Document 11070378

advertisement
LIBRARY
OF THE
MASSACHUSETTS INSTITUTE
OF TECHNOLOGY
JAM 13 1972
J-ZBRARIES
PRIVACY, TECHNOLOGY, AND
THE AMERICAN CITIZEN
Stephen J. Williams'^
Richard Owens
Edouard Cointreau
Peter Bloomsburgh
563-71
October
MASSACHUSE'
INSTITUTE OF TECHNOLOGY
50
MEMORIAL DRIVE
MASS. INST. TECH.
OCT 21 1971
OtWEY LIBRARY
PRIVACY, TECHNOLOGY, AND
THE AMERICAN CITIZEN
Stephen J. Williams
Richard Owens
Edouard Cointreau
Peter Bloomsburgh
563-71
October
PRIVACY, TECHNOLOGY,
AND THE AMERICAN ClTlZl
by
Stephen J, Williams
Richard Owens
Edouard Cointreau
Peter Bloomsburgh
01971
6331^7
Privacy* Technology,
and the American Citizen
1
*
IfilEoaUiiHOii
The
right
privacy
to
has
been
issue
an
b£
considerable proirinence in recent months as the congress and
the
American public have inc^reasingly questioned the extent
and nature of the constitutional and moral ramifications
This
privacy,
technological
presents an examination of privacy
article
particular
with
of
emphasis
the
on
advancement.
imolications
of
framevor^ is deveiooed within
A
Which managerial decisions related to questions
of
privacy
can be examined.
An
privacy
investigation
initial
presented
is
which
of
the
distinguishes
definition of
between
the
individual's need for privacy and the society's requirements
for infringing upon
determinants
of
need.
that
privacy
Next,
the
examines,
are
technblbcical
including
the
utilization of advanced electronic equipment (esoeciallv the
computer)
and
to
problems
collect
inherent
information.
in
The
unique orooerties
multiple^access
time-sharino
systems are considered,'
All
of
framevorlt for the
these
analysis
issues
of
are
specific
integrated
into
databanks.
a
This
fraPievork may be applied to databanks currently in existence
and to those which may be proposed at some future time.
The
Paae
DRAFT
are intended as an aid in determining
presented
guideiines
3
the suitability of such databanks.
Finally,
problems
the
to
are examined, followed by suoaestions
privacy
of
solutions
proposed
number of
a
for further thouaht,
2
£EIIA£i:
iii£ £R2Bii;ii
everyone.
cohcerns
Privacy
Americans would aSree that no
Although
should take
'one
most
challenoe to
a
his privacy lightly, few carefully consider the iiriDlications
of
applying
for
credit card or
a
transfer of information
aff«cted,
whether
it
a
bank loan.
privacy
occurs,
privacy
of
ve must act as
a
natioh to forge
a
accepted
definition
in
least one excellent definition (in the
been
that of our
organization,
an
clear national oolicy".
Privacy is not easily defined.
widely
way
with our individual considerations of privacv,
concorrently
no
some
in
is
be our personal privacy,
friends or neighbors, or the
Any tinie a
presented.
In
legal
In fact,
Is
use today, although at
iboical
terminology,
definition remains to be established.
there
a
sense)
has
satisfactory
(See also (2))
2,1 fififinitica af Piiiaci
The most important dimensions of
seen
through
an
individuals who have
Goldberg,
former
orivacy
can
be
examination of statements made by various
Vrestled
Associate
with
Justice
the
bf
problem.
Arthur
the United States
Supreme Court has put forth the following observation:
^«*^^
Pace
.
"The
dvindling
of
Privacy
has
been
U
as
vorld, ve have only belatedly realized
that privacy
Is
^''^^''^ ^°^^^^ resource, and one vhich
mLf'^Ko''!?^}?^^!,
protected against the claims of
eflLJent social
I-if"^^'orderino."
efficient
(16)
Congressman
Cornelius
Gallaoher. speaking before
the American Management Association, has defined
Privacy as:
''•••*'^®
free
choice by a free man
Tn
disclosing to public recard certain basic
^acts aboj?
nis actions, thoughts, and decisions, "{ l2)
He goes on to say:
^"^!5 lav...the cornerstone of a
free Am^rir^^^^^^
America. ..demands
that the past be
a
sorinQboard
ffP^^ssion and use bf abiUtv and not an
*nrhor^ J^v
"''^'^
*^°^"'
^"^
^"""s him In
vouthf,n i^\''v^^^ *
^^^^^ decisions.-(l2i
(S%'rfj^o"tll:(10.)?Mi?:in?r^'
These
attempts
at
definitions
are,
hovever,
incomplete.
The mbst comprehensive definition of
orivacv is
offered
Professor
by
Alan F. Westin (See also (20).(21))J
it highlights the privacy decision
individual
in
trading
as
the
choice
of
the
off his desire to be an IndLxldual.
and his desire tb participate in society:
"'^^
^'^^"^
sSeiiiLr°^ ^^^^
.s"^!^""
^^^'^y
society
fnfo^^i
r^ social norms.
enforce its
"(19)
2.2
Zhs. IiidiiiiiiiaijLfi iifivfiflini
^'^^
sets
processes
in
order
«.
to
Paae
PRAFX
from
Several facets of privacy are important
viewpoint.
individual's
5
the
his book, £rivacx and Eceedoia
In
(19)# Professor v;estin has identified four primary functions
which privacy perforins.
