SlideShare a Scribd company logo
What’s Exciting in Privacy
Law?
What’s Exciting in Privacy Law?
First, let’s re-define the word
“exciting”
I: What is “Privacy”?
“The good news about privacy is that
eighty-four percent of us are concerned
about privacy. The bad news is that none
of us know what we mean.”
-Anne Branscomb
I: What is “Privacy”?
Are we referring to:
• The Need for Privacy?
• The Right of Privacy?
• The Invasion of Privacy?
• The Functions of Privacy?
• The Legal Protection of Privacy?
I: What is “Privacy”?
The Four Functions of Privacy (“Privacy and
Freedom”)
1. Personal Autonomy
2. Emotional Release
3. Self-Evaluation & Decision Making
4. Limited & Protected Communications
II: How Did We Get Here?
1791-1867 1910s 1940s 1960s
4th, 5th and
14th
Amendmen
ts
Federal Trade
Commission Act
UN Declaration on
Human Rights
London Installs CCTV
Surveillance in Train
Station
Griswold v.
Connecticut
Video Tape
Recorder
1970s 1980s 1990s
Fair Credit
Reporting
Act
Electronic
Communications
Privacy Act;
Telephone
Consumer
Protection Act;
Nat’l Do Not Call
Registry
Privacy Act,
Family
Educational
Rights &
Privacy Act
EU Data
Protection
Directive
HIPAA
Gramm-
Leach-
Bliley Act
Video
Privacy
Protection
Act
COPPA
2000s 2010s
E-
Governmen
t Act
1st Facial
Recognition
Database Available
to Law Enforcement
1st Data
Breach
Notification
Law
(California)
Consumer
Financial
Protection Act
EU Right to
be
Forgotten
CCPA
FTC Report
on Data
Brokers
II: Where Are We Now
1.Proposed U.S. federal privacy law
2.State-level privacy laws
3.GDPR and new EU Data Laws
II: Where Are We Now – U.S.
Federal
The American Data Privacy and Protection Act
• Applies to Businesses Subject to FTC, Common
Carriers & Non-Profits that “collects, processes, or
transfers covered data.”
• “Covered Data” includes data that can be linked to
a person or to a device that is then linkable to a
person
• Does NOT include “De-Identified Data”
• Creates Category for “Large Data Holders,” a.k.a.
Data Brokers
• Imposes stricter standards on data considered to
II: Where Are We Now – U.S.
Federal
The American Data Privacy and Protection Act
• Imposes various privacy and security
requirements
• Creates Consumer Data Rights similar to the
CCPA and GDPR
• Enforcement through the FTC/State Attorneys
General
• Limited and convoluted Private Right of Action
• Preemption of Numerous State-Level Laws
II: Where Are We Now – U.S.
States
II: Where Are We Now –
European Union
•GDPR
•Digital Markets Act
•Digital Services Act
IV: Is Anyone Getting This
Right?
It Depends
IV: Is Anyone Getting This
Right?
1. Sectoral Model vs. Comprehensive Model
2. Consumer-Focused vs. Business Friendly
3. Privacy Advocates vs. Big Tech vs.
Governments
IV: Is Anyone Getting This
Right?
3. Privacy Advocates vs. Big Tech vs.
Governments
V: Where Everyone is Getting it
Wrong
The Lie of “De-Identified” or “Anonymized”
Data
V: Where Everyone is Getting it
Wrong
The Lie of “De-Identified” or “Anonymized”
Data
Privacy Law is a Balancing Act
Legitimate
Business
Interest
Personal
Privacy
V: Where Everyone is Getting it
Wrong
The Lie of “De-Identified” or “Anonymized”
Data
Privacy Laws Assume:
1. Actual “De-Identification” is Possible
2. The Authors understand what Data Brokers
do
V: Where Everyone is Getting it
Wrong
It is STAGGERINGLY easy to “re-
Identify” data
•15 Data Points = 99.98% re-
identification accuracy
•Gender + DOB + Zip Code + Marital
Status = 95%
V: Where Everyone is Getting it
Wrong
V: Where Everyone is Getting it
Wrong
Data Brokers
•What Are They?
•Where/How Do They Get Their
(Your) Data?
The Case of Company 2
The Case of Company 2
• Only gets primary data from
commercial sources…
The Case of Company 2
• Only gets primary data from
commercial sources…
• But also buys data from Companies 5
and 9…
The Case of Company 2
• Only gets primary data from
commercial sources…
• But also buys data from Companies 5
and 9…
• Who also get primary data from public
and government sources…
The Case of Company 2
• Only gets primary data from
commercial sources…
• But also buys data from Companies 5
and 9…
• Who also get primary data from public
and government sources…
• And also buy data from Companies 1
and 8…
The Case of Company 2
• Only gets primary data from
commercial sources…
• But also buys data from Companies 5
and 9…
• Who also get primary data from public
and government sources…
• And also buy data from Companies 1
and 8…
• Who also get primary data from public
and government sources…
The Case of Company 2
• Only gets primary data from
commercial sources…
• But also buys data from Companies 5
and 9…
• Who also get primary data from public
and government sources…
• And also buy data from Companies 1
and 8…
• Who also get primary data from public
and government sources…
• And also buy data from Company 6…
V: Where Everyone is Getting it
Wrong
Data Brokers
•What Are They?
•Where/How Do They Get Their
(Your) Data?
•What Do They Do With Their (Your)
Data?
VI. Today’s Hot Topics
1. The Dobbs Decision – Privacy of people
seeking advice/information re: abortion
services
2. Consumer-Protection vs. Business Interests
3. Inferences and Algorithms
4. Phantom Collection – The Facebook Cookie
VII. The Future
1. Amount of data collected and analyzed by
businesses and government increases
exponentially
2. Erosion of Constitutional Privacy Protections
3. Biometric Policy Debate(s)
4. Quantum Computing (and all that stored data)
5. AI and Machine Learning Bias
6. Workplace/Productivity Monitoring
7. Any of about 50,000 other things…
What’s Exciting in Privacy Law?
Thank You
Brian Focht

