1.
Introduction ^
Unfortunately, there was to be no comprehensive law of Privacy or of Ownership of Personal Data in the United States – such as are now appearing in the EU and Commonwealth countries. Memory of the secret police states of the war years gradually faded and the fear of personal surveillance was never known by the generations of Americans that followed.
2.
«Interactivity» as Goal of the New Media ^
3.
Privacy, Personal Data, and Freedom of Speech ^
Concepts of «privacy», «personal data», and «freedom of speech» are, like the concept of «internet freedom» not «born free» of the society of law around them. All of them exist, to the extent they do exist, because of special protections evolved over time. What other country has ever taken as the opening words of its Constitution: «Human dignity is inviolable»1? But, the Germans did this only as the authors of their Basic Law recognized that the German state had only just emerged from the most violent abuses of human dignity in the history of civilization.
If in enthusiasm for new media we cast off whole sections of the common law that time, logic, and the public have designed and legislated for our protection, have we considered what we are putting in their place? Lobbyists for special interests have succeeded in, for example, making a cultural idol of the supposedly unique interactive qualities available on the internet. Ironically, we read in a special interest sponsored law, with the misnomer «The Communications Decency Act»2, that the normal limitations of good taste can be set aside for the sake of «interactive» communication on the internet:
- It is the policy of the United States – (1) to promote the continued development of the Internet and other interactive computer services and other interactive media; (2) to preserve the vibrant and competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State regulation3 (italics added).
«Unfettered by Federal or State regulation» was clearly not meant to require abandoning all restraint. Further on in the same section we read that a person who does act to protect the public interest «voluntarily», not with the force of law, is relieved of liability under this very law that removes federal and state regulation:
No provider or user of an interactive computer service shall be held liable on account of – (A) any action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected; or (B) any action taken to enable or make available to information content providers or others the technical means to restrict access to material described in paragraph (1).
There was no apparent motive for the highly damaging personal attack on an unrelated third party. Yet, AOL, the internet service provider carrying these defamatory postings ignored many requests to remove them regardless of the severity of attacks on the victim and his livelihood – regardless of death threats arising from the postings and the need for police protection around his home4.
Special interest legislation had made the ISP immune from liability, probably we can say because the American public relies on its elected representatives in Congress to deal with such matters, and often is blindly unaware, or deliberately misled, regarding the possible impact of such departures from the common law. Costs for the victim, damage to his livelihood and reputation, and threats on his life notwithstanding, the Court itself cited counsel for AOL that the ISP would not be liable,
... even if AOL knew of the defamatory nature of the material and made a decision not to remove it from the network based on a malicious desire to cause harm to the party defamed5.
Unless a new statute repeals, amends, or qualifies an older statute or rule, then both remain in effect. Congress created an exception, but did not repeal or amend the laws of defamatory publication or of malicious tort liability. The extent to which all these conflicting laws apply at the same time, and under what conditions, is, therefore, left to the Court to define. That principle was laid down in Marbury v. Madison (1803), the ancient case that defines the meaning of rule of law in America, and obliges the Courts to resolve differences in conflicts of laws. However, in this case, the U.S. Supreme Court also declined to resolve this dilemma6.
It is not just the legal absurdity of the final assertion by the Court of Appeals in this case that deserves our close attention. We should also be concerned that legislation drawn to serve special interests sometimes produces such arrogance – and, as apparently in the Zeran case, the Court just as arrogantly went along with it. [The reader may think that the Court is justified in blindly following the logic of the Communications Decency Act. The authors reject the notion that special interests can simply carve out exceptions in the law to suit themselves. If Congress insists on taking the risk that one statute nullifies another – leaving us with clear and serious gaps in the law of tort and defamation – let them say so.]
4.
