SlideShare a Scribd company logo
Review of privacy and data
issues
Emily Shaw
National Policy Manager, Sunlight Foundation
4th Amendment + technology = ?
• Riley v. California (2014) – physically locked on phone, but accessible
via cloud or electronic communications service?
• Parallel construction and law enforcement use of NSA-collected data
• US v. Jones (2012) – GPS on car, but uninstalled techniques?
• ACLU study found that 237 of 250 surveyed PDs track cellphones, mostly
without warrants
Main 4th Am & data privacy issue areas
1. Collection of new data – what are limits on new
surveillance tools?
2. Access to existing data – what are the standards for
protection?
1. New Surveillance Tools
• Automated License Plate Readers
• Stingray Tracking Devices
• Arial surveillance – known and unknown
• Sensor networks
• Public
• Public-private
Automatic License Plate Readers (ALPRs)
• Used regularly around the country, some states are restricting
• Where FOIA-able, can be used to track police behavior
• Not just photographing license plates – car occupants are also
subjects
Stingray Cellphone Tracking Devices
• Can collect phone ID, numbers dialed and
previous location (e.g., last tower)
• Used by at least 48 state and local PDs, but full
scale of adoption is not known (DC, Fairfax,
Montgomery County all have)
• Judges have been unfamiliar with tech and
unintentionally authorized
• LE often uses without explicit authorization,
though recent legal pushback
• 10 states now require warrants (yes MD, no VA)
Arial surveillance
• 13 states regulate drone use as of end of 2014 session but generally
exempt law enforcement. Local law enforcement use of drones is
mainly unregulated.
• Using technology developed for the war in Iraq, manned surveillance
planes like Persistent Surveillance Systems have been seeking
contracts with local law enforcement.
Sensor systems
• Public sensor systems: New York’s Domain Awareness System,
Chicago downtown public sensor array
• Contracted sensor systems: ShotSpotter, persistent sound recording in
over 60 US cities (as in DC, below)
• Public-private connected systems: Oakland’s Domain Awareness
Center (now reduced in scope)
What next?
• ACLU keeping track of emerging issues
2. Privacy-based limits on access to existing
data
• Government data: 1974 Privacy Act (& FIPs), HIPAA/FERPA,
state variation
• Privately-held data: Electronic Communications Privacy Act
Elements of government data protection
• “Personally Identifiable Information” (PII) or “Personal Health
Information” (PHI) protection – e.g., field elimination/transformation
• HIPAA Safe Harbor standard – removal of 18 fields
• 1974 Privacy Act identified the SSN as private data for all
governments
• Privacy Act also mandates that federal agencies provide you access to
data about you held within a “system of records” and to produce
“system of record notices” (SORNs); supposed to limit sharing.
• All privacy laws have a number of exceptions
“Notice and Consent” –
Fair Information Practices principles
• There must be no personal data record-keeping system whose very
existence is secret.
• There must be a way for an individual to find out what information about
him is in a record and how it is used.
• There must be a way for an individual to prevent information about him
that was obtained for one purpose from being used or made available for
other purposes without his consent.
• There must be a way for an individual to correct or amend a record of
identifiable information about him.
• Any organization creating, maintaining, using, or disseminating records of
identifiable personal data must assure the reliability of the data for their
intended use and must take precaution to prevent misuse of the data.
Electronic Communications Privacy Act
• Federal ECPA (1986) required law enforcement to get a warrant for
individuals’ email, unless it was stored on a third-party server for over
180 days.
• Under current technological practice, this leaves out most email.
• Federal efforts to reform have not been successful so far. Current
efforts: LEADS and ECPA Amendments Acts.
• Digital Due Process Principles created by broad coalition
• Maine and Texas have passed a form of improved ECPA and California,
Montana and Maryland currently considering bills
But what about benefits?
Privacy and Data-Sharing for Public Good
• Federal laws like HIPAA and FERPA, and a patchwork of varying state
laws, regularly limit inter-agency data-sharing
There are
two main
possibilities.
1. Keep it restricted.
Share private data within trusted partnerships, using:
• Exceptions for law enforcement
• Exceptions for improvement of a public service
• Exceptions for research to benefit the public
• Legal Mechanisms:
• Memorandums of Understanding
• Statutory change
• Other important elements:
• IRBs
• Social trust
2. Take out the restricted parts!
• Aggregation or anonymization
• Always a balance between privacy and data utility, but an evolving
area
If you like microdata, know your PII
• Rule for open data folks: Know your PII. There are at least 4 kinds:
1. Unintentional PII (legally shouldn’t be there, but it is)
2. Unnecessary PII (doesn’t need to be there, but it is)
3. Necessary PII (needs to be there)
4. Legally-identified information
• Know your rights to legally-identified info. Know to ask for
redaction of unnecessary PII. Know to seek better controls for
unintentional PII.
The Future! Exciting upcoming
surveillance/public access/privacy issues!
• Police body camera data
• Government relationships with third-party shared location data –
Google, Waze
• Public service location data - Metrocards, EZ Pass (recent example of
Christie’s political use of opponent’s EZ Pass data.)