Individuals
A,
to
intrinsicly
Privacy provides the capability
autonomy.
control
the
aspects
some
direct
individuals
of information that relates to their
flow
personal lives, and# by so doi^ig, provides
to
personal
seeX
for
of
a
means for
their existence".
then
Indeed, the
history of literature is marked by references to cbntrbllina
fate.
one's
this
an
In
function
of
ever more complex and active societv.
privacy
assumes
increasing
ever
an
Importance.
protects
Privacy
B,
consequences resulting from
frustration.
Through
the
people
expression
from
of
damper
that
a
Of course, when the
cause.
infringe
anoer
and
this function, then, individuals are
afforded the opportunity for emotional release
continuous
undue
record
actions
without
the
their actions wbuid
bf
emotional
of
release
upon the rights of others, response by the sbciety
is Justified,
Privacy provides for
C,
introspection.
Individuals
must
be
allowed
their own performance for the purpose of
desires
and
actibns.
shoulder.
and
to evaluate
determining
their
Privacy allows this self-supervisibn
vithou.t the constant feeling that someone
your
evaluation
self
is
iboicino
over
Again, this function is not absolute -^ the
"^RA"
Pace
6
evaluation of an employee by his supervisor, for example, is
legitimate.
Privacy
D,
allows
for
privileged transfer of information,
individual
is
granted
the
the
protected
and
within this context, an
opportunity
discuss
to
a
supervisor with anbther employee without fear of dismissal'.
But the need for privacy
logical
considerations.
gbes
even
bevond
sUch
The work of manv anthropologists,
sociologists, and biologists indicates strbnalv that privacy
is
a
iifllijaicai
necessity
for
human
beings.
9estin has discussed , studies of animal behavior
that
for
men
and
seeking
Professor
which
show
animals may very well share basic mechanisms
privacy
Extrapolating
within
their
environments.
f19)
from the great importance ascribed to privacy
in the animal world, ohe must assume that Privacy is an even
more
significant
species,
determinant
Perhaps the inherent
of
behavior
desire
in
in
each
the
human
bf
us
occasionally seek solitude is an illustratibn of this
to
need'.
2,3 £fin£ii£ls £i Izii&Qi
However,
consideration
an individual by individual basis
consideration
privacy,
concerned
Host,
is
ignores
of the Privacy prbblem on
is
if not all,
of the data with
the
such
which
we
are
the joiht property of at least twb parties --
the person who originated the information,
fthom
sufficien;
not
the problems created by conflicts bf
data concerhs.
In many cases,
of these two parties conflict,
and
the
persbn
the Privacy riahts
consider the case bf medlcil
Paae
BRAFX
Included
records,
records are many Impressions
these
ih
7
himself in his future work
that the doctor might note to aid
might be very impbrtant
With the patient. For example, it
of
indications
shbved
patient
a
that
record
to
to
The physician would not want the patient
schizophrenia.
opinion
be aware that this
recbrded
was
medical
the
in
eiaminatibn
Thus, tb release the medical recbrd fbr
record.
with the physician's right
by the patient vbuld conflict
to
professional privacy.
The
formulation of
a
legal definitibn of privacv.
difficult
either by statute or precedent, is as
the
development
of
a
semantic
a
Within the
definition.
context of our democratic institutions, certain
specifically
was
privacy
a
in
the
However,
that
document
problem then than it is now.
Althiuah
number of Constitutional bases for the
exist
are
rights
cbnstitutibn.
mentioned
explicitly
not
because it was less
a
the
by
guarenteed
oroblem as
Fourth,
First.
in
riaht
Fifth,
and
tb
privacy
Fourteenth
varied frbm
Amendments, the interpretation by the cburts has
case
to
case.
However, guidelines have been developed by
the courts along which the
issues
can be evaluated.
(
legal
14)
implicatibns
of
One of the mbst impbrtant and
far-reaching of these is the concept bf the chilling
that
invasions of privacy
privacy
effect
tend to imPbse uoon the exercise
of civil liberties.
The chilling effect, as defined by the cburts.
is
Paoe
DRAFT
of individuals to viev invasions of privacy*
tendency
the
especi^ily surveillance activities, as
exercise
free
of
speech
or
protected by the Constitution,
other
a
threat
activities explicitly
invasions
such
their
to
privacy
of
It is the indirect effects of these
assume many forms'.
jnay
8
Invasions that the courts have viewed as unconstitutional.
ouidlines
The courts have developed three Priinarv
vhich
by
a
ruled
be
These guidelines are:
The, severity
A«
may
effect
chilling
given
unconstitutional (3).
scope
and
of
alleged
the
chiJtling effect bn the exercise of First Amendment freedoms.
The difficulty
proving
chilling
the
effect
guidline is indicated by the case of the United
this
under
of
tUblic Workers vs« Mitchell;
of
".•.the
threat
Bossiblfi
flfinsLal
interference with those appellants' rights by the Civil
Service commission under its... rules dbes not make a
justiciable case or controversy,
a hypothetical threat
ts not enough," (3)
Logically, of course, the chillina effect
dependent
an
upon aCliiai
individual
is
infringement of civil liberties,
perceives
a
threat
cf
activities are chilled whether or not such
inf rinqement.
a
not
if
his
threat actually
exists.