Why Should Social Media and E-Commerce Require «Waiver» of Personal Data Law to Thrive? ^
The pitfalls of special interest e-commerce law are nowhere better illustrated than in the case Comb v. PayPal7. PayPal is an internet payments system that was created by a number of electronics geniuses, innovators, and entrepreneurs, that allows individuals to make payments through an electronic intermediary that draws payment from the bank accounts, and credit cards of its subscribers, or from separate cash accounts they open with PayPal. To outward appearances, PayPal is able to transfer funds securely without revealing those subscribers» bank account or credit card numbers (at least outside the trusted circle of the financial institutions). It is a popular and profitable system among financial institutions, each of which benefits from fees on transactions along the way. Yet, taking this case as an example, PayPal had neglected basic customer service. And the feudal legal relationships it imposes on its members through the 25 pages of its online «Terms and Conditions» take us back to the dark ages.
5.
Decisions We Follow – Decisions We Ignore ^
«Buyer Beware» in the Private Sector: The constitutional protections we enjoy in the criminal procedure areas apply against the police and government agencies. They do not ordinarily apply against private sector entities – unless, as is bound to occur when we «waive» our rights in what appears to be an ordinary «investigative consumer report», in which it turns out we are accused of something they will not disclose to us, by anonymous persons we cannot confront. [If Congress itself has no power to determine the «character» or «reputation» of every man, woman, and teenager in the United States – as U.S. «consumer reporting» law used in «credit reporting» and «recruitment screening» appears to allow, then Congress does not have the power to authorize any other entity to make a business out of it. Hopefully, one day this argument will be made before the U.S. Supreme Court.8]
6.
Who Does Our Personal Data Belong To? ^
The fact that Congress cannot make a law abridging «Freedom of speech» or «of expression» is sometimes, mistakenly, interpreted to mean that we can say anything we choose about whatever we choose. That is not true. As observed above, that ignores the specifically protected legal relationships of trust and confidentiality, prohibition of defamation, and protection against invasion of Privacy. Furthermore, as long ago as 1918, the U.S. Supreme Court held that «Freedom of Speech» would not permit «creating a clear and present danger»:
The most stringent protection of free speech would not protect a man falsely shouting fire in a theater and causing a panic.9
More recently, the Supreme Court appears to have lifted the level of presumed restriction from «clear and present danger» to «inciting to imminent lawless action»10.
Yet, that may be too hasty a conclusion. We cannot ignore the countervailing constitutional protections arising from the Fourth, the Fifth, and the Sixth Amendments, in criminal procedure matters referred to above, and the civil law legal protections against unlawful acquisition or use of «Personal Data»: in breach of trust or of confidentiality; against untruthful or defamatory allegations; and in Invasion of Privacy. This also ignores the importance of the pressure to create protected areas of «personal choice» as, for example, in recognition of a right to seek abortion prior to viability11 and freedom of access to knowledge of and means of birth control12.
Personal Data in the EU and the Commonwealth: The situation is somewhat more favorable to a firm concept of «Personal Data» in the Commonwealth countries and the European Union, today. There are equivalents in those countries for the American constitutional protections. Furthermore, assuming they can hold their own against the onslaught of internet globalization, the EU Data Protection Directive, 95/46/EC obliges all member states of the EU to enact laws for the protection of «Personal Data».
Member States shall protect the fundamental rights and freedoms of natural persons, and in particular their right to privacy with respect to the processing of personal data.... «[Personal data» shall mean any information relating to an identified or identifiable natural person («data subject»).13
The abuse of «Personal Data» dossiers in the dictatorships of the 20th century is still a live memory in Europe. In the words of Joachim Gauck, President of the German Federal Republic, who won the affection of the German people as an open dissenter in the days of the former communist regime in East Germany, and later as Commissioner for the captured Files of the Former East German Secret Police (the STASI):
The Ministry of State Security influenced career rise or fall, took advantage of human weaknesses, and did not hesitate to intrude into the private sphere of its victims and to utilize the most intimate information for its own purposes. Medical confidentiality, bank and postal secrecy, the inviolability of home life, even the basic rights of the citizen laid down in the Constitution of the German Democratic Republic did not pose a limit in the minds of these people.
7.