More Related Content

PPT
Chapter2
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PPTX
Presentation on Information Privacy
PPTX
Data Privacy for Information Security Professionals Part 1
PDF
Privacy and Data Security
PPT
Privacy and personal information
PPSX
Otieno antony rethinking internet shutdown
PDF
Data Protection and IDEA
Chapter2
Technology Law: Regulations on the Internet and Emerging Technologies
Presentation on Information Privacy
Data Privacy for Information Security Professionals Part 1
Privacy and Data Security
Privacy and personal information
Otieno antony rethinking internet shutdown
Data Protection and IDEA

What's hot (19)

PPTX
Information Privacy
PPT
Personal privacy and computer technologies
PPT
Privacy and Data Security: Risk Management and Avoidance
PPTX
Balancing Privacy and Digitization
PPTX
Information Privacy
PPTX
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
PDF
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
PPTX
Intellectual Property in Cyberspace
PPT
Com Tech Research Project
PPT
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
Protection of Personal Information
PDF
Ethics in Technology - Privacy
PPTX
Clyrofor popia readiness webinar
PPTX
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
PPTX
A Case Study on Issues and Violations on Information Technology
PPTX
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
PPTX
Strong Host Security Policies are Good Business
PDF
Legal and privacy implications of IoT
Information Privacy
Personal privacy and computer technologies
Privacy and Data Security: Risk Management and Avoidance
Balancing Privacy and Digitization
Information Privacy
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
Intellectual Property in Cyberspace
Com Tech Research Project
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Unit 6 Privacy and Data Protection 8 hr
Protection of Personal Information
Ethics in Technology - Privacy
Clyrofor popia readiness webinar
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
A Case Study on Issues and Violations on Information Technology
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
Strong Host Security Policies are Good Business
Legal and privacy implications of IoT
Ad

Viewers also liked (20)