B,
vindicate,
The
liKlihood
rights as may be infringed upon.
cases
vhich
of
bpoortunities
to
with reasonable promptness* such First Amendment
involve
reasonable
The cburts seek only those
elaPsed
violation of rights occurred, and seem to
times
imply
since the
that
they
Paoe
CRAFT
establish
to
yant
statute
a
limitations
of
9
for
such
a
full
violations.
•
the
The nature of
C,
adjudication
of
which
issues,
merits must resolven ana the need for
the
factual referents in order to properly define and narrow the
There
issues.
between
exist
must
factual relationship
clear
a
violation
alleged
the
privacy
of
and
the
corresponding First Amendment right.
It should be clear from this brief discussion that
these
guidelines
Individual's
stringent
place
constraints
on
an
to legally proye invasion of privacv.
ability
In paragraphs beiow, we will show that advancing
technoibay
Is severly compounding these difficulties,
2.5
ihs.
sji£i£iiis yisjiEflint
desires
society
members,
definition emphasizes the fact that
Westin's
Dr.
Such
enforce
to
enforcement
individual
uoon
norms
its
is,
inherent in the
of course,
definition of "s^cietyT; very few People would question
necessity
enforcement
such
of
to
the
existence
the
of
civilization.
In order to enforce norms,
variety
of
institutions
monitor" their behavior.
places
constraints
cannot choose^ for
which
cumulative
Thus
establishes
society
social
pressure
on each citizen's privacy decision.
example,
to
a
watch over individuals and
drive
cars
at
We
excessive
speeds, or to burn dowh our neighbor's house.
In
the
absense
of
explicit
leaal and semantic
-
Peoe
0RAFT
definitions of Privacy, however, the institutions
enforcement
iO
norm
for
not themselves sufficientiv constrained In
are
institutions may therefore exceed the bounds
their actions,
of reason quite bY accident in their zeal to carry out their
assigned tasks.
Numerous examples of
excess
such
may
he
found in the press.
The seriousness of these excesses is cbmoounded by
the public's lack of sophistication in
implications
actions
people
many
decision:
are
information
for
obtaining
have,
a
completely
credit
information to
a
a
privacy
the
unaware
dissemination
represents consent to release quite
personal
making
card,
for
the
of
their
that
examole,
considerable amount of
system whose control of access Is
Such information as salary, bank balances,
relatively poor.
and marital status become available fbr distribution.
3,
IHIOgM^TlON COLlECTXON;
TliS
B££J0]JS
All of this is not to say, of course,
has no right to
Civilization
collect
information
about
that society
its
members.
could not exist without such collection.
has been lacking is
a
What
framework within which to discuss
ithX
data xs collected,
There
are
three
main
forces which drive men to
collect, analyse, and disseminate information.
1)
to
These
facilitate the management function of society;
help resolve conflicts of individual's
ricrhts;
disseminate informatioh for its own sake.
privacy can be traced to the fact that
a
and
areS
2)
3)
to
to
Most invasions of
Particular
system
Pace
DeaFT
11
is collecting data for more than one of these reasons, or is
distributlno
collecting data relevaht to one reason and
it
for another,
3.1
liiSi
n&Qa2£in£ni £iilicli&n
Perhaps
most
the
2a£i£ty
q.1
suceptible
abuse
to
the
is
collection of data to facilitate the management function
society,
order
in
maintain
to
tremendous coordinating
continuing
basis,
effort
must
example,
For
earning
hours of
his
rate,
undertaken
be
information,
wor'c,
be
known.
difficult
is
It
a
includino
his social security
number, his home address, and the number of
must
on
a
to distribute
order
in
paychecXs to employees considerable
his
of
cbmplei civilization,
a
his
Quarrel
tb
deductions
with
the
necessity for keeping this information.
The most
collection
common
over-eXtension.
is
collection
—
the third
force
for
collection.
systems, if left alone, will often collect
data far beyond their true needs and collection will
a
goal
The
of information has a very Powerful driving force
inherent within itself
Data
abuse
in
itself
rather
than
a
become
means tb a specific end.
Questions such as "Taking things all together* would you say
you
are
flays?",
very
happy,
pretty happy, or not too happy these
when asked of senior citizens by the
Census
Bureau
16), are clear examples of over-extension,
3.2 £finili£l£
Qi.
Indiildii&l £iabt&
The second driving force for data collection is to
set up systems fbr resolving
conflicts
in
the
rights
of
DRAFT
Paae 12
individual members of the society.
For examole, it is clear
that driver's licenses are necessary
inconipetent,
danflerous,
order
in
prevent
to
reckless persons from abusino
and
other people's rights to use our roads with some measure
safety.
Another
of
good example is the FBI fingerprint file,
whicn is tremendously helpful in preventino the
destruction
of life and property by criminal elements.