Fear of a Coming «Information Society» and Development of a «Code of Fair Information Practices» ^
A Future «Code of Fair Information Practices»: Fears of manipulation in a future «Information Society» had a slight upper hand in policy-makers thinking in the 1960s and 70s. In 1973 the U.S. Department of Health Education and Welfare (HEW) published a report recommending that Congress adopt a «Code of Fair Information Practices». That proposal became a model for legislation both in the United States and in all liberal democratic jurisdictions today. It called for data protection on the following principles:
- The government must not maintain a personal data system, the very existence of which is secret;
- An individual must have access to any information maintained on him or her and be able to learn how it is to be used;
- Information collected for one purpose must not be used for another without the consent of the individual concerned;
- It must be possible to correct or amend an inaccurate file;
- Any agency creating, maintaining, or using personal data files must ensure the accuracy of such files, and their use only for the intended purposes, along with measures to prevent their misuse.14
8.1.
The Short Life of the «Consumer Protection Movement» ^
Implementing the «Code of Fair Information Practices»: Enough of the chief elements of the proposed «Code of Fair Information Practices» was enacted even in the United States, that those of us alert to the importance of Fair Information Practices, and willing to defend their rights, could have resisted the onrush of abuses in this area. The Privacy Act of 1974 attempted to implement the proposed «Code» in limited, but important ways that, in their avoidance, establish the pattern of abuse of «Personal Data» files in the United States. The most significant first measure was to attempt to keep information collected for one purpose from biasing other relationships with Government:
No agency [of the federal Government] shall disclose any record which is contained in a system of records... to another agency except pursuant to... prior written [request or] consent of the individual to whom the record pertains, unless disclosure of the record would be... for a routine use as defined.15
The information technology industry arising at that time also saw the existence of agency personal data files available for consolidation as a business opportunity, whether for government or private sector purposes. Accordingly, wherever we deal with the personal data collection industry we are obliged to waive rights arising under the Privacy Act.
Submitting Our Own Personal Information vs. Third Party Collection: There is no honest «Personal Data», that, if properly authenticated, cannot be given to or come from the data subject him or herself (even allowing for the exception that some very limited personal medical information could cause undue distress). This principle was accordingly adopted in the Privacy Act of 1974 governing «Personal Data» in U.S. Government files:
Each agency... shall... collect information to the greatest extent practicable directly from the subject individual...16.
And what have we lost by that? The geniuses in our schools and universities are not likely to suffer whatever they do. However, after 12 or 16 years of schooling and higher education, those of us who are not so distinguished also have a right to know how our schools and universities assess, and substantiate their assessment of what we have accomplished or what we have not achieved but could have. There is no such thing as a right to squelch your students or graduates in silence.
The First Amendment gives former employers (or their personnel offices) the right to say what they please about a person, so long as it is in fact «truthful», «in good faith», and «not malicious». This should never lead to the conclusion that one cannot report substantiated wrongdoing. But it may also be illegal merely to attempt to prevent a person’s legitimate opportunity of future employment.
9.
From «Collecting and Transmitting Credit Information», To Assessing «Attitude, Motivation, and Behaviour» ^
Members of the «Consumer Protection Movement» were surely also aware of the dangers of profiling and maintaining dossiers on less favored members of society in the dictatorships of the early part of the century. Yet, they appear to have made a deal in inching toward regulation of «credit reporting» practices, whereby the industry managed to get «credit» based measurement of «character» and «reputation» into the preamble of the FCRA:
An elaborate mechanism has been developed for investigating and evaluating the credit worthiness, credit standing, credit capacity, character, and general reputation of consumers17 (Italics added.)
There is far more in the FCRA than the preamble, however. And the courts are able to find ample evidence of legislative intent that «credit reporting» should be «fair and equitable to the consumer». See, for example:
The FCRA was enacted in order to ensure that consumer reporting agencies adopt reasonable procedures for meeting the needs of commerce for consumer credit, personnel, insurance and other information in a manner which is fair and equitable to the consumer, with regard to the confidentiality, accuracy, relevancy, and proper utilization of such information18 (Italics added).