PPTX
Third Party Use of Legislative Data - Presentation for NCSL-NALIT
PDF
EXCLUSIVE BANK PROGRAM
PPTX
Service Recovery; A 2nd Chance to Make a Good 1st Impression.
PPTX
DACS - The Internet of Things (IoT)
PPTX
What lets open data have impact
PPTX
Transparency: how do I do it?
PPT
WorkWatcher Prezentacja01
PDF
Natural new ingredients. - Free Online Library
PDF
The Control of Media & Devices in an Internet of Things (IoT)
PPTX
"7 Slight Edges to Keeping Your Customers"
PPTX
Thursday mass
PDF
Hair care: new ingredients. - Free Online Library
PDF
Nationwide Investment Group LLC
PDF
NBMOTIVATIONBOTS
PPT
PPTX
Emiliagomez Trabajo Final
DOC
De an-tuyen-sinh-dh-dan-lap-hai-phong
DOCX
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
PPTX
Greece bailout impact on world economies animation based
PPS
Trabajo práctico n°1
Third Party Use of Legislative Data - Presentation for NCSL-NALIT
EXCLUSIVE BANK PROGRAM
Service Recovery; A 2nd Chance to Make a Good 1st Impression.
DACS - The Internet of Things (IoT)
What lets open data have impact
Transparency: how do I do it?
WorkWatcher Prezentacja01
Natural new ingredients. - Free Online Library
The Control of Media & Devices in an Internet of Things (IoT)
"7 Slight Edges to Keeping Your Customers"
Thursday mass
Hair care: new ingredients. - Free Online Library
Nationwide Investment Group LLC
NBMOTIVATIONBOTS
Emiliagomez Trabajo Final
De an-tuyen-sinh-dh-dan-lap-hai-phong
chỗ nào dịch vụ giúp việc theo tháng chất lượng cao tại tphcm
Greece bailout impact on world economies animation based
Trabajo práctico n°1
Ad

Similar to Current Privacy and Data Issues (for people who care about open data!) (20)

PPTX
4-Privacy1.pptx
PPT
NYCLA Privacy CLE_october_1_2014_presentation
PPTX
Privacy and the Government
PPT
ethcpp04-Unit 3.ppt
PPTX
After 9 11
PPT
Privacy And Surveillance
PPT
ethcpp04-Unit 3.ppt
PPSX
How Will Privacy Regulation Impact Your Business in 2012
PPT
Privacy in the age of anti-terrorism
PPTX
Niso library law
PPT
Getting the social side of pervasive computing right
PPT
CSI 2008, Legal Developments In Security and Privacy Law
PPT
Monitoring and controlling the Internet
PPTX
Poliy Debate topic analysis 15 16-bg
PPTX
Multimedia Privacy
PDF
MEALEY'S Data Privacy Law Report Sample Issue May 2015
PDF
Ethics in Information Technology - Privacy
PPTX
American Privacy: A History of the Right to Privacy in the United States
PDF
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
PDF
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
4-Privacy1.pptx
NYCLA Privacy CLE_october_1_2014_presentation
Privacy and the Government
ethcpp04-Unit 3.ppt
After 9 11
Privacy And Surveillance
ethcpp04-Unit 3.ppt
How Will Privacy Regulation Impact Your Business in 2012
Privacy in the age of anti-terrorism
Niso library law
Getting the social side of pervasive computing right
CSI 2008, Legal Developments In Security and Privacy Law
Monitoring and controlling the Internet
Poliy Debate topic analysis 15 16-bg
Multimedia Privacy
MEALEY'S Data Privacy Law Report Sample Issue May 2015
Ethics in Information Technology - Privacy
American Privacy: A History of the Right to Privacy in the United States
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Monthly Chronicles - July 2025
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Current Privacy and Data Issues (for people who care about open data!)

