Internet Privacy Law: A Comparison between the United States and the European Union David L. Baumer1, Julia B. Earp2 and J.C. Poindexter3 College of Management, North Carolina State University, Raleigh, NC 27695-7229 1 David_Baumer@ncsu.edu 2Julia_Earp@ncsu.edu 3JC_Poindexter@ncsu.edu Abstract The increasing use of personal information in web-based applications has created privacy concerns worldwide. This has led to awareness among policy makers in several countries regarding the desirability of harmonizing privacy laws. The challenge with privacy legislation from an international perspective is that the Internet is virtually borderless but legislative approaches differ between countries. This paper presents a functional comparison between current privacy law in the European Union and in the United States, as such laws relate to regulation of websites and online service providers. In addition, we articulate the similarities and differences between the 2002 EU Directive 2002/58/EC, titled the Directive on Privacy and Electronic Communications, which has been adopted by the EU but not implemented, and the proposed U.S. Online Privacy Protection Act. Using a qualitative approach, we use the Fair Information Practices to organize discussion of comparisons and contrasts between U.S. and EU privacy laws. Our investigation of this topic leads us to conclude that the right of privacy is more heavily protected in the EU than in the U.S. The Online Privacy Protection Act, recently introduced as a bill in Congress, has the potential to significantly effect commercial practices in the U.S. and move the U.S. toward current EU privacy protection laws. This analysis benefits managers as well as security professionals since the results can be used to ensure that their organization’s website practices are consistent with countries in which they exchange information. Keywords: information privacy, e-commerce, legislation, international law. 1 Introduction Managers striving to gain competitive advantage through the use of Internet-based systems can easily find themselves frustrated by the differing, and often conflicting, expectations regarding privacy in different countries around the world. From a technology perspective, the inherent nature of the Internet radically reduces the importance of geography and allows international business transactions to be accomplished with ease. From a legal perspective, geography continues to exert a significant influence. Balancing local differences in privacy protection with the increasingly interconnected nature of Internet-based transactions, which often rely on sharing customer personally identifiable information (PII), is a massive challenge to managers and legislators today. Differences between countries must be considered when developing and implementing global Internet-based applications [1]. Understanding the differences in regulatory approaches may be a key to successfully managing information privacy in a global marketplace that is dependent on transborder information flows, especially when the regulatory approaches of other nations are more restrictive. The international privacy challenge can be attributed to several factors, including legislative threats, cultural values and privacy perceptions [2]. Milberg et al. [3], contend that cultural values and privacy perceptions differ among countries and those values and perceptions become intertwined with and exert a significant influence over differing legal environments. According to [4] it is impossible to understand the privacy concerns in the EU without understanding how history has influenced European values, for example, how Nazis used centralized collections of PII to round up and dispose of “undesirables.” Unlike in the U.S. where the courts have only recently discovered a constitutional right of privacy for a narrow range of conduct, as the U.S. Supreme Court articulated in striking down Texas anti-sodomy laws in July of 2003, the EU Information Directive of 1995 and the more recent 2002 EU Directive repeatedly, and emphatically, state that EU residents are entitled to a right of privacy. In this paper, we show just how different Internet privacy protection is in the U.S. relative to the EU and examine a significant, proposed change in U.S. privacy law. Every society values privacy in some respect but the expressions of privacy differ significantly across cultures [5]. A recent survey of over 1000 Internet users from 30 countries demonstrates this; in particular, the non-U.S. respondents were statistically more concerned about organizations using consumer data for customization and personalization purposes [6]. These findings are apparent when comparing and contrasting privacy laws from differing cultures. The cultural values of a nation influence the development and maintenance of societal institutions such as legislative bodies [7]. Although there may be other factors to consider, a country’s cultural values are closely associated with the privacy concerns that are exhibited by its people and are associated also with its regulatory approach [2]. The qualitative analysis we perform in this paper provides additional support for the proposition that different cultural experiences and histories impact a country’s legal system, especially the legal protection provided for individual privacy. The initial consequences of international legal disparities between the U.S. and the EU in privacy protection took place when the EU enacted and enforced the 1995 EU Information Directive. The introduction of the EU 1995 Information Directive promptly caused non-EU countries to either consider adopting more stringent privacy laws or be restricted when attempting to transport data from EU countries into countries having inadequate privacy laws [8]. In particular, the regulatory statutes in the United States lacked adequate privacy protection by the standards set forth in the EU Privacy Directive, and as a result, U.S. businesses were adversely affected by its restrictions [2]. To prevent an imminent information embargo, in November 1, 2000 the U.S. Department of Commerce created Safe Harbor Principles that addressed privacy concerns of the EU relative to U.S. laws and commercial practices. The Safe Harbor Principles provide privacy procedures that are consistent with EU privacy law, but according to a recent study, only 135 organizations in the U.S. had complied with the Safe Harbor Principles [4]. As of August 2003, however, 369 organizations had taken the steps necessary to qualify for the Safe Harbor Principles (see the Department of Commerce website at http://web.ita.doc.gov/safeharbor), suggesting that the Safe Harbor program is working and is 2 increasingly being used by industry. This paper presents a functional comparison of current online privacy law in the European Union (EU) and in the United States. In addition, we discuss a recent proposal for comprehensive online privacy reform in the U.S. and compare it to the recently enacted, but not implemented, 2002 EU Directive on Privacy and Electronic Communications. In particular, we articulate the similarities and differences between the recently enacted 2002 EU Directive with the proposed Online Privacy Protection Act (OPPA), which has been introduced in the U.S. Congress as a bill in January, 2003 (see H.R. 69). Even though OPPA is just proposed legislation at this point, it encompasses most of the necessary components for comprehensive protection of privacy online called for by privacy advocates and entities such as the FTC. It is also consistent with the Fair Information Practices (FIP) [9], which have operated as a guide for policy makers in the U.S. If the U.S. does indeed enact comprehensive online privacy legislation, it will most likely continue to use the FIPs as a guide and therefore, will closely resemble OPPA. The results presented herein will benefit managers and website designers of companies involved in international business, as well as policy makers. This paper is organized as follows: Section 2 reviews privacy legislation in the EU and U.S., Section 3 presents the comparative analysis between EU and U.S. privacy laws and Section 4 draws some conclusions and provides recommendations to managers and website designers. 