The «credit bureaus», as they were then known («Consumer Reporting Agencies» or CRAs in the current law) were already promoting their «credit reports» as measures of suitability for employment in the early days. That desire for automatic selection scoring criteria is even more widespread today among those HR persons who have difficulty in assessing qualitative achievement. The HR Handbook of Norfolk State University in Virginia is a classic example in the prominence it gives «credit reports» in the hiring process:
... The decision to offer employment will be based on the following review of the individual’s credit check: (1.) That an individual is current with paying their financial obligations. (2.) Bankruptcies in one’s credit background cannot be used to determine eligibility for employment as per the FCRA. [It is also prohibited by U.S. bankruptcy law.] (3.) The number of overdue obligations will be reviewed. (4.) Extenuating circumstances as put forth by the applicant, for the delinquency in paying obligations will be taken into account. If the results of the credit check are negative, the University must inform the applicant that it plans on taking adverse action....
Clearly many in Congress, apparently with little resistance from the public, had been persuaded of the importance of «credit reporting» as the basis of character judgment. It was 30-some years since the Great Depression. Memory was not very good, especially in good economic times. «Credit reporting» was treated as factual reporting. The FCRA provided the mechanism for seeking correction of errors. So there was little resistance to the CRAs judging character on the basis of «credit reporting»:
[N]o consumer may bring any action or proceeding in the nature of defamation, invasion of privacy, or negligence with respect to the reporting of information against any consumer reporting agency, any user or information, or person who furnishes information to a consumer reporting agency, based on information disclosed...19.
The FCRA requires that an employer that demands an «Investigative Consumer Report» provide «clear and conspicuous» notice on a separate sheet from its application form detailing the nature of such an investigation and obtain a signed consent. While you can, of course, refuse to consent, in the world of take-it-or-leave-it online applications, you have no real choice. Non-employment related requests do not require the detailed notice and consent, but essentially leave less choice:
[T]his report will include character, general reputation, personal characteristics, mode of living, work habits, performance, experience, along with reasons for termination of past employment... obtained through personal interviews with associates who have knowledge concerning such items of information20.
Yes, the IT and computers that process the work are more efficient than they used to be. But we hear that those that do the research and the interviews, are: «part-time truck drivers, retired persons, homemakers, and small business people»21 who hire on for spare-time work doing telephone interviews of your «friends, neighbors, and associates». Maybe these part-time interviewers are all good citizens who need to add to their incomes. Perhaps you would have confidence in them to sit as a jury of your peers if you were trying a case where they had to apply common sense and practical experience to judge guilt or innocence in a traffic accident. But, if it were up to you, wouldn’t you choose a more qualified panel to do profile interviews on your «character, reputation, and mode of living» – where you know that they also have to balance positive and negative attributes to satisfy their agency managers?
Placement and «Psycho-Analytics»: Suppose you do consent to an «Investigative Consumer Report». Suppose you do waive FERPA and consent to release of your school and university files. Suppose those perfectly respectable part-timers do interview your «friends, neighbors, and associates». Do you think that the billion-dollar companies behind those operations are merely going to send your graduate admissions office or your prospective employer the same thing that you would expect from your college mentor or senior professional supervisor? Look closely and you will find that that is not even what they are looking for:
People rarely succeed or fail due to lack of skills or intelligence. Instead their success or failure is due to personal characteristics such as attitude, motivation, and temperament (behavior).... InfoLink has partnered with a company which provides the best product on the market to analyze the behavioral requirements for any position. This program enables you and your associates to quickly reach consensus on the real demands of the job. (A «Recruitment Screening» CRA on itself)
«Legitimate Business Interest» – the Right to Spy On People: Under the FCRA, those who have a «legitimate business interest» are also able to seek what amounts to pure gossip and hearsay about us. Many distinguished colleges and universities, many large employers, and a host of purely commercial entities, now ask for a «consumer report», or a more comprehensive – though more questionable – «investigative consumer report», for admissions, hiring, new account opening, etc. By law, employers must inform you – employers must also provide this information on a separate sheet from the rest of the application and obtain your signature confirming that you have understood the request. The FCRA is not as scrupulous with regard to others. And there is nothing to deter a CRA once it has collected your personal data from re-selling it to anyone who declares «a legitimate business interest». These files are not just for one particular transaction. Once we sign, we have also «waived» our «right against double jeopardy». The background file can be sold over and over again.
Typically a U.K. HR webpage will read, as for example the webpages of a certain North of England university:
Irrespective of where the data may be [in our system], we will abide by the U.K. Data Protection Act.