More Related Content

Similar to What's Exciting in Privacy

The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsGabriella Razzano
 
International Anti-corruption day 2015 - Bribery Act 2010 presentation.
International Anti-corruption day 2015 - Bribery Act 2010 presentation.International Anti-corruption day 2015 - Bribery Act 2010 presentation.
International Anti-corruption day 2015 - Bribery Act 2010 presentation.Neil McGregor
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
Advanced Data Protection training for volunteers
Advanced Data Protection training for volunteersAdvanced Data Protection training for volunteers
Advanced Data Protection training for volunteers
Parkinson's UK
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...DDMA
 
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
Localogy
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
Joel A. Gómez Treviño
 
Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Freedom of Information, What do We Know?
Freedom of Information, What do We Know?
Kieran Lamb
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
IFLP
 
How to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policeHow to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy police
Paul Bradshaw
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
The Pathway Group
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
UBA-komitet
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
FLUZO
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
Ryland Sherman
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Parsons Behle & Latimer
 

Similar to What's Exciting in Privacy (20)

The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
 
International Anti-corruption day 2015 - Bribery Act 2010 presentation.
International Anti-corruption day 2015 - Bribery Act 2010 presentation.International Anti-corruption day 2015 - Bribery Act 2010 presentation.
International Anti-corruption day 2015 - Bribery Act 2010 presentation.
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Advanced Data Protection training for volunteers
Advanced Data Protection training for volunteersAdvanced Data Protection training for volunteers
Advanced Data Protection training for volunteers
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Freedom of Information, What do We Know?
Freedom of Information, What do We Know?
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
How to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policeHow to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy police
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?Privacy in the Workplace: How Much Snooping is Legal and Proper?
Privacy in the Workplace: How Much Snooping is Legal and Proper?
 