2 Privacy Protection in the EU and in the U.S. In 1980, the Organization for Economic Cooperation and Development (OECD) issued the Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Commonly known as the OECD Guidelines, they established eight data protection principles for balancing data protection and the free flow of information. Although the OECD Guidelines are recognized by all OECD member nations including the EU and the U.S., they are not legally binding and are thus, implemented differently in different nations. The OECD guidelines address the following aspects of data protection: Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation, and Accountability [10]. The five FIPs include: Notice/Awareness, Choice/Consent, Access/Participation, Integrity/Security, and Enforcement/Redress. The FIPs represent a subset of the internationally recognized OECD Guidelines, but they have been the focus of U.S. industry and government guidelines and ideals for the protection of personal data and privacy. To date, there is no comprehensive privacy protection law in the U.S. for Internet transactions, albeit with some major caveats. Major exceptions include coverage for healthcare data (the Health Information and Portability Accountability Act, HIPAA), financial data (Gramm-LeachBliley Act, GLB) and information obtained from children (the Children’s Online Privacy Protection Act, COPPA). There is no requirement in the U.S. for commercial websites or online service providers to maintain privacy policies, but if they do they are potentially subject to litigation by the Federal Trade Commission if they do not adhere to their stated privacy practices. The FTC considers it an unfair and deceptive trade practice for a website or online service provider to violate the terms of its own privacy policy and has sued several firms for doing just that. (see e.g., Federal Trade Commission [File No. 982-3015] Geocities; Analysis to Aid Public Comment, Thursday, August 20, 1998). Although some privacy protection is required as previously mentioned, Internet privacy is basically unregulated in the U.S. As a result, users in the U.S. protect themselves by being very selective in the kinds of information they reveal and to which websites they reveal the information [11, 12, 13]. Also private parties (firms and privacy 3 groups) in the U.S. have experimented with various attempts at ensuring privacy through nongovernmental mechanisms such as third party seals, P3P, private lawsuits and other activities including adverse publicity which has thwarted what some regard as invasions of privacy by hardware and software producers. The legal foundation for much EU data protection is found in the 1995 EU Information Directive (Directive 95/46/EC). In July of 2002, the European Commission adopted the Directive on Privacy and Electronic Communications (2002/58/EC). This Directive requires member states of the EU to implement it by October 31, 2003 by passing appropriate national legislation. The 2002 EU Privacy and Electronic Communication Directive makes frequent reference to Directive 95/46/EC. The 2002 EU Privacy and Electronic Communications Directive is mainly directed towards online privacy, while the 1995 Information Directive pertains to privacy issues in law that are not limited to the Internet. The 2002 EU Directive creates additional privacy protections for Internet users on a foundation that was laid by 1995 EU Information Directive. 2.1 U.S. Definition of Personal Information The definition of what constitutes personal privacy is a concept about which there is not unanimity. The latest U.S. approach is indicated by Section 8(8) of the 2003 version of OPPA, which defines personal information as including: “first and last name; home and other physical address; e-mail address; social security number; telephone number; and any other identifier that the Commission [FTC] determines identifies an individual; or information that is maintained with, or can be searched or retrieved by means of, data described immediately above. If the 2003 version of OPPA is enacted into law, the information immediately above would be legally protected in ways provided for by the Act, which provides for notice, choice, access, security, and enforcement, as is discussed in Section 3. Previous versions of OPPA, introduced in earlier sessions of Congress, categorized certain personal information as “sensitive” including: individually identifiable health information; race or ethnicity; political party affiliation; religious beliefs; sexual orientation; social security numbers; and sensitive financial information.1 Most of the information in the “sensitive” category is both personal, but also “private.” Many people willingly disclose their names to strangers, but few are willing to disclose health information, religious orientation, or sexual orientation to people they do not know unless there are guarantees that such information will be kept confidential and not used for other purposes. The 2003 version of OPPA definition does not contain a category of personal information that is labeled “sensitive.” If the 2003 version of OPPA was enacted into law, its protections would be directed towards users’ names and addresses and the other categories listed in Section 8(8) of OPPA, but there would be no special legal protections for “sensitive” personally identifying information (PII). 2.2 EU Definition of Personal Information As mentioned above, the 2002 EU Directive builds on the privacy protections that are contained in the 1995 EU Information Directive. Article 2(a) of the EU 1995 Information Directive defines “personal data” as “any information relating to an identified or identifiable natural person (data subject); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, psychological, mental, economic, cultural or social identity...” The EU definition appears in accordance with the 2003 version of OPPA, but is perhaps more comprehensive. Protection of PII based on psychological, mental, cultural or social identity is similar to the “sensitive” categories of information labeled in previous versions of OPPA, but not the 2003 version. 