<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Data law bytes</title>
    <link>https://datalawbytes.xyz/</link>
    <description>A law student’s journey navigating privacy laws and data protection, one byte at a time.</description>
    <pubDate>Fri, 01 May 2026 00:54:26 +0000</pubDate>
    <item>
      <title>A patchwork of acts</title>
      <link>https://datalawbytes.xyz/a-patchwork-of-acts?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Current privacy laws developed as responses to sector-specific concerns.!--more-- The United States operates from a patchwork of federal and state laws, budded in common-law doctrines. It’s from this jigsaw framework that we have our current data privacy regulations.&#xA;&#xA;aThe list/a&#xA;In alphabetical order, the following is a list of some laws that protect privacy in the U.S.&#xA;&#xA;The Children’s Online Privacy Protection Act (“p class=&#34;small&#34;coppa/p”)span style=&#34;color:#069&#34;/span of 1998 protects information collected from children over the internet. “Children” is defined as persons under 13. Websites that collect such information must&#xA;    notify parents of information practices;&#xA;    obtain verifiable parental consent for the collection, use, or disclosure of children’s personal information;&#xA;    let parents prevent further maintenance, use, or future collection of their child’s personal information;&#xA;    provide parents access to their child’s personal information;&#xA;    not require a child to provide more personal information than is reasonably necessary to participate in an activity; and&#xA;    maintain reasonable procedures to protect the confidentiality, security, and integrity of the personal information.&#xA;The Computer Fraud and Abuse Act (“p class=&#34;small&#34;cfaa/p”)span style=&#34;color:#069&#34;/span of 1984 “prohibits intentionally accessing a computer without authorization or in excess of authorization,” meaning you can’t access data in a computer beyond what you’re allowed. One example could be illegally gaining access to a computer. However, this act also prevents users who are authorized to access a computer from obtaining information to which they aren’t authorized on that computer.&#xA;The Controlling the Assault of Non-Solicited Pornography and Marketing (“p class=&#34;small&#34;can-spam/p”)span style=&#34;color:#069&#34;/span Act of 2003 regulates who can send unsolicited commercial email. A permitted commercial email must include the following: accurate and non-misleading routing and heading information (i.e., “From,” “To,” and “Reply to” fields), a subject line that’s non-deceptive, and a notice to the recipient of the email providing the right to opt out. (The law, though, doesn’t state where the notice must appear; it merely states that it must be clear and conspicuous so that the recipient need not search for it.) Also required are: an internet-based opt-out mechanism capable of receiving opt-out requests; a clear identification that the email is an advertisement or solicitation (note: this requirement isn’t applicable if the sender is given the recipient’s consent to send such an email); and the sender’s physical mailing address.&#xA;The Electronic Communications Privacy Act (“p class=&#34;small&#34;ecpa/p”)span style=&#34;color:#069&#34;/span of 1986 updates the Federal Wiretap Act of 1968 to include protection of not only telephone communications but also “computer and other digital and electronic communications.”&#xA;The Fair Credit Report Act (“p class=&#34;small&#34;fcra/p”)span style=&#34;color:#069&#34;/span of 1970 applies to consumer reporting agencies and the reports generated to consumers regarding their credit reports and activity.&#xA;The Family Educational Rights and Privacy Act (“p class=&#34;small&#34;ferpa/p”)span style=&#34;color:#069&#34;/span of 1974 “protects the privacy of student education records.”&#xA;The Federal Trade Commission Act (“p class=&#34;small&#34;ftc/p Act”)span style=&#34;color:#069&#34;/span of 1914 prohibits unfair or deceptive practices and has been applied to offline and online privacy and data security policies.