Perhaps
most common abuse of such systems is
the
dependence on the relative political
whose
rights
are
conflict
in
constructed carefully to
being
right,
avoid
the
of
svstems
such
#
the
cohstruct such
to
Power
Possibility
orouos
must
be
mloht.
of
system clearlv requires
a
that the agent maKing the final judgement not be Subject
to
political pressure,
3,3 aissfimiaAtifin icr inl£EiDa.i.ifials v^lue
The
reason
major
last
fbr
collection
the
information is the inherent value of infornatibn in its
right,
The
common expression "Xnowledqe is power" retains
its validity
climate
of
own
in
the
fast
of our society.
paced
and
hiohly
pblitlclred
Perhaps the best example of such
a
system is education!
In systems which are
dissemination,
care
inappropriately
should
not
open
must
for
the
Purpose
of
be taKen that information is not
disseminated.
its
built
For
example,
the
library
files of user's bbrrbwino records to
examination by the general public.
It is
especially
important
that
systems
which
DRAFT
logically
Paae 13
exist
for
one
of the first two purposes not be
allowed to disseminate information for its own value.
dissemination
is almost always inappropriate.
probation records are maintained in
order
to
such
For examole.
resolve
the
conflict between an inSividual's right to be given
a
sentence and society's fight to be protected from
dangerous
lighter
To release such records tb prospective emplovers
criminals.
(for either money or political favors)
is
an
illegitimate
invasion of privacy,
We
are
now
in
a
position to delineate the most
important aspects of the privacy decision
On
(see
Figure
^^,
the one hand, there are society's needs for information,
and on the other,
privacy,
The
there
data
are
the
individual's
collection. decision must be
between these sets of heeds.
needs
a
for
tradeoff
<
'"*-.
'^fa-
.
'
'^^S
r Gu
I
,._
<2.e
X
5cC.AW Co-^^
•
-
OSAFX
tt
Paoe 15
.
01 CAIA QQlliZgllQii
MlliiOiiS
-
individuals
The neans by which information on
numerous
are
coliected
and
varied;
Is
they rancre front very
unsophisticated to highly technical methods.
The most obvious means to obtain information
is simply to asK them questions,
people
questions
few people refuse to answer
sexual
income,
from
SurPrisinglVi very
topics
such
on
political and religious beliefs,
behavior,
and educational background, if only the questions appear
"legitimate"
gome
surveys, and the
People
question
are
villino
equally
to
the drinkinq habits and marital
about
behavior of their neighbors.
fc)eople
in
form (i.e. questionnaires, voter opinion
like).
information
divUl9e
as
is
It
that
clear
too
few
validity or necessity of reauests for
the
Simple questioning without cbersion or pretext
information.
is the major means by Which invasion of Privacy occurs.
A
second, and less direct, technique for obtaininq
oublic
Information is tb search readily available
town
as
such
newspapers,
books,
organizations,
purchased;
had
a
"
and
unofficial
sometimes
reports
of
information
this
the internal Revenue Service, for
policy
sources,
and published information includino
records
various
must
be
example,
has
of selling to anyone lists of all persons In
the u»s, who own registered firearms.
The third
physical
method
of
information
and psychological surveillance.
use of aianpbwer
and,
at
times,
collection
Is
This involves the
electronic
equipment
to
Pace 16
DRAFT
monitor
person's activities.
a
Course,
Of
flow
the
information
of
may
ao
considerably beyond the person to whom it is first released.
When
existing
future databan)ts become interconnected,
and
one of the most important sources
information
of
will
be
other databanks,
5
ZZllLgl 1^2
\
IScJilJaifiGX
development
Technological
important ramifications for privacy;
science
problems.
developments
Perhaps two
the raoid
carries with it
technology
and
increaslnai'y
has
advance
of
hornet's nest of
a
most
have
striltinoiy
the conflict between privacy and technolbov in
demonstrated
the United states -- sophisticated electronic communications
equipment and the high-speed digital computer.
5
. 1
£fiIIliillial£&lli2DS £aui£]i}£iii
communications
Electronic
brimming
challenge
capability
massive scale
espionage
in
implications
with
bugging
electronic
for
haS
been
the
U,e.
equipment
for
Moreover,
196/
study
concludes
performed
in
that
by
the
anti-bugging
industrial
The
a
industrial
at least as big a business as
is
government domestic intelligence operations.
specializes
Privacy.
a
surveillance on
and
developed.
presents
cbrooratlbn,
Saber
which
conservatively
devices,
espionage
For example, a
accounts
for annual
losses of more than three billion dollars. (1)
At least as
surveillance
important
devices
is
as
the
the
proliferation
proliferation
of
of
om
-«
DRAFT
Our
teiecom.nunicatlons equiment.
couhtry
the
around
data
pace 17
.
abilUv
propagate violations of privacy far
aware
becomes
anyone
the
of
nationwide integration of some
tremendous
present
privacy
enables
speed
high
at
re-distrlbuto
to
and
problem.
to
before
Current plans for
networks
telecommunications
problems
us
lono
vide
which no one has yet
addressed.
5,2
tiks.
camEiiist ani Etivaci
But buaging devices only facilitate the collection
The most powerful device vet developed for the
of rav data.
accumulation and processing of that data
However,
is
computer itself is not an invader
the
^computer.
the
-
privacvJ
of*
for man's ability to process
it is only an aitiplifyihg device
of
It becomes a major factor in the Problem by virtue
data.
the magnitude of that amplification,
consider, for example, the IBM Svstera 360/195,
It
million
is capable of performing on the order of twenty-five
calculations per second.
mass
storage
(an argon-laser devicel stbres 645,000,000 bits
Thus
inch.
contain about
such
one U800 foot reel of computer tape couid
twenty
double-spaced
a
on
system would be less than four minutes.