4 The EU 1995 Information Directive defines special “categories of data” that closely correspond to the categories of “sensitive” personal information defined in previous versions of OPPA. In particular, Article 8 of the EU 1995 Information Directive identifies several “special categories of data” and addresses the handling of these categories by stating that, “Member states shall prohibit the processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, and processing of data concerning health or sex life.” There are a number of exceptions to the prohibitions on member states processing special categories of personal data where the data subject has given his consent. These exceptions include processing that takes place pursuant to employment law in member states, actions intended to protect individuals, data gathering by political, philosophical, or religious organizations, or if the data are made public by the data subject or are made public based on legal claims. 2.2.1 PII: Personal versus Private PII typically does not refer to private information, even though it is personal and identifying. A person’s name or phone number may be personally identifying, but it is not generally private information. A weakness with many prior studies of online privacy is that both public and private categories of PII were combined together. Compiling all the names and phone numbers of residents of a town in a single book is not viewed as particularly threatening by most people, whereas compiling lists of Jews, socialists, and hemophiliacs would be viewed with alarm, not only by the data subjects, but also by the public at large. Internet users’ willingness to provide PII to websites depends on the nature of the information (private or public) as well as the kind of website (retail, health care, financial) collecting the information [12]. Although many Internet users are not reluctant to reveal their name, age, or even home address to commercial websites, most of those same users are very opposed to revealing health and financial information as well as their social security numbers to websites [12]. Relative to current U.S. law, the legal protection provided by the EU is much more directed towards protecting what is traditionally considered “private” information: ethnicity, religion, sexual orientation, political affiliation, medical and financial records. In the U.S., medical and financial records are protected by separate legislation, while most other private information acquired online currently does not have legal protection. It seems clear that passage of the 2003 version of OPPA would not protect possible online misuse of special or sensitive PII that is currently protected from processing by the 1995 EU Information Directive. 3 A Comparison based upon Fair Information Principles The FIPs do not distinguish among various categories of PII, such as “sensitive” or “special”, as discussed immediately above. The discussion in the rest of this paper should be regarded as a “generic” privacy analysis, because it does not deal separately with sensitive or special PII, as defined in previous versions of OPPA or in the 1995 EU Information Directive. The discussion below refers to legal protection against misuse of non-private PII, such as name, address etc. rather than misuse of sensitive PII. 3.1 The Notice Requirement of the Fair Information Practices Under the FIPs any party who is the subject of data collection is entitled to be notified of that fact and of the party or organization that is collecting the information. According to FTC Commissioner Shelia F. Anthony, in testimony before the U.S. Senate Committee on Commerce, Science, and Transportation, in 2000 [14] providing proper notice requires that “data collectors must disclose their information practices before collecting personal information from 5 consumers.” Furthermore, the notice principle of the FIPs is considered to be the most fundamental because it is a precondition to implementing other FIP principles, such as choice and access [15]. 3.1.1 Notice Requirements under U.S. Law U.S. law currently does not require organizations with websites or online service providers to notify end-users about collection of PII (other than as required by HIPAA, GLB and COPPA). In fact, online service providers and commercial websites are not required to have or publish a privacy policy. The Progress and Freedom Foundation (PFF) recently surveyed a random sample of highly-visited websites and found that 90% of those sampled collected PII. Furthermore, only 33% of those collecting PII implemented the notice, choice and security principles [16]. If OPPA was enacted, it would require websites and service providers to notify users before PII is collected. Section 2(b)(1)(A)(i) of the 2003 version of OPPA “require[s] the operator of any Web site or online service— to provide notice on its Web site, in a clear and conspicuous manner, of the identity of the operator, what personal information is collected by the operator, and how the operator uses such information, and what information may be shared with other companies;” We contend that compliance by commercial websites and online service providers with Section 2(b)(1)(A)(i) of the 2003 version of OPPA could be achieved by having a hyperlink on the home page of the company’s website to its privacy policy, which clearly describes what personal information is collected, the uses made of that information, and what information is shared with other companies. Although current U.S. law does not require websites or online service providers to provide notice before collecting PII, virtually all major commercial websites have privacy policies that are available online to users. In particular, 83% of websites surveyed in the PFF study posted a privacy policy [16], so complying with the notice requirements of OPPA would not require a change in commercial practices for most, highly-visited or used websites or online service providers. 3.1.2 Use of Cookies in the U.S. While there are many uses for cookies and web bugs, most of these uses do not include the collection or use of PII. However, cookies are sometimes used to collect and store PII and this had led to a number of recent legal challenges. There are several federal statutes that address practices such as this, including the Wiretap Act and the Stored Communications Act. In particular, they provide civil remedies for users who are victims under these acts. In a recent case, Pharmatrak provided a monitoring service called NETcompare for pharmaceutical companies to track how their websites were used by visitors. Pharmatrak’s service made use of web bugs, but the practice was invisible to users and presumably unknown. The plaintiffs in In re Pharmatrak, Inc., No. 02-2138, 2003 WL 21038761 (1st Cir. May 9, 2003) contend that this capture of PII constituted an illegal interception of electronic communications under the Wiretap Act. The defendants filed a motion to dismiss, which was denied by the First Circuit based partially on the assurance that Pharmatrak made to pharmaceutical companies that it would not collect PII, only clickstream data. Apparently Pharmatrak collected PII in addition to clickstream data. There have been other legal challenges to data collections through cookies, mainly when 6 cookie data were combined with PII. The state constitution of California provides protection for the right of privacy. In Judnick v. Doubleclick, No. 000421 (Cal. Super. Ct. filed, Jan. 27, 2000), the plaintiff, Helen Judnick claimed that Doubleclick, an Internet advertiser violated her privacy rights when it combined her PII with cookie data. Shortly after the suit was filed, Doubleclick announced that it would no longer continue its practice of combining PII and cookie data. However, use of cookies by U.S. websites and online service providers that do not combine cookie data with PII is routine and apparently legal, even though users are not notified nor is consent obtained. 