More from Brian Focht

ABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for Lawyers
ABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for LawyersABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for Lawyers
ABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for Lawyers
Brian Focht
 
ABA TECHSHOW 2016 - Beyond Baby Steps: Technology Infrastructure
ABA TECHSHOW 2016 - Beyond Baby Steps: Technology InfrastructureABA TECHSHOW 2016 - Beyond Baby Steps: Technology Infrastructure
ABA TECHSHOW 2016 - Beyond Baby Steps: Technology Infrastructure
Brian Focht
 
Enhanced Advocacy: Better Presentations Through Technology
Enhanced Advocacy: Better Presentations Through TechnologyEnhanced Advocacy: Better Presentations Through Technology
Enhanced Advocacy: Better Presentations Through Technology
Brian Focht
 
eDiscovery and Social Media: 2015 NCADA CLE Presentation
eDiscovery and Social Media: 2015 NCADA CLE PresentationeDiscovery and Social Media: 2015 NCADA CLE Presentation
eDiscovery and Social Media: 2015 NCADA CLE Presentation
Brian Focht
 
Net Neutrality: In Support of the 2015 Open Internet Order
Net Neutrality: In Support of the 2015 Open Internet OrderNet Neutrality: In Support of the 2015 Open Internet Order
Net Neutrality: In Support of the 2015 Open Internet Order
Brian Focht
 
2015 social media ethics cle
2015 social media ethics cle2015 social media ethics cle
2015 social media ethics cle
Brian Focht
 
Law Firms in a BYOD World
Law Firms in a BYOD WorldLaw Firms in a BYOD World
Law Firms in a BYOD World
Brian Focht
 
Ethics of Social Media, Part 5: Social Media as a Research Tool
Ethics of Social Media, Part 5: Social Media as a Research ToolEthics of Social Media, Part 5: Social Media as a Research Tool
Ethics of Social Media, Part 5: Social Media as a Research Tool
Brian Focht
 
Ethics of Social Media Part 4: Social Media in Discovery
Ethics of Social Media Part 4: Social Media in DiscoveryEthics of Social Media Part 4: Social Media in Discovery
Ethics of Social Media Part 4: Social Media in Discovery
Brian Focht
 
Ethics of Social Media Part 3: Personal Use of Social Media
Ethics of Social Media Part 3: Personal Use of Social MediaEthics of Social Media Part 3: Personal Use of Social Media
Ethics of Social Media Part 3: Personal Use of Social Media
Brian Focht
 
The Ethics of Social Media Part 2: Marketing Your Law Practice
The Ethics of Social Media Part 2: Marketing Your Law PracticeThe Ethics of Social Media Part 2: Marketing Your Law Practice
The Ethics of Social Media Part 2: Marketing Your Law Practice
Brian Focht
 
The Ethics of Social Media Part 1: Social Is Necessary
The Ethics of Social Media Part 1: Social Is NecessaryThe Ethics of Social Media Part 1: Social Is Necessary
The Ethics of Social Media Part 1: Social Is Necessary
Brian Focht
 

More from Brian Focht (12)

ABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for Lawyers
ABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for LawyersABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for Lawyers
ABA TECHSHOW 2016 - Common Grounds: 60 Android and iOS Apps for Lawyers
 
ABA TECHSHOW 2016 - Beyond Baby Steps: Technology Infrastructure
ABA TECHSHOW 2016 - Beyond Baby Steps: Technology InfrastructureABA TECHSHOW 2016 - Beyond Baby Steps: Technology Infrastructure
ABA TECHSHOW 2016 - Beyond Baby Steps: Technology Infrastructure
 
Enhanced Advocacy: Better Presentations Through Technology
Enhanced Advocacy: Better Presentations Through TechnologyEnhanced Advocacy: Better Presentations Through Technology
Enhanced Advocacy: Better Presentations Through Technology
 
eDiscovery and Social Media: 2015 NCADA CLE Presentation
eDiscovery and Social Media: 2015 NCADA CLE PresentationeDiscovery and Social Media: 2015 NCADA CLE Presentation
eDiscovery and Social Media: 2015 NCADA CLE Presentation
 