The
protection
advent
paaes
typewritten
File retrieval time for
person in the United States,
every
the
unit marketed by Precision Instrument company
of Palo Alto
j>er
In terms of storaae capacity,
of
has
greatest
come
progress
about
multiple-access
in
rather
time
computerized
privacy
indirectly through the
sharing
systems.
The
Pace 18
DRAFT
effort for these systems requires protection of
development
access
one user's information from accidental or Purposeful
by
other
users.
Considerable
effort
on
access control
systems which permit controlled sharing of resources in
multiple-access environment has been undertaken by
of
research
projects
such
(U),(7),(8)
M.i.T.'s
as
variety
&
Project
MAC.
.
\
Partial
protection
Provided
is
sharing systems by the requirement that
himself
terminal.
the
at
Schemes
passwords to signature recognition
implemented.
the
many
in
time
identify
user
from
ranaing
simple
proposed
been
have
transmission
over
data
lines
to
oattern
bit
a
transmission,
the
A
which the user's Password is the
on
a
string
of
is
different
at
answer
random
every
and
more effective scheme, in
t©
Computation
a
digits supplied by the
computer, is now in use at Project MAC.
password
for
computer; thus the
the
user's I,D. may be had simply by tapping his Phone line
performed
or
These static schemes suffer from the fact that
any identification must be converted to
recording
the
Since
the
user's
session, it is safe from
tappingi
However* tapping of data lines will
the
theft
of transmissions of data,
schemes for encoding and decoding
A
still
enable
number of effective
transmissions
have
been
developed, but nbne are in widespread use.
Within
the computer's storage svstem, the problem
is one of permitting
canltaliad
sharing
of
programs
and
Pace 19
DRAFT
Access
information.
schemes vary widely in their
control
sophlsticaiton; the only systems which offer even reasonable
are inplemented in academic computer facilities.
protection
employed
Perhaps the most successful scheme to date is that
by
Multics
at project MAC,
in which Protection is attained
through control of access paths to information couoled
a
which
structure
ring
with
to soecifv the
off*ers the abilitv
level of privileae of any program with resPect to others
the
system,
In
this structure, however, does not solve
Eyen
all access problems.
Another consideration is the fact
that
the
same
centralization of information and computing oower that maltes
time-sharing
systems
cost-effective
concentrated
efforts
to
cost-effective.
cause
break
the
may
very
well
maice
access control system
Centralization may therefore be expected to
increase in the number and Persistence of attacks
an
on the access control system;
its integrity becomes
a
very
important issue..
5,3 l££tlIl2lQSX Ind thS CQilltS
This
advancing
technology
whatever competence the courts
have
is raoidlv destroying
had
in
dealing
with
privacy Issues,
The
main
problem
information can be dispersed.
by
illegitimate
coupled
with
preventive
the
measures
is
cannot
speed
with
The irreversible damage
dissemination
courts*
the
which
done
of
adverse
information,
inherent
delays*
means
be
that
taken, and that corrective
DRAFT
Pace 20
^
measures would
conie
too late.
Moreover, any penalties which miaht be promulaated
require
would
considerable technical knowledge to enforce.
Given the present techhical sophistication of
branch*
the
fall to the same programmers who implemented the
the
iudicial
the job of executing the sentence would necessarily
first place.
guilty clearly is no solution to the problem.
the contents of
might veil be
a
system
in
Such dependence upon the aobd will of the
For
examole.
data bank which has been ordered destroyed
stored
on
microfilm
before
the
order
is
carried out,
Presently the world of the courts and the* world of
data processing have very little in common.
laws
exist
technology.
will
effort
for
protection
the
Even if such
be
required
Nb satisfactory
of Privacv from advancing
laws
are
to
bring
Passed,
stupendous
&
the rest of the legal
systeni into the computer age.
Having examined
privacy,
it
behobves
us
the
to
nature
develbP
problem
the
of
of
clear analytical
a
framework for viewing individual databanks.
The
obiective
of such an analysis is to develop criteria fbr the design of
specific, databanks.
careful
consideration
question of whether
bank
The analysis assumes, bf
which
does
a
has
previously
databank is needed
not serve one
course,
been
at
given
allJ
(and stnll one)
that
to the
a
data
bf the three
reasons for collecting- information should nbt exist.
DRAFT
_
The concepts discussed in the
Pace 21
foUowina caragraPhs
and the relationship among them are illustrated in Fiqure 2.
.
Vuoto
A. i-MFcKtuAVn^A
'.
raw^cY
fuo^e 2
Lj^^os'
Page 23
D.RAFT
6.1 £fiU£Sti£ii £rii££ia.
Unless there exists the possibility of
effect
chillino
a
on civil liberties, the collection of data is not of
itself an invasion of privacy.
information
The majority of
is collected through acceptable channels and for justifiable
personnel
company
records,'*
control
a
is
or is utilized for
data bank
has
been
once
the
made,
collection and distribution of information
the
of
and
has privacy been violated.
purpose
the decision to establish
data,
channels, is disseminated
to unauthorized persons or organizations,
inappropriate
are
Only when information
inappropriate
thrbUqh
collected
census
national
industry statistical information.
an
databanks
Among the most commonly developed
purposes.
becomes the central issue.