3.1.3 EU Notice Requirements Article 10 of the 1995 EU Information Directive states that member states shall require organizations that collect PII to reveal the following information to data subjects: the identity of the controller2 and of his representative, if any, the purposes of the processing for which the data are intended, any further information such as, the recipients or categories of recipients of the data; whether replies by data subjects to the questions asked by those collecting PII are obligatory or voluntary, as well as the possible consequences of the failure to reply; the existence of the right of access to and the right to rectify the data concerning him. Under the 1995 EU Information Directive, these disclosures are required regardless of whether the collection of data is obtained directly from the data subject or from other sources. For websites, compliance with the 1995 Information Directive means that a hyperlink to a privacy policy that addresses that information would be required. The 2002 Directive on Privacy and Electronic Communications affirms the protections provided in the 1995 EU Information Directive stating that, “By supplementing Directive 95/46/EC, this Directive is aimed at protecting the fundamental right of [end-users] and particularly their right to privacy, as well as the legitimate interests of [the organization].” 3.1.4 EU Cookie Law According to the 2002 Directive, cookies can be “a legitimate and useful tool”, but “their use should be allowed on the condition that users are provided with clear and precise information in accordance with Directive 95/46/EC about the purposes of cookies or similar devices…” These requirements appear to be a clear departure from commercial practice at U.S. based websites, which regularly install cookies without separately informing users, even though cookies are often discussed in privacy policies. The 2002 Directive also states that, “So-called spyware, web bugs, hidden identifiers and other similar devices can enter the user’s terminal without their knowledge in order to gain access to information, to store hidden information or to trace the activities of the user and may seriously intrude upon the privacy of users. The use of such devices should be allowed only for legitimate purposes, with the knowledge of the users concerned.” 3.2 Consent/Choice The second FIP maintains that before information is collected from data subjects their consent should be obtained. In particular, compliance with the consent/choice principle requires websites provide consumers with options regarding whether and how personal consumer information may be used for purposes beyond those for which the information was provided [15]. If the user supplies information, the user is aware that the information is being provided and presumably 7 notice/awareness has been satisfied. Of the 90% of commercial websites collecting PII from users only 47% of those support choice or consent to some extent [16]. There are two aspects to the choice/consent element of the FIPs. In some cases, the data subject is unaware that data are being collected about him or her, in which case, notice of data collection becomes imperative in order for the data subject to make informed decisions about uses of his or her PII. In other situations, the user supplies PII in order to complete a transaction, and therefore the user is clearly on notice (or aware) that the website or online service provider is collecting PII about them. Quite obviously in order to fulfill an online book order, a website would have to obtain a customer’s name, address, credit card number and possibly other data. The initial distribution of PII from user to website does not require notice since it is the user that is supplying the information. The real issue is what happens to that information (or PII) after the transactional need is satisfied? Ideally, the user should be permitted to choose what happens to his or her PII. According to the 2003 version of OPPA, choice or consent of users would be required by websites and online service providers. In particular, under Section (b)(1)(A)(ii) of OPPA, these organizations would have “(ii) to provide a meaningful and simple online process for individuals to consent to or limit disclosure of personal information for purposes unrelated to those for which such information was obtained or described in the notice under clause (i);…”, [clause (i) is the OPPA notice requirement presented in 3.1 above]. Under OPPA, then, organizations collecting personal information online about website users would have to obtain their consent (opt-in) to use information collected for one purpose, such as processing a book order, for other purposes. This OPPA requirement seems contrary to the commercial practices of many websites and online service providers that collect PII and use it according to terms stated in their privacy policies, but often do not separately require the data subject’s consent for secondary use of information collected. 3.2.1 Current U.S. Law Regarding the Need to Obtain Consent to Use PII As with notice, current U.S. law generally does not require that websites or online service providers offer users a choice as to whether they consent to the collection of PII. There are, of course, significant exceptions provided by several federal statutes that include the following: The Children’s Online Privacy Protection Act (COPPA) requires that websites obtain verifiable parental consent before obtaining any PII from children 13 and under, HIPAA regulations prohibit non-consensual secondary use of medical information, but there are numerous exceptions for public health, medical research, fraud detection and other reasons. The Gramm-Leach-Bliley Act requires banks and other financial institutions regulated by the Act to obtain consent from customers for some disclosures of financial data to third parties for marketing purposes. 