Net Neutrality: In Support of the 2015 Open Internet Order
Net Neutrality: In Support of the 2015 Open Internet OrderNet Neutrality: In Support of the 2015 Open Internet Order
Net Neutrality: In Support of the 2015 Open Internet Order
 
2015 social media ethics cle
2015 social media ethics cle2015 social media ethics cle
2015 social media ethics cle
 
Law Firms in a BYOD World
Law Firms in a BYOD WorldLaw Firms in a BYOD World
Law Firms in a BYOD World
 
Ethics of Social Media, Part 5: Social Media as a Research Tool
Ethics of Social Media, Part 5: Social Media as a Research ToolEthics of Social Media, Part 5: Social Media as a Research Tool
Ethics of Social Media, Part 5: Social Media as a Research Tool
 
Ethics of Social Media Part 4: Social Media in Discovery
Ethics of Social Media Part 4: Social Media in DiscoveryEthics of Social Media Part 4: Social Media in Discovery
Ethics of Social Media Part 4: Social Media in Discovery
 
Ethics of Social Media Part 3: Personal Use of Social Media
Ethics of Social Media Part 3: Personal Use of Social MediaEthics of Social Media Part 3: Personal Use of Social Media
Ethics of Social Media Part 3: Personal Use of Social Media
 
The Ethics of Social Media Part 2: Marketing Your Law Practice
The Ethics of Social Media Part 2: Marketing Your Law PracticeThe Ethics of Social Media Part 2: Marketing Your Law Practice
The Ethics of Social Media Part 2: Marketing Your Law Practice
 
The Ethics of Social Media Part 1: Social Is Necessary
The Ethics of Social Media Part 1: Social Is NecessaryThe Ethics of Social Media Part 1: Social Is Necessary
The Ethics of Social Media Part 1: Social Is Necessary
 

Recently uploaded

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 

Recently uploaded (20)