Of primary importance is
data concerning an individual or
for entry into
the
comprehensive
and
databank.
logical
the
In
set
criteria
group beconies
a
order
to
of criteria*
candidate
establish
a
prior thouoht
be given to the specific goals of the svstem.
roust
which
by
a
If
the
desired output can be stated precisely (and iustified on the
basis of the rights of individuals
their
groups
to
control
privacy), then input criteria can be defined and
own
bounded in
of
an^
a
useless
fashion that not only eliminates the
data
oathefirio
and promotes efficient system design, but
also prevents unwanted side effects.
Failure to clearly define the
databank
is
a
bbiectives
of
the
contributory factor in improper collection.
DRAFT
Pace 24
_
Khen a failure to specify objectives occurs,, any Information
might
Which
be
of
future is collected*
of
relevance
remote
at some time in the
This usually results in the collection
unnecessary information and in
considerable
a
potential
threat of invasibn of privacy,
6.2
lh.&
£ua.lilx
hi,
IniaLC&ii&a
Once reasonable standards
for
determining
have
established
been
data is to be sought as inout to the
what
system* it is necessary to set up procedures for contrbliina
the quality of that information.
Quality
control
tvo
has
aspects.
First,
the
accuracy of input data must be controlled as it is 'entered.
In
a'
computerized system, this might involve checlcing punch
cards for keypunching errors.
The second aspect of quality control concerns
removal
outdated.
information
of
corporations)
—
from
the
when
file
Perhaps information related to
should
the
becomes
it
individuals
rand
be classified like radioactive metals
by "half liveS", with
different
lengths
of
retention
time depending on the nature of the information.
6.3 &&1& AlldlXSXs
The
next
important
methodology used fbr aggregating
product,
The
collection
little in the way of Useful
must
of
consideration
raw
data
into
the
is
a
usable
data by itself produces very
managerial
information.
be analysed and manipulated into a usable format;
are the building blocks of information.
Data
data
The methods used in
-
DRAFT
Pace 25
.
analysis determine precisely the content of the output
this
result
biased,
in
information being transmitted by the
false
or
rolsleadin-g,
may
methods
Improper
information.
Such information may well constitute an Invasion of
system.
privacy,
6.4 i£££sa caaltoi
Given
system
a
is able to provide useful
which
information, it is necessary to carefuHv control access
Virtually every piece of information is
information,
that
sensitive to some degree
and
protection
requires
Information which consider both the authority
of
any
promulgation
Potential
of
against
Specific rules for the dissemination of
unauthorized usaqe.
Know
to
user must be established.
must
rules
these
*
and
need
But the
accompanied
be
to
by
procedures for enforcement,
6.5 Xikt£E-a.aial2a.nli Icatisf £ES
A
further
problem that must be considered is the
exchange of data between databanks,
taken
care
First,
to insure the propriety of such exchanges.
must
be
Moreover.
\
interchange demands verification
transmitted
information
of,
that
so
accuracy
the
errors
of
will
not
any
be
propagated,
6.6
ZllS.Lt&
Ss^s.ls.1
Finally,
information
the
system
social
effects
must be considered,
the system is to perform must be weighed
social
benefits
and
social
costs.
of
any
proposed
Each function that
in
The
terms
benefits
of
tnav
its
be
Pace 26
DilAFT
delineated In terms
o;E
establishment — win
the driving force behind the system's
the
system
management function of the society;
conflicts
assist
fact
in
will
the
resolve
cause progress
individual rights; or vill it
of
in
helo
it
through the distribution of knowledge.
These benefits must be balanced aoainst the social
costs
the System, which may be measured in terms of the
of
individual's loss of privacy, the resulting
freedom
degradation
of
and the possible chilling effect bn the exercise of
civil liberties,
7
LS.
lh.l^lkl, SQLuXifiil i^HE IIS
SHQEICQuHisS
Today the most commonly proposed solution
problem
to
the
of privacy is simply to allow individuals access to
their own
inaccurate
files
order
in
information.
they
that
This
correct
iniaht
any
proposal is over-simplistic
for several reasons.
First, the idea assumes that the individual is the
only entity which might be harmed by an invasion of privacy.
There are many arbups who
This is, of course, not the case.
have
been harmed by the illegitimate release of information
-- large corporations,
draft-resistance
groups, and the Government itself,
ipresumably
bf
have
Constitutional
organizational
some
guarantees
right
are
talce
rights,
to
even
organizations than for individuals,
pblitical
Althouoh it is true that
consideration of individual rights must
consideration
arbups,
precedent
these
privacy.
over
grbups
However.
less well defined for
DRAFT
Second,
individual
his
file
current
think/
interested
be
ridiculous
is
It
to
example, that a person should be able to chanoe
for
his medical record
at
Moreover,
will.
case
the
in
of
which in some way is unfavorable* it will never
information
information
be in the individual's interest to have correct
in
in
A«ain# this is a
accurate,
and
false assumption in mahy instances.
the
that
Qualified to
mbst
person
the
necessarily
is
assumes
access
individual
correct his own record, and that he will
having
Paae 27
^
If we do not tr«st a small oroup of people to
his file.
then
information,
sensitive
accurately report
we
surely
cannot trust everyone, en masse, to perform this function.