3.2.2 Current EU Law Regarding the Need to Obtain Consent to Use PII On the other hand, the 2002 EU Information Directive is emphatic that websites and online service providers must obtain consent before using “information on the private life of natural persons…” According to the 2002 Directive, 8 Any further processing of such data which the provider of the publicly available electronic communications services may want to perform, for marketing of electronic services or for the provision of added services, may only be allowed if the subscriber has agreed to this on the basis of accurate and full information given by the providers of the publicly available electronic communications services about the types of further processing it intends to perform and about the subscriber’s right not to give or to withdraw his/her consent to such processing. Essentially, what the 2002 Directive requires is that users [the EU term is “subscriber”] be given an option to opt-out after full information is provided to them. Furthermore, the 2002 Directive requires that “Traffic data used for marketing communications or for the provision of value added services should also be erased or made anonymous after the provision of the service.” The 2002 Directive does indicate that “the obligation to erase traffic data or to make such data anonymous when it is no longer needed for the purpose of the transmission of a communication does not conflict with such procedures on the Internet as the caching in the domain name system of IP addresses or the caching of IP addresses to physical address bindings or the use of log-in information to control the right of access to networks or services.” When providing personal information to a website, the user is presumably aware that information is being collected. However, the user may be under the misapprehension that the information will only be used for the intended transaction, but this is often not the case. Additionally, as previously mentioned, cookies are often used without the user’s awareness. Therefore, the user is sometimes unable to exercise a choice to disallow the cookie. The 2002 EU Directive addresses this by stating that “[U]sers should have the opportunity to refuse to have a cookie or similar device stored on their terminal equipment.” The 2002 Directive does indicate that, “Access to specific website content may still be made conditional on the well-informed acceptance of a cookie or similar device, if it is used for a legitimate purpose.” The bottom line is that EU law requires adherence to the consent/choice FIP, while that is not part of U.S. law, except for the three areas discussed above relating to financial data, health data and information obtained from children. U.S. based websites typically do not ask for permission to attach cookies, and indeed, refuse entrance to various parts of their websites for browsers that are programmed to reject cookies. Under EU law, conditioning admission to certain services or parts of a website to acceptance of cookies is allowed but users must be notified and have an informed opportunity to reject cookie attachments. 3.3 Access/Participation The third FIP addresses the right of data subject to access the information that is collected about them and the right to contest and correct the accuracy of that information. 3.3.1 Current U.S. Law Although some websites do allow users access to PII that is collected about them, it is not mandatory under current U.S. law. If a website voluntarily allows users access to information collected about them, it is generally explained in privacy policies or terms of service statements. Some websites also provide an opportunity for users to correct inaccuracies in the information that has been collected about them. It is clear, however, that users in the U.S. have no legal right to review information collected about them by websites and online service providers, nor do they have the right to make corrections if they find inaccuracies in their data files. If websites and online service providers provide access and an opportunity to correct inaccuracies, it is a voluntary action that is not compelled by U.S. law. Most of the time, if such opportunities for 9 users exist, they are buried in website privacy policies and terms of service statements and users are frequently unaware of these options. If the 2003 version of OPPA was enacted, website operators and online service providers would be required, upon request of individual users, to provide [Section 2(b)(1)(B)(i and ii)]; i. a description of the specific types of personal information collected by that operator [of a website or online service] that was sold or transferred to an external third party and ii. notwithstanding any other provision of law, a means that is reasonable under the circumstances for the individual to obtain the personal information described in paragraph (i) from such individual [operator of a website or online service]; The language in this portion of OPPA suffers from an excess of “legalese” but this section of OPPA provides user access to any file collected, sold or transferred to any external third party. Note that the 2003 version of OPPA only addresses part of the access/participation FIP principle as it does not mention a right or procedure on the part of users to correct errors in the PII files collected about them. Nevertheless, if the 2003 OPPA was enacted into law, users would at least have access to the files of PII that are being compiled about them and a description of the PII that is collected about them. There are some markets and transactions in the U.S. where there is a legally recognized right on the part of data subjects to access personal information collected about them and recommend corrections for inaccuracies. The Fair Credit Reporting Act does guarantee, with stiff penalties for noncompliance, that data subjects shall have access to the files collected about them and that there is a procedure for contesting the accuracy of the credit report. If a data subject contests the accuracy of the credit report about him or her, the credit bureau is required to reinvestigate and make changes if the reinvestigation reveals errors. 3.3.2 Current EU Law Section V, Article V of the 1995/46/EU Information Directive is entitled, The Data Subject’s Right of Access to Data. According to the 1995 Directive, “Member States shall guarantee for every data subject the right to obtain from the controller:…confirmation as to whether or not data relating to him are processed and information at least as to the purposes of the processing, the categories concerned, and the recipients or categories of recipients to whom the data are disclosed;” Section V Article 12 [paragraph 2] also requires that each data subject be entitled to obtain from the controller (of information collected about him or her), “as appropriate the rectification, erasure or blocking of data, the processing of which does not comply with the provisions of this Directive, in particular because of the incomplete or inaccurate nature of the data;”. Finally, Article 12 of the 1995 Information Directive basically guarantees “notification to third parties to whom the data have been disclosed of any rectification, erasure or blocking carried out in compliance with paragraph 2,…” Similar to the other FIPs, EU law requires that Member States pass laws that recognize access/participation. In particular, EU laws guarantee data subjects access to PII that has been collected about them and some rights with respect to corrections and erasures of incorrect PII. This is a more complete approach to access/participation than would be provided by OPPA. 3.4 Integrity and Security Compliance with the integrity and security FIP principle requires data collectors to take reasonable measures to assure that information collected from consumers is accurate and secure 10 from unauthorized use [15]. The