  • 1. Review of privacy and data issues Emily Shaw National Policy Manager, Sunlight Foundation
  • 2. 4th Amendment + technology = ? • Riley v. California (2014) – physically locked on phone, but accessible via cloud or electronic communications service? • Parallel construction and law enforcement use of NSA-collected data • US v. Jones (2012) – GPS on car, but uninstalled techniques? • ACLU study found that 237 of 250 surveyed PDs track cellphones, mostly without warrants
  • 3. Main 4th Am & data privacy issue areas 1. Collection of new data – what are limits on new surveillance tools? 2. Access to existing data – what are the standards for protection?
  • 4. 1. New Surveillance Tools • Automated License Plate Readers • Stingray Tracking Devices • Arial surveillance – known and unknown • Sensor networks • Public • Public-private
  • 5. Automatic License Plate Readers (ALPRs) • Used regularly around the country, some states are restricting • Where FOIA-able, can be used to track police behavior • Not just photographing license plates – car occupants are also subjects
  • 6. Stingray Cellphone Tracking Devices • Can collect phone ID, numbers dialed and previous location (e.g., last tower) • Used by at least 48 state and local PDs, but full scale of adoption is not known (DC, Fairfax, Montgomery County all have) • Judges have been unfamiliar with tech and unintentionally authorized • LE often uses without explicit authorization, though recent legal pushback • 10 states now require warrants (yes MD, no VA)
  • 7. Arial surveillance • 13 states regulate drone use as of end of 2014 session but generally exempt law enforcement. Local law enforcement use of drones is mainly unregulated. • Using technology developed for the war in Iraq, manned surveillance planes like Persistent Surveillance Systems have been seeking contracts with local law enforcement.
  • 8. Sensor systems • Public sensor systems: New York’s Domain Awareness System, Chicago downtown public sensor array • Contracted sensor systems: ShotSpotter, persistent sound recording in over 60 US cities (as in DC, below) • Public-private connected systems: Oakland’s Domain Awareness Center (now reduced in scope)
  • 9. What next? • ACLU keeping track of emerging issues
  • 10. 2. Privacy-based limits on access to existing data • Government data: 1974 Privacy Act (& FIPs), HIPAA/FERPA, state variation • Privately-held data: Electronic Communications Privacy Act
  • 11. Elements of government data protection • “Personally Identifiable Information” (PII) or “Personal Health Information” (PHI) protection – e.g., field elimination/transformation • HIPAA Safe Harbor standard – removal of 18 fields • 1974 Privacy Act identified the SSN as private data for all governments • Privacy Act also mandates that federal agencies provide you access to data about you held within a “system of records” and to produce “system of record notices” (SORNs); supposed to limit sharing. • All privacy laws have a number of exceptions
  • 12. “Notice and Consent” – Fair Information Practices principles • There must be no personal data record-keeping system whose very existence is secret. • There must be a way for an individual to find out what information about him is in a record and how it is used. • There must be a way for an individual to prevent information about him that was obtained for one purpose from being used or made available for other purposes without his consent. • There must be a way for an individual to correct or amend a record of identifiable information about him. • Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precaution to prevent misuse of the data.
  • 13. Electronic Communications Privacy Act • Federal ECPA (1986) required law enforcement to get a warrant for individuals’ email, unless it was stored on a third-party server for over 180 days. • Under current technological practice, this leaves out most email. • Federal efforts to reform have not been successful so far. Current efforts: LEADS and ECPA Amendments Acts. • Digital Due Process Principles created by broad coalition • Maine and Texas have passed a form of improved ECPA and California, Montana and Maryland currently considering bills
  • 14. But what about benefits? Privacy and Data-Sharing for Public Good • Federal laws like HIPAA and FERPA, and a patchwork of varying state laws, regularly limit inter-agency data-sharing There are two main possibilities.
  • 15. 1. Keep it restricted. Share private data within trusted partnerships, using: • Exceptions for law enforcement • Exceptions for improvement of a public service • Exceptions for research to benefit the public • Legal Mechanisms: • Memorandums of Understanding • Statutory change • Other important elements: • IRBs • Social trust
  • 16. 2. Take out the restricted parts! • Aggregation or anonymization • Always a balance between privacy and data utility, but an evolving area
  • 17. If you like microdata, know your PII • Rule for open data folks: Know your PII. There are at least 4 kinds: 1. Unintentional PII (legally shouldn’t be there, but it is) 2. Unnecessary PII (doesn’t need to be there, but it is) 3. Necessary PII (needs to be there) 4. Legally-identified information • Know your rights to legally-identified info. Know to ask for redaction of unnecessary PII. Know to seek better controls for unintentional PII.
  • 18. The Future! Exciting upcoming surveillance/public access/privacy issues! • Police body camera data • Government relationships with third-party shared location data – Google, Waze • Public service location data - Metrocards, EZ Pass (recent example of Christie’s political use of opponent’s EZ Pass data.)