The most important shortcoming of this solution Is
that it does not
privacy*
recognize
show
To
the
problem
the
patient
his
to show
compromise the doctor's privacy;
letters
the
compromise
would
recommendation
of
conflicts
of
student
his
the authors*
clearly giving the individual access
rights to privacy,
of
medical record would
to
his own files is an inadequate solution to the problem.
1
8,1 g££&£&ti£ii
The
conflicts
of
distinction
fif
£&£i
icfiQ
Snini&n
first attempt at
Privacy
between
might
a
be
information
solution to the problem of
to
draw
example,
it
would
be
objectively provable facts from
clear
very
which is to be considered
fact* and that which is to be considered
medical
a
possible
the
opinion.
to
In
the
separate the
Physician's
opinions.
Page 28
DRAFT
giving patients access to the formeri but not to the latter*
distinction
Unfortunately, this
record.
information
factual
verified
between
and interpreted or heresay information
is not drawn in many detabanlcs.
Moreover* even if it
were*
there would still remain conflicts of privacvt
8,2
hlt&LIi?LS.il& g&liiii&Q.^
21tl£i:
Careful consideration should be given to Senator Sam J,
Ervin's proposal to?
"create a Federal agency wlth_ powers to
data bank operations,
military ^and
register
all
civilian^ to demahd justification for the records iceot
and to enforce a citizen's rioht to examine and to
even
challenge data which could hurt his reputation,
his ability to earn a livelihood, for the rest of his
*
days, -(15)
(See also (5))
would
however,
MOMXAf
organizational
be
invasion
an
privacy.
As
a
guidelines
explicit
require
of
such
an
aaencv»
such that the operations of that agency
be
itself,
in
powers
investigative
The
individual
of
and
result* such an agency would
directing
the
agencies
and
for which, and by whom, an investigation would be
databanks
performed.
Specific
criteria
for
evaluation
the
of
databanks would b© needed to enable investigators to conform
to the intentions of the regulatory agency.
problem
unique
An
additional
this proposal is the determination* for
to
the regulatory aqency, of what data files that agency itself
would
Xeep
in its investigative files.
of regulation by
further
by
a
Federal
agency
the necessity for both
a
is
The entire problem
complicated
eVen
legislative definition
,
Pace 29
DRAFT
of privacy and a national consensus as to the extent of each
This
rights.
citizens'
quite possibly is
question that
a
only the Supreme Court and the Congress could answer.
alternate*
An
analysis of databani^s.
similar
manner
reviewing
the
a
to
These companies would perform
Certified
in
Public Accountant firms,
determine:
databank the firm would need to
the legal basis
between
to
for.
individual privacy;
privacy and society;
C)
the
a
in
A)
of managerial functions in the brflanizationi
needs
desired
is
companies specializing in the review and
private
establish
solution
related,
though
B)
tradeoffs
and d) technblbotcal
factors,
To perform objectively,
be
free
from
these firms would have
political and non-professional pressure, and
whose
from involvement in the special interests of the firm
databank
investigation.
under
is
to
The
necessity
for
uniformity and Control of the subjective determinations that
would
required
be
if
such
firms
were organized implies
legislation either at the national or state level.
and
The complexity of the problem precludes any
QuicK
beyond
those
simple
solution.
Other
alternatives,
discussed here, need to be developed
and
studied
from
an
cperatiojial and feasibility viewpoint.
9.
£USG£STXONS
Every
individual
must
questions of privacy which determine
society,
consider
his
the
central
interaction
with
Byt managers have an even more complex problem In
paoe 30
BRAFT
veighlnj the advantages and disadvantages
information.
£fili££t
to
the
oroblem Is
advanced
technoiooy
complexity
The
of
highlighted by the decision to utilize
decisions
of
and the numerous tjrade'-offs involved in such a decision.
oeneral guidelines may be Provided, however.
Some
valuable
are
Xhey
both
considering
technologically
faced
manaoer
with
an
conflict/, and to the individual citizen
inforiuation-privacy
the
the
to
questions
central
advanced
society.
orivacv
of
in
a
These Guidelines can be
summarized as follows:
A,
comprehensive
A
national
This policy should only approve of
a
legitimate need of the organization,
weigh
must
the
social
policy
needed.
is
databank if it serves
Moreover, this
policy
benefits against the social costs.
There are three identifiable catagories of social costs:
direct
costs
in resources to the organization; 2)
to the chilling effect; and 3) cost due
misuse,
costs:
six
1)
2)control
issues
must
be
evaluated in weighing these
the
of the quality of the information;
control of
processed;
centralization
U)
control
in
the
the information sYstem is
terms
of
the criteria for inclusion of data in
of
access
3)
of
benefits,
files;
and
interfaced
it
should
6)
5)
filei
data
to
files and
the
to
technological questions of program access;
In
1)
cost due
danger
the
to
the nature of data processing and selection of the
be
a
the degree of
the degree to which
with
be
important not to hinder an organization in
other
noted
the
systems.
that
it Is
fulfillment
•
PaOe 31
DRAFT
of
example, the Internal
For
functions,
legitimate
its
Bevenue Service should not be prohibited from the collection
of
information
financial
tax-related
individuals and
on
organizationst
B,
A
means for enforcement, carried to the lowest
is required as an intearal
levels of affected organizations,
component of
solution
any
invasion
demonstrating
legally
legislation
should
Problems
of
privacv.
is required to establish grounds for
legislation
Moreover^
the
to
designed
l>e
Privacy.
of
as
deterrent
a
This
to
the
illegitimate accumulation of information.