implication of this FIP is that websites and online service providers are required to use commercially reasonable measures to protect PII from external threats posed by hackers and identity thieves and from inappropriate internal use. The threats from hackers are well known; some enjoy the challenge of penetrating firewalls and security systems, while others, motivated by profit, make fraudulent use of PII in the form of identity theft and credit card fraud. Although identity theft has received much recent attention, ineffective internal controls of access to PII collected by large institutions (e.g. hospitals and universities) are actually a more significant threat to the security and integrity of such data. In a study that reported the results of a survey of hospital employees who had access to medical records of the hospital [17], respondents were asked their perceptions regarding the most important threats to the confidentiality of such records. Second, behind unauthorized secondary use of medical records, was inappropriate and unauthorized access to medical records. Compliance with the security FIP requires organizations that acquire and store PII to implement protective measures against external, as well as internal threats, to the confidentiality of the data. 3.4.1 Current U.S. Law In the U.S., most websites and online service providers are not required by law to have adequate security, though there are three exceptions for websites that store medical records, financial data, or acquire information from children. For each of these three areas, there are statutory requirements that websites storing such information must ensure the integrity of the data by employing commercially reasonable security measures. The Gramm-Leach-Bliley Act, for example, requires financial institutions to implement security technologies that can fend off anticipated threats. For websites that do not fall into any of these three categories, there is no statutory requirement under U.S. law to maintain adequate security for the confidentiality of PII that is acquired or stored, but there could be legal sanctions in the form of common law suits based on negligence. If websites and online service providers do store PII and do not use commercially reasonable security procedures, it could be argued that they are negligent, which is a common law tort. A defendant (a website storing PII sued by users) is liable for negligent behavior if the defendant owes a duty to the plaintiffs, breaches that duty by acting unreasonably, and the breach of that duty to the plaintiffs is the proximate cause of damages incurred by the plaintiffs. All of those elements are present if a website or online service provider collects, stores, or transmits PII; they have a duty to data subjects to act reasonably with their PII. If websites and online service providers do not use commercially reasonable security measures to deter foreseeable internal or external threats and security is compromised, they have breached a duty to data subjects and could be liable for the resulting consequences of security breakdowns. Although no federal statute requires websites and online service providers who store PII to use commercially reasonable measures, common law suits based on negligence are a potential consequence of not using commercially reasonable measures to protect the integrity of stored PII. There have only been a few lawsuits in which the plaintiffs (users who records are stored) claim that defendants (websites that stored PII) were negligent in their handling of PII. In order for these suits to be justified economically, many users must be joined together in a class action lawsuit because the damages associated with unlawful disclosure of PII are normally not large on an individual basis. For attorneys who specialize in class action suits, the rate of return is higher where the defendants are charged with securities fraud or selling defective products. In some class action product liability cases, individual victims (plaintiffs) are entitled to several million dollars apiece, whereas the damages to individuals associated with failure to keep PII private are 11 likely to be measured in the hundreds of dollars. The bottom line is that under current U.S. law there is only weak legal protection for PII stored by websites and online service providers unless the records stored are subject to HIPAA regulations, GLB, or COPPA. On the other hand, criminal sanctions in the U.S. against hackers have been dramatically increased in the recent years. Hackers face severe criminal liability under the Computer Fraud and Abuse Act (CFAA), which makes it illegal to knowingly access a “protected” computer without authorization or exceed authorized access. In the wake of 911 attacks, hackers who violate the CFAA are subject to imprisonment for up to twenty years as well as substantial fines. Violations of the CFAA occur if (1) the hacker gains access to computer files that are forbidden to him or (2) the hacker exceeds the access that has been granted to him. Prosecution of a crime does not normally provide restitution to victims, especially in the case of hackers who are often bored teens, but the increased legal sanctions undoubtedly do have deterrence value. The 2003 version of OPPA, Section 2(b)(1)(C), does “require the operator of such Web site or online service to establish and maintain reasonable procedures to protect the confidentiality, security and integrity of personal information it collects or maintains.” “Reasonable procedures” to protect confidentiality etc. are presumably defined with reference to the procedures typically used in industry, though in some cases the courts have found that industry standards lag behind what is reasonable.3 Certainly, “reasonable procedures” would include use of encryption to scramble transmissions between web sites and its customers, firewalls, internal management practices, and other measures that are commonly used by websites and online service providers to protect confidential PII that has been provided to them by customers or other firms. 3.4.1 EU Law Article 4 of the 2002 EU Directive on Privacy and Electronic Communications requires that, “The provider of a publicly available electronic communications service must take appropriate technical and organizational measures to safeguard security of its services, if necessary in conjunction with the provider of the public communications network with respect to network security.” Article 4 of the 2002 EU Directive requires that an electronic communication service must take appropriate technical and organizational measures because it allows such services to inform subscribers about risks when its security does not provide adequate protection. Article 4(2) states that, “In case of a particular risk of a breach of the security of the network, the provider of a publicly available electronic communications service must inform the subscribers concerning such risk and, where the risk lies outside the scope of the measures to be taken by the service provider, of any possible remedies, including an indication of the likely costs involved.” The implication of this subsection is that those entities who store PII acquired online may absolve themselves of liability for certain contingencies if the costs of deterring the risk exceed the benefits and the electronic communication service informs subscribers in advance of its unwillingness to ensure against that risk. Article 5(3) of the EU 2002 Directive does require, “Member States”…to “ensure the confidentiality of communications and the related traffic data by means of a public communications network and publicly available electronic communications services, through, national legislation.” If passed, OPPA would impose similar requirements on websites and online service providers in the U.S. that stored PII. Current U.S. law provides protection to users, subscribers, and website visitors through the common law which requires a showing that the website or online service provider was negligent. A problem with common law remedies, not backed up by a statute is that individual lawsuits and class actions are not economically justified in terms of likely, court-awarded, damages. 