That should mean that their data security is as good as it gets. However, the same paragraph adds tangentially:
Your information may be controlled and processed by any of our offices. You acknowledge and agree that the location of our offices may change from time to time and that we may acquire other offices in any number of other countries or territories at any time, any one or more of which may act as a controller of and/or process your information.
It is amazing how many U.K. universities now claim such overseas locations. But, the line continues:
We will not disclose your data to any other third party unless for recruitment purposes... (italics added).
Then, we do come closer to sensible meaning below: a third party may be involved for «recruitment purposes»? In plain English that sounds like outsourcing to a «recruitment screening agency» most of which are American institutions that store data files in the United States, where there is as good as no personal data protection law, and where personal data «assessed» or «evaluated» for one client falls, for that purpose, under the copyright of that agency, and can easily be re-sold to another client. Not every employer, financial institution, or what have you, in the United States will confirm this, but one that does tells us that if a consumer report is obtained,
The consumer reporting agency may keep a copy of the report and disclose it to others having a legitimate need for such information22.
10.
Conclusion – Technology and Shady English ^
This paper was prepared for discussion at the «Symposium on Social Media, Big Data and Cloud: Trends and Issues in Asia,» HKUST-Nie Social Media Lab, Hong Kong, 3 October, 2013, http://smedia.ust.hk/events/bigdata. The authors are grateful to Rafael Chodos and Wild Chang, attorneys in Los Angeles, for reviewing the drafts.
Orlan Lee, M.A., Dr..Jur., JurisDr., LL.M., is a Visiting Fellow/Life Member of Clare Hall, a College for Advanced Study in the University of Cambridge. He has been variously Associate Professor of East Asian Studies at Washington University, St. Louis; Adjunct Professor of Business and Management at the Hong Kong University of Science & Technology; and Professor of Management at the New York Institute of Technology. His recent book, Waiving Our Rights, is concerned with mandatory waiver of our fundamental rights in what should be ordinary business transactions.
James She, M.Sc., Ph.D., is Assistant Professor of Electronic and Computer Engineering at the Hong Kong University of Science & Technology, and Research Fellow in the Computer Lab, at the University of Cambridge. He is Founding Director of Asia’s first social media lab, HKUST-Nie Social Media Lab, where he spearheads multidisciplinary research and innovation in cyber-physical social media systems, viral media analytics, and mobile media broadcast H systems. He is a member of the World Economic Forum’s Global Agenda Council (Social Media).
- 1 Art. 1.1 of the Basic Law of the German Federal Republic of 1949.
- 2 Sec. 230 of The Telecommunications Act of 1996.
- 3 47 United States Code [USC] §230.
- 4 See, Zeran v. America Online, 129 F.3d 327 [4th Cir. 1997].
- 5 Cited by Zeran in an address at the 15th Anniversary Conference of 47 Section 230 U.S.C. held on March 4, 2011.
- 6 Zeran v. AOL, cert. denied, 524 U.S. 937 [1998].
- 7 218 F.Supp. 2d 1165 [2002], a class action.
- 8 See, O. Lee, Waiving Our Rights. Lanham, MD: Lexington Books, 2012.
- 9 Mr. Justice Holmes in Schenck v. United States, 1918.
- 10 In Brandenburg v. Ohio, 1969.
- 11 Roe v. Wade, 1973.
- 12 Griswold v. Connecticut, 1965.
- 13 EU Data Protection Directive, 95/46/EC: Art. 1 (2); Art. 2 (a).
- 14 HEW, Records, Computers, and the Rights of Citizens, MIT, 1973.
- 15 Privacy Act, 5 USC §552a.
- 16 Privacy Act, 5 USC §552a (e)(2).
- 17 FCRA, 15 USC 1681a (2).
- 18 Cushman v. Trans Union Credit [3rd Cir. 1997], with many similar citations.
- 19 FCRA, 15 USC §1681h(e).
- 20 Colgate University, «Notification and Authorization to Obtain Information».
- 21 Federal Trade Commission staff opinion letter, «the LeBlanc letter», June 9, 1998.
- 22 RiverSource Insurers of Ameriprise Financial.