal judge in the Western District of Washington determined that users have no expectation of privacy when using Tor, because Tor does not give its users complete anonymity–a user has to give their IP address to their Internet Service Provider to connect to the Tor network. http://motherboard.vice.com/read/confused-judge-says-you-have-no-expectation-of-privacy-when-using-tor-playpen-fbi-michaud. Full text of the opinion can be found here: https://assets.documentcloud.org/documents/2699886/140-Michaud-Order-Denying-Mtn-to-Suppress.pdf.

    Oral Roberts University now requires their students to wear tracking devices to monitor their fitness.http://www.newson6.com/story/30920656/wearing-fitness-trackers-now-mandatory-for-oru-freshman

  • PRG News Roundup: January 27th

    A group from Stanford showed that the MEMS gyroscopes found on modern smart phones are sufficiently sensitive to measure acoustic signals in the vicinity of the phone, making it possible to identify speaker information and even parse speech.

    https://crypto.stanford.edu/gyrophone/

    NBC attempted to glean Netflix’s viewership ratings with the help of tech firm Symphony, which measures TV viewing using audio content recognition technology—software loaded on to user’s phones that tracks viewership by capturing the soundtrack of the program.

    http://www.vox.com/2016/1/13/10764818/netflix-ratings

    The U.S. Senate is currently considering passing the Judicial Redress Act, which would allow citizens of European nations and other designated allies the ability to request corrections of inaccuracies in data held by a number of U.S. agencies, verify their data has not been improperly disclosed, and seek civil judicial recourse in certain circumstances.

    http://thehill.com/blogs/congress-blog/foreign-policy/258852-senate-should-pass-the-judicial-redress-act-now

    On December 15th, the Luxembourg Presidency of the Council of the European Union reached an informal agreement in trialogues with the European Parliament on the ‘Data Protection’ Package which will set out new European rules on privacy in the digital age.

    http://europa.eu/rapid/press-release_IP-15-6321_en.htm

    Asylum Seekers in Germany will receive an identification card that stores biometric information, medical history, and job skills, among other data.

    http://www.wsj.com/articles/germany-cabinet-approves-id-card-plan-for-migrants-1449663398

    Ideas for Presentations:

    • Year in Review of U.S. Security Bills
    • Discussion of the Net Neutrality Decision

     

  • PRG News Roundup: December 2nd

    The Electronic Frontier Foundation (EFF) filed a complaint with the Federal Trade Commission against Google alleging the company has been collecting and data mining children’s data and Internet searches on their Google-sponsored Chromebooks, despite signing a legally enforceable Student Privacy Pledge.

    Link: Google Deceptively Tracks Students’ Internet Browsing, EFF Says in FTC Complaint

    Mark Zuckerberg announced the birth of his daughter with the creation of a $45 billion dollar charity initiative in an open letter he posted on the social network earlier this week. The initiative has sparked criticisms from critics wary of the charity’s LLC status, which gives Zuckerberg and Chan more flexibility in how the money can be used.

    Link: Mark Zuckerberg Vows to Donate 99% of his Facebook Shares for Charity and Zuckerberg, Chan $45B Pledge is Not for Charity, but a Company

    Facebook authorities have agreed to meet with the Banglesh government to increase cyber security measures. In particular, the deal will focus on measures to stop violence against women occurring over, or because of information spread through the social network.

    Link: Facebook, Bangladesh to Meet for Cyber Security Deal

    Yahoo briefly experimented with blocking people using ad-blocking software. Users who tried to log in to their Yahoo mail were prompted to turn off their ad blocker. The experiment was abruptly discontinued following complaints.

    Link: Yahoo Mail Tried to Block Ad Blockers, and it Might Have Backfired

    Austrian privacy campaigner, Max Schrems, has filed complaints with the data protection agencies of Ireland, Germany and Belgium, demanding they stop Facebook from transferring data of EU citizens over to the United States.

    Link: Max Schrems Demands Facebook Stop EU to US Data Transfer Due to Snooping

    The Republic of Kazakhstan will require that all Internet users within the country install national security certificates, which could be used to track traffic going in and out of the country.

    Link: Kazakhstan Announces Plan to Spy on Encrypted Internet Traffic

    The NSA’s bulk surveillance expired as of midnight on November 30th. Under the new system, NSA analysts and law enforcement will be required to get a court order to gain access to phone records. All metadata that has been collected through the program will be preserved through February 29th.

    Link: NSA to Shut Down Bulk Phone Surveillance Program by Sunday

    New lending startups are looking at potential borrowers’ phone records to assess creditworthiness, using variables such the number of texts sent and received, miles traveled, or even how frequently they charge their phone, in lieu of absent credit histories.