12 3.5 Enforcement/Redress If the 2003 version of OPPA is enacted into law, it is envisioned in the statute that enforcement will take place through actions by state attorney generals and by the FTC. Section 4 of OPPA allows states, through their attorney generals, to bring actions that they believe violate any regulation fashioned by the FTC on behalf of state residents. Such actions include bringing a suit to enjoin unlawful actions of websites or online service providers, actions to enforce compliance with the regulation, actions for damages, restitution, or other compensation and any other relief a court may deem appropriate. Before filing an action, the state attorney general shall provide to the FTC written notice of the action and a copy of the complaint. Upon notification, the FTC shall have the right to intervene, which means that the FTC will prosecute the case instead of the state. OPPA, if passed into law, would supercede “State law to the extent that it [OPPA] establishes a rule of law applicable to an online privacy action that is inconsistent with State law.” Importantly, “Nothing in this Act supercedes State law with respect to the prosecution of fraud.” The implication of this interaction between OPPA and State law is that individuals harmed by actions of websites and online service providers would still have the option to file a private civil suit, based on common law fraud under State law. OPPA itself, however, does not provide for a private right of action by citizens, which is, perhaps, a recognition that class action lawsuits in this area are infeasible. If a website or an online service provider made a promise with respect to PII that it knew was false, the breach of such promises may constitute both a violation of OPPA and common law fraud, but individuals harmed by such actions could only sue under common law fraud. Of course, the attorney general in the state could sue the defendants for violations of OPPA, or the FTC may intervene and sue under powers given to it by OPPA. EU Directives are basically commands to Member States to enact laws consistent with the Directive. There is nothing in the 2002 Directive that allows for private rights of actions for violations of the Directive. By passing laws that make certain actions of websites and online service providers illegal, enforcement of the 2002 Directive takes place through legislation and other police actions of law by the governments of Member States. As with most aspects of ensuring privacy, the EU places enforcement into the hands of governmental authorities, rather than private actions. As mentioned above, this is the same approach taken by OPPA, which does not contain a private right of action, though OPPA does not preclude private common law fraud suits. Table 1: FIP Coverage Summary FIP Notice / Awareness Current U.S. Law None in general but there are requirements in the GLB Act and HIPAA regulations that require notice. OPPA Hyperlink to privacy policy that notifies the user as to who is collecting PII, what PII is collected, how PII is used, and what information is transferred to third parties. Choice Industry specific Websites that fall under the provisions of COPPA, HIPAA or GLB. Access / Participation None Websites must provide a meaningful and simple online process for users to consent to (or limit) disclosure of PII for purposes unrelated to those for which the PII was obtained. Websites must provide (upon request of user) i) a description of types of PII collected and transferred to a third party, EU Directives Hyperlink to privacy policy that notifies the user as to who is collecting PII, the purpose for collecting PII, categories of third parties who receive the PII, and the right to access and the right to rectify PII. EU law generally requires that users be given a choice before their PII is used for any other purpose than completing a transaction. Websites must provide users access to PII and conditional procedures to modify incorrect PII. 13 Security / Integrity Enforcement / Redress 4 None – however, common lawsuits based on negligence are a potential consequence of not using commercially reasonable measures to protect the integrity of stored PII. FTC and state attorney generals can file unfair trade practice suits for websites that do not adhere to promises made in their privacy policies. ii) reasonable procedures for the user to obtain PII. Requires websites to establish and maintain reasonable procedures to protect the confidentiality, security and integrity of personal information it collects or maintains. For violations of OPPA state attorney generals are empowered to file suits for injunctions and damages unless the FTC decides it wants to file a nationwide claim. Must take appropriate technical and organizational measures to safeguard security of its services. There are no private rights of action but enforcement takes place through information regulatory agencies in each member nation. Conclusion and Implications For most transactions that take place on the Internet, U.S. based websites are not regulated. If they collect PII, they are not required to provide notice. They are not required to give end-users, a choice as to whether secondary use is made of PII collected to complete transactions. For users whose PII is collected by U.S. based websites, they have no right to access that information or to recommend corrections of inaccuracies. Websites that are negligent in their storage of PII are potentially liable under common law suits, but the amount of damages involved rarely justify a suit by individual users even if joined together in a class action suit. The Federal Trade Commission and state attorney generals have filed legal claims against websites that violate the terms of their own privacy policies, but neither the FTC nor state attorney generals have the resources to seriously dent the vast bulk of fraud that occurs in cyberspace let alone the misuse of PII according to the FIPs. On a piecemeal basis, U.S. legislators have provided some legal protection for the privacy of financial and medical records and for information obtained from children under 13. Also, there are significant efforts by private parties in the U.S. to guarantee user privacy on the Internet, but