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 

What's Exciting in Privacy

  • 1.
  • 2. What’s Exciting in Privacy Law?
  • 3. What’s Exciting in Privacy Law? First, let’s re-define the word “exciting”
  • 4. I: What is “Privacy”? “The good news about privacy is that eighty-four percent of us are concerned about privacy. The bad news is that none of us know what we mean.” -Anne Branscomb
  • 5. I: What is “Privacy”? Are we referring to: • The Need for Privacy? • The Right of Privacy? • The Invasion of Privacy? • The Functions of Privacy? • The Legal Protection of Privacy?
  • 6. I: What is “Privacy”? The Four Functions of Privacy (“Privacy and Freedom”) 1. Personal Autonomy 2. Emotional Release 3. Self-Evaluation & Decision Making 4. Limited & Protected Communications
  • 7. II: How Did We Get Here?
  • 8. 1791-1867 1910s 1940s 1960s 4th, 5th and 14th Amendmen ts Federal Trade Commission Act UN Declaration on Human Rights London Installs CCTV Surveillance in Train Station Griswold v. Connecticut Video Tape Recorder
  • 9. 1970s 1980s 1990s Fair Credit Reporting Act Electronic Communications Privacy Act; Telephone Consumer Protection Act; Nat’l Do Not Call Registry Privacy Act, Family Educational Rights & Privacy Act EU Data Protection Directive HIPAA Gramm- Leach- Bliley Act Video Privacy Protection Act COPPA
  • 10. 2000s 2010s E- Governmen t Act 1st Facial Recognition Database Available to Law Enforcement 1st Data Breach Notification Law (California) Consumer Financial Protection Act EU Right to be Forgotten CCPA FTC Report on Data Brokers
  • 11. II: Where Are We Now 1.Proposed U.S. federal privacy law 2.State-level privacy laws 3.GDPR and new EU Data Laws
  • 12. II: Where Are We Now – U.S. Federal The American Data Privacy and Protection Act • Applies to Businesses Subject to FTC, Common Carriers & Non-Profits that “collects, processes, or transfers covered data.” • “Covered Data” includes data that can be linked to a person or to a device that is then linkable to a person • Does NOT include “De-Identified Data” • Creates Category for “Large Data Holders,” a.k.a. Data Brokers • Imposes stricter standards on data considered to
  • 13. II: Where Are We Now – U.S. Federal The American Data Privacy and Protection Act • Imposes various privacy and security requirements • Creates Consumer Data Rights similar to the CCPA and GDPR • Enforcement through the FTC/State Attorneys General • Limited and convoluted Private Right of Action • Preemption of Numerous State-Level Laws
  • 14. II: Where Are We Now – U.S. States
  • 15. II: Where Are We Now – European Union •GDPR •Digital Markets Act •Digital Services Act
  • 16. IV: Is Anyone Getting This Right? It Depends
  • 17. IV: Is Anyone Getting This Right? 1. Sectoral Model vs. Comprehensive Model 2. Consumer-Focused vs. Business Friendly 3. Privacy Advocates vs. Big Tech vs. Governments
  • 18. IV: Is Anyone Getting This Right? 3. Privacy Advocates vs. Big Tech vs. Governments
  • 19. V: Where Everyone is Getting it Wrong The Lie of “De-Identified” or “Anonymized” Data
  • 20. V: Where Everyone is Getting it Wrong The Lie of “De-Identified” or “Anonymized” Data Privacy Law is a Balancing Act Legitimate Business Interest Personal Privacy
  • 21. V: Where Everyone is Getting it Wrong The Lie of “De-Identified” or “Anonymized” Data Privacy Laws Assume: 1. Actual “De-Identification” is Possible 2. The Authors understand what Data Brokers do
  • 22. V: Where Everyone is Getting it Wrong It is STAGGERINGLY easy to “re- Identify” data •15 Data Points = 99.98% re- identification accuracy •Gender + DOB + Zip Code + Marital Status = 95%
  • 23. V: Where Everyone is Getting it Wrong
  • 24. V: Where Everyone is Getting it Wrong Data Brokers •What Are They? •Where/How Do They Get Their (Your) Data?
  • 25.
  • 26.
  • 27.
  • 28. The Case of Company 2
  • 29. The Case of Company 2 • Only gets primary data from commercial sources…
  • 30. The Case of Company 2 • Only gets primary data from commercial sources… • But also buys data from Companies 5 and 9…
  • 31. The Case of Company 2 • Only gets primary data from commercial sources… • But also buys data from Companies 5 and 9… • Who also get primary data from public and government sources…
  • 32. The Case of Company 2 • Only gets primary data from commercial sources… • But also buys data from Companies 5 and 9… • Who also get primary data from public and government sources… • And also buy data from Companies 1 and 8…
  • 33. The Case of Company 2 • Only gets primary data from commercial sources… • But also buys data from Companies 5 and 9… • Who also get primary data from public and government sources… • And also buy data from Companies 1 and 8… • Who also get primary data from public and government sources…
  • 34. The Case of Company 2 • Only gets primary data from commercial sources… • But also buys data from Companies 5 and 9… • Who also get primary data from public and government sources… • And also buy data from Companies 1 and 8… • Who also get primary data from public and government sources… • And also buy data from Company 6…
  • 35. V: Where Everyone is Getting it Wrong Data Brokers •What Are They? •Where/How Do They Get Their (Your) Data? •What Do They Do With Their (Your) Data?
  • 36. VI. Today’s Hot Topics 1. The Dobbs Decision – Privacy of people seeking advice/information re: abortion services 2. Consumer-Protection vs. Business Interests 3. Inferences and Algorithms 4. Phantom Collection – The Facebook Cookie
  • 37. VII. The Future 1. Amount of data collected and analyzed by businesses and government increases exponentially 2. Erosion of Constitutional Privacy Protections 3. Biometric Policy Debate(s) 4. Quantum Computing (and all that stored data) 5. AI and Machine Learning Bias 6. Workplace/Productivity Monitoring 7. Any of about 50,000 other things…
  • 38. What’s Exciting in Privacy Law? Thank You Brian Focht