    Link: Lending Startups Look at Borrowers’ Phone Usage to Asses Creditworthiness

    There was a congressional hearing on the new email privacy bill earlier this week.

    Link: Congress Wants to Protect Your Emails from Warrantless Searches

     

  • PRG News Roundup: November 18th

    In the wake of the attacks on Paris, debate in the United States has again looked determining the appropriate balance between privacy and security, especially with regard to encryption.

    Link: https://www.washingtonpost.com/news/the-fix/wp/2015/11/18/the-paris-attacks-have-shifted-the-momentum-in-the-privacy-surveillance-debate/.

    Similarly, European politicians have begun discussing the issue with regard to airline passenger data.

    Link: http://bits.blogs.nytimes.com/2015/11/18/europe-shaken-by-paris-attacks-weighs-security-with-privacy-rights/?_r=0

    New technology permits device cross- by including a unique sound in a TV commercial that a mobile application containing the SilverPush “audio beacon” recognizes. That app would typically be brand-specific. Once the sound is heard, the application knows what the user is watching.

    Link: http://www.forbes.com/sites/thomasbrewster/2015/11/16/silverpush-ultrasonic-tracking/

  • U.S. Gets Widespread Facial Recognition Technology

    This past week, Fortune reported that U.S. retailers were using facial recognition software to target shoplifters.[1] The technology works by scanning the face of customers entering a store and seeking to match the photograph with a group of previously identified individuals. According to the article, this previously identified group is created by the security personnel employed by the store.[2] This article raises several fascinating questions: (1) who owns an individual’s face; (2) what other databases can be compared to the facial scans; and (3) how accurate is the the scanning technology.

    Facebook and Google, among other online tech giants, have been using facial recognition software to “tag” individuals in photographs for several years now.[3] This allows these social media platforms to identify users is in a photograph to post on their profile. In addition, it allows the platform to gather information about friend groups to provide superior marketing information to its advertisers. The U.S. Department of Commerce created a working group to determine the answer of who owns the facial scan.[4] However, privacy groups dropped out of the working group after they were unable to get companies to agree to basic privacy controls. There is a question of whether taking continual photographs requires the consent of those photographed, which would likely render facial recognition software impractical.[5]

    While relatively new to the U.S., this technology has been used in Europe for years. For instance, a music festival in the U.K. adopted this technology to scan the faces of concertgoers.[6] The police claimed that the the system was to be used “to find organized criminals who prey on festivalgoers who are often victims of theft.”[7] This use of facial scanning shows the potential of the technology: software can incorporate broader databases into the facial database to catch individuals who may have a warrant out for failing to pay a parking ticket.

    A final question raised is the accuracy of the technology. One study found that the FBI’s database, which contains the most pictures but is also one of the least technologically advanced, can only provide the right person 80% of the time.[8] Facebook, on the other hand, claims that it’s algorithm depicts the same person 97.25% of the time which is almost equivalent to a human.[9] However, there are no good studies that currently depict the real time offline accuracy of facial recognition software.[10]

    Walmart’s experiment only lasted a couple of months after it found that it did not have a good return on investment.[11] In addition, many other companies appear reticent to use the technology. While Congress or the Department of Commerce can hopefully one day find a workable solution to these legal questions, many companies are already scared about the privacy backlash that may occur by adopting these scanners.

    [1] Jeff John Roberts, Walmart’s Use of Sci-fi Tech to Spot Shoplifters Raises Privacy Questions, Fortune (Nov. 9, 2015), http://fortune.com/2015/11/09/wal-mart-facial-recognition/.

    [2] Id.

    [3] Help Center: Tagging Photos, Facebook, https://www.facebook.com/help/122175507864081 (last visited Nov. 16, 2015).

    [4] Robinson Meyer, Who Owns Your Face, The Atlantic (Jul. 2, 2015), http://www.theatlantic.com/technology/archive/2015/07/how-good-facial-recognition-technology-government-regulation/397289/.

    [5] Id.

    [6] Paul Gallagher, Download Festival: Facial Recognition Technology Used at Event Could be Coming to Festivals Nationwide, Independent (London, U.K.) (Sept. 24, 2015), http://www.independent.co.uk/news/uk/crime/download-festival-facial-recognition-technology-used-at-event-could-be-coming-to-festivals-10316922.html.

    [7] Id.

    [8] Tim Cushing, The FBI’s Facial Recognition Database Combines Lo-Res Photos with Zero Civil Liberties Considerations, techdirt (Apr. 15, 2014), https://www.techdirt.com/articles/20140414/16045126909/fbis-facial-recognition-database-combines-lo-res-photos-with-zero-civil-liberties-considerations.shtml.

    [9] Meyer, supra note 4.

    [10] Id.

    [11] Roberts, supra note 1.