analysis of these efforts is outside the scope of this paper. Compared with the EU, however, there is far less legal protection of online privacy in the U.S. EU law requires that data subjects be notified when PII is collected about them and the 2002 EU Directive extended the notice requirement to the attachment of cookies and other tracking mechanisms. In general, those attempting to use PII for purposes other than the transaction for which it was collected must obtain an affirmative opt-in from users according to EU law. Users living in EU member states are entitled to access to PII collected about them and have the right to participate in correcting mistakes. The EU does require that those that store and transmit PII use commercially reasonable means for maintaining confidentiality. Enforcement in the EU is accomplished through data protection commissions. The 2002 EU Directive builds on the protections provided for in the 1995 Information Directive. In the U.S. there have been several reform proposals tendered in Congress, but so far none has been enacted. The current comprehensive proposal for privacy, the Online Privacy Protection Act, if adopted would require U.S. based websites to incorporate most of the Fair Information Practices in their standard operating procedures. Many websites do have privacy policies that incorporate some of the FIPs, but for many other websites enactment of OPPA 14 would cause substantial changes in current commercial practices. The differing privacy laws create a dilemma for executives, managers and security professionals. When managers or Chief Privacy Officers produce website privacy policies that conform to the most restrictive online privacy laws, the organization is expected to adhere to those laws. However, it is expensive to comply with restrictive privacy laws and similarly, valuable marketing data may be lost to business rivals. Some policy analysts emphasize the importance of “ethics”, but recent Internet history and basic economy theory suggest that if there is a profit to be made by acquiring, storing or transmitting PII, someone will take advantage of the opportunity. Given the vastness of cyberspace, misuse of PII is often undetected. When organizations do engage in surreptitious behavior with regard to PII, consumers typically must rely on voluntary actions by non-profit, watchdog groups. It is the authors’ opinion that such reliance is not a viable safeguard against thousands of websites and online service providers, large and small, whose ethical commitments are attenuated because of profits considerations (i.e., if they do not do “it” others will and those others will become more profitable as a result). A topic for further research is an empirical investigation of whether the commercial practices of EU websites are significantly different from those of U.S. based websites. It is clear that there are substantially more guarantees for the privacy of PII in EU law, but whether those guarantees are evident in the practices of large and small websites is worthy of investigation. Once the 2002 Directive is implemented, we should see fewer EU based websites that do not have a hyperlink to their privacy policies on their home pages relative to U.S. based websites. Users dealing with websites subject to EU law should have more options with respect to the use of their PII, greater access and participation in correcting their files and other protections discussed above. Investigators in the legal/privacy field should have a keen interest in measuring the impact of the 2002 EU Directive on commercial practices of EU based websites. It could also be said that much of the difference between commercial practices in the U.S. and EU are attributable to the impact of the 1995 EU Information Directive. There is no doubt that the 1995 EU Information Directive caused major changes in the commercial practices of EU based collectors and transmitters of information, including websites, and through the Safe Harbor Principles commercial practices of U.S. firms have been impacted. Researchers in this area may have difficulty disentangling the effect of EU Directives because these directives have been foisted upon some U.S. firms through the Safe Harbor Principles. If OPPA is enacted into law, its effects should obliterate differences in commercial practices of U.S. and EU websites and online service providers, so perhaps longitudinal studies are appropriate. References (numbered by appearance) [1] 1-Ives, B. and Jarvenpaa, S.L. Applications of global information technology: Key issues for management. MIS Quarterly (Mar. 1991), 33-48. [2] 2-Milberg, S.J., H.J. Smith and S.J. Burke. Information Privacy: Corporate Management and National Regulation. Organization Science, Vol.11, No.1, January-February, pp.3557, 2000. [3] 3-Milberg et al 1995. [4] 4-Loring, T. An Analysis of the Informational Privacy Protection Afforded by the European Union and the United States. Texas International Law Journal, Spring 2002. [5] 5-Westin, A. Privacy and Freedom. Atheneum, New York, 1967. 15 [6] 6-Earp, J.B., A.I. Anton, L.Aiman-Smith and W. Stufflebeam. “Crossed Signals: What Users Really Want from Internet Privacy Policies.” The Academy of Management, August 1-6, 2003. [7] 7-Hofstede, G. Cultures and Organizations. McGraw-Hill, Berkshire, England, 1991. [8] 8-Dresner, S. Data protection roundup. Privacy Laws Bus. (U.K.) (33) January, pp 2-8, 1996. [9] 9-The Code of Fair Information Practices, U.S. Department of Health, Education and Welfare, Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers, and the Rights of Citizens, viii, http://www.epic.org/privacy/consumer/ code_fair_info.html, 1973. [10] 10-[OECD00] CDT’s Guide to Online Privacy: Privacy Basics: The OECD Guidelines, accessed on August 6, 2002 at http://www.cdt.org/privacy/guide/basic/oecdguidelines.html, 2000. [11] 11- Baumer, D.L., J.B. Earp, and P.S. Evers, Tit for Tat in Cyberspace: Consumer and Web Site Responses to Anarchy in the Market for Personal Information, Journal of Law and Technology, Vol. 4(2), 2003, pp: 217-274. [12] 12-Earp, J. B. and D.L. Baumer, Innovative Web Use to Learn about Consumer Behavior and Online Privacy, Communications of the ACM, Vol. 46 No. 4, 2003, pp: 8183 [13] 13-Volokh, 2000 [14] 14-Online Privacy Protection Testimony of FTC Commissioner Sheila F. Anthony Before the U.S. Senate Committee on Commerce, Science, and Transportation, May 25, 2000, located at: http://www.senate.gov/~commerce/hearings/0525ant.pdf. [15] 15-Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace, A Report to Congress, 2000. [16] 16-W.F. Adkinson, J.A. Eisenach and T.M. Lenard. Privacy online: A Report on the Information Practices and Policies of Commercial Web Sites. Washington, DC: Progress & Freedom Foundation, 2002. Downloaded July 18, 2003: http://www.pff.org/publications/privacyonlinefinalael.pdf. [17] 17-Baumer, Earp and Payton. ACM Computers and Society. 1 S. 2201, 107th Cong. . 2002. Chapter 1, Article 2(d) defines a “controller” as “the natural or legal person, public authority, agency or any other body which alone or with others determines the purposes and means of the processing of personal data. 3 Cite the AIDS blood case and the original Learned Hand case. 2 16