C,
A
review of existing databanks and information
should
systems
undertaken
be
orsanizations
all
by
maintaining such files or systems.
action
However, legislative and judicial
levels
is
not
enough;
individual
at
all
citizens must be made
cognizant of the issues and solutions that this paper raises
for
frue, system builders must be educated
consideration,
in the variety of techhical considerations for protection of
privacy
and
given
Incentives for
ihcentives to use them.
further research should also be provided.
But
protecting
with
our
Privacy
lies
not
bniv
the
ibb
programmer andvith the cohiputer manufacturer; it lies
us.
Only
he
with
by increasing the sophistication of each citizen
In matters regarding his
which
of
the systems
lives
can
empty word in America,
relationship
to
the
society
In
we prevent "freedom" from becbmina an
0«AFT
•"
of
Page 32
The authors wish to gratefully acknbwledqe the
Dr.,
Richard
s.
Horse
assistance
and Dr. Robert H. Fano. both of
H.IfTt* vho provided ifevaluable assistance in
which forms the basis for this paper.
the
research
REFERENCES
.
I
.
.
Robert M.. Ih.£ Elficttflnic Iniasifln. John F.
Brovn,
Btder Publishert Inc.# New Yor)c, 1967.
(1)
(3)
law".
Bexiax* "chilling Effect in Constitutional
Volume 69/5, Hay# 1969,
CfiiiiaUia law
David, E, E. and Fano, 8, M., "some Thoughts About The
(U)
Social implications of Accessible Computing". EcaCefidiaas of
the lali slaiJil CbciEiiifir: Cflnifitancfii 1965.
Computer and Individual
Number 37,
volume
1l3,
"The
Sam J.,
Ervin Jr.,
(5)
Cflaflcessifiaal fieCflL4_»
Jrivacy".
March 8, 1967. Washington,
"Computers end Individual privacy". CoafJcessioaal
1969.
10,
November
184,
Number
115,
(6)
£ficac4» "volume
Washington.
Fano, Robert K. , Implications of Computers to Society^,
{7)
paper presented at the Kiewit Computation Center Dedication
Dartmouth College, Hanover. New Hampshire,
and Conference,
December 2-3, 1966,
"Computers in Human
j8)
volume
S£iifiii»
Ificliaaifiaz
Massachusetts
Massachusetts,
institute
Society-For Gobd or 111?".
March 1970,
Number 5,
cambridoe*
Technolbav,
of
72,
"Technolbav and Societvt A
Cornelius E,,
Gallagher,
(9)
115,
volume
conflict of Interest?"^ fiQnatassiaaal Eecard,
Number S5, April 1, 1969, vashington.
—
Data Security,
"Persbnal Privacy,
(10)
September
America"." CaHarfiSfiiakai £££atd#
Washington.
<11)
,
Balance".
"Science,
Privacy,
CanfltfisfiiaJiai Sficatd*
and
23,
a
Free
1970.
and
law^The Need for .a
August 18, 1966, Washinoton.
Pace 34
DRAFT
Speech before the American Management Association*
<12)
Rarch
(13)
8,
.
Politics,
Jersey.
1968, NeW York.
Speech before the Ninth Practicum on Practical
1968,
Jersey City State colleae. Hev
Kay 7»
(1U) Killer,
Age",
^^5)
Arthur R., "Personal Privacy in the computer
volume 67/6. April. 1969.
fiictiia^n Lait B£ii£lt,
iiS^i
iQCJt limfis,
{16) Ilaitfii:,
December 27, 197o.
Interview with Arthur J,
Goldberg'.
Sprague,
"The Invasion of Privacy and a
Richard E.,
ilS)
Rational Information Utility for Individuals"! fioBoutecs and
»
itttamaticiif January, 1970,
<19)
westin,
YorJc,
1967.
<20)
liliair
Aian
F.,
Zriiacy and Irefidom. Atheneum, Nev
"Life,
Liberty and the Pursuit of Privacy".
Volume 35, Number 3, May-June 1969, Armbnk, Sew YorJc,
"Computers and the Protection
of
Privacy"
(21)
IfiCbafiiaax EsxiSw* volume 71, Number 6< April 1969.
^^^^
Date Due
?&'
TOtQ DD3 701 34b
3
fiiffi'
3
II
3
llllllh:
TDflD DD3 b7D 3E7
iiiiiiiiiiiifiiii
TDflO DD3 7D1 353
..1-'
fSH-7(
3 TDflO
DD3 b7D 343
iillllilllllslll
3
TD6D DD3 7D1 EbE
3
TDflD
^''-^'
^(n-T[
DD3 b70 35D
3
TDflD
DD3 7D1 E47
3
^DfiD
DD3 701 37T
561-T
Download