text
stringlengths 0
118
|
---|
vidual harm.
|
Courts sometimes struggle with recognizing a harm in the pro
|
cessing and dissemination of data by businesses. For example, in U.S.
|
West, Inc. v. Federal Communications Commission, a communications car
|
rier challenged privacy regulations for telephone customer informa
|
tion as a violation of free speech. The regulations required that the
|
companies first obtain the consent of their customers (before using
|
their personal information for new purposes beyond those for which
|
the data were collected. In order for the regulations to survive consti
|
tutional muster, they had to serve a substantial interest. T he court con
|
cluded that privacy did not rise to the level of a substantial interest:
|
[T]he government must show that the dissemination of the infor
|
mation desired to be kept private would inflict specific and signif
|
icant harm on individuals, such as undue embarrassment or ridi
|
cule, intimidation or harassment, or misappropriation of sensitive
|
personal information for the purposes of assuming another’s
|
identity.
|
The court further stated that a “general level of discomfort from
|
knowing that people can readily access information about us does not
|
necessarily rise to the level of a substantial state interest. . . for it is not
|
based on an identified harm.”27
|
T he U.S. West court focused too heavily on harm to particular indi
|
viduals and did not see the larger social harms. T he court was fixated
|
on finding a physical, financial, reputational, or psychological harm. It
|
did not see the power imbalance caused by the aggregation and sec
|
ondary uses of personal information by the telephone company. Aggre
|
gation, secondary use, and many other information-processing prob
|
lems affect the way that power is allocated between individuals and
|
large corporations. These problems affect the structure of our society
|
as a whole. T he problems are different from the disclosure of a secret,
|
the exposure of a nude body, or the pervasive surveillance of an indi
|
vidual. They are problems that go to the heart of what type of society
|
we are constructing as we move headlong into the information age.
|
182
|
P
|
r
|
i v a
|
c y : A N
|
e w U
|
n
|
d
|
e r
|
s t
|
a
|
n
|
d
|
i n
|
g
|
Information can be used to make important decisions about people’s
|
lives; it is often subjected to a bureaucratic process that lacks discipline
|
and control; and the individual has scant knowledge of how the infor
|
mation is processed and used.
|
The law frequently struggles with recognizing harms that do not re
|
sult in embarrassment, humiliation, or physical or psychological in
|
jury.28 For example, after the September 11 attacks, several airlines
|
gave their passenger records to federal agencies in direct violation of
|
their privacy policies. A group of passengers sued Northwest Airlines
|
for disclosing their personal information. One of their claims was that
|
Northwest Airlines breached its contract with the passengers. In Dyer
|
v. Northwest Airlines Corp., the court rejected the contract claim in part
|
because the passengers “failed to allege any contractual damages
|
arising out of the alleged breach.”29 A similar difficulty in recognizing
|
harm is illustrated by Smith v. Chase Manhattan Bank. A group of
|
people sued Chase Manhattan Bank for selling their personal informa
|
tion to third parties. The sale of the information violated Chase’s pri
|
vacy policy, which stated that the information would remain confiden
|
tial. The court held that even presuming these allegations were true,
|
the plaintiffs could not prove any actual injury: “[Tjhe ‘harm’ at the
|
heart of this purported class action, is that class members were merely
|
offered products and services which they were free to decline. This
|
does not qualify as actual harm. The complaint does not allege any
|
single instance where a named plaintiff or any class member suffered
|
any actual harm due to the receipt of an unwanted telephone solicita
|
tion or a piece of junk mail.”30
|
These cases illustrate a difficulty in the legal system in addressing
|
privacy problems. The actions of Northwest Airlines and Chase Man
|
hattan Bank constituted breaches of confidentiality. The harm involved
|
in a breach of confidentiality consists of more than emotional distress.
|
The harm is one that affects social structure because it involves the ex
|
tent to which promises of confidentiality can be trusted. If companies
|
can promise confidentiality but suffer no consequences in violating
|
their word, then promises of confidentiality become unreliable, and
|
trust between companies and their customers gradually erodes. The ef
|
fects often extend beyond the specific companies that break their
|
promises; unpunished breaches of confidentiality can erode trust in
|
promises of confidentiality more generally. Countless transactions
|
Privacy: A New Understanding
|
183
|
depend upon the viability of promises of confidentiality, and ensuring
|
that these promises remain dependable has a social value.
|
Secondary use is also implicated in Dyer because the data collected
|
for one purpose was then given to the government (for an entirely
|
different purpose. T h e secondary-use problem did not cause financial
|
injuries or even psychological ones. Instead, the harm was one of
|
power imbalance. Data was disseminated in a way that ignored airline
|
passengers’ interests in the data despite promises made in the privacy
|
policy. Even if the passengers were unaware of the policy, there is a so
|
cial value in ensuring that companies adhere to established limits on
|
the way they use personal information. Otherwise, any stated limits be
|
come meaningless, and companies have discretion to use data with few
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.