&#xA;The Health Insurance Portability and Accountability Act (“p class=&#34;small&#34;hipaa/p”)span style=&#34;color:#069&#34;/span of 1996 governs individuals’ health information. p class=&#34;small&#34;hipaa/p also revised the Security Breach Notification Rule, which requires covered entities to provide notice of breach of protected health information.span style=&#34;color:#069&#34;/span&amp;transitionType=Default&amp;firstPage=true)&#xA;The Gramm–Leach–Bliley Act (“p class=&#34;small&#34;glba/p”)span style=&#34;color:#069&#34;/span of 1999 was enacted to regulate the collection, use, and disclosure of financial information. It applies to personal information collected by financial institutions for financial products and services.span style=&#34;color:#069&#34;/span&amp;transitionType=Default&amp;firstPage=true)&#xA;The Telephone Consumer Protection Act (“p class=&#34;small&#34;tcpa/p”)span style=&#34;color:#069&#34;/span of 1991 limits robocalls--though additional limits can’t hurt. Generally, these callers can’t do the following:&#xA;    “call before 8 a.m. or after 9 p.m.”;&#xA;    call if you’ve chosen to opt out of calls from that specific caller or if you’ve added your name to the Do Not Call List,&#xA;    send unsolicited fax messages to your home or office (yes, some people and places still send faxes (e.g., law firms)); and&#xA;    “refuse to provide their name, the name of the person or organization on whose behalf they are calling, and contact information for that person or organization.”&#xA;&#xA;On the state side, California was the first state to enact a security breach notification law. To date, forty-eight states have enacted their own laws that notify users of a data breach.span style=&#34;color:#069&#34;/span&amp;transitionType=Default&amp;firstPage=true) With California as a main hub for technology innovation, it’s little surprise to see California as the first state to issue a law that, on its face, deals with the collection of digital information. The California Consumer Privacy Act (“p class=&#34;small&#34;ccpa/p”),span style=&#34;color:#069&#34;/span which strongly resembles the p class=&#34;small&#34;gdpr/p, was passed in 2018 and went into effect in 2020. Significant takeaways are that consumers in the state of California now have the right to request the deletion of their data, so long as other laws are not affected by this request; businesses are required to disclose how information is collected and shared; and consumers have the right to instruct a company not to sell their information.&#xA;&#xA;Works cited&#xA;The California Consumer Privacy Act, California Civil Code § 1798.100 (2018).span style=&#34;color:#069&#34;/span&#xA;The Children&#39;s Online Privacy Protection Act, 15 U.S.C. §§ 6501-6506 (1998).span style=&#34;color:#069&#34;/span&#xA;The Computer Fraud and Abuse Act, 18 USC § 1030 (1984).span style=&#34;color:#069&#34;/span&#xA;The Controlling the Assault of Non-Solicited Pornography and Marketing Act, 15 U.S.C. §§ 7701-7713 (2003).span style=&#34;color:#069&#34;/span&#xA;The Electronic Communications Privacy Act, 18 USC § 2510 (1986).span style=&#34;color:#069&#34;/span&#xA;The Fair Credit Report Act, 15 U.S.C. § 1681 (1970).span style=&#34;color:#069&#34;/span&#xA;The Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g (1974).span style=&#34;color:#069&#34;/span of 1974 &#34;protects the privacy of student education records.&#34;&#xA;The Federal Trade Commission Act, 15 U.S.C. §§ 41-58 (1914).span style=&#34;color:#069&#34;/span&#xA;The Gramm–Leach–Bliley Act, 15 USC §§ 6801-6827 (1999).span style=&#34;color:#069&#34;/span&#xA;The Health Insurance Portability and Accountability Act, 110 Stat. 1936 (1996).span style=&#34;color:#069&#34;/span&#xA;Kerry, Cameron F.: “Filling the gaps in US data privacy laws,” Brookings (2008).span style=&#34;color:#069&#34;/span&#xA;Jolly, Ieuan: “Data protection in the United States: overview,” Loeb &amp; Loeb LLP (2008).span style=&#34;color:#069&#34;/span&amp;transitionType=Default&amp;firstPage=true)&#xA;The Telephone Consumer Protection Act, 47 U.S.C. § 227 et seq. (1991).span style=&#34;color:#069&#34;*/span]]&gt;</description>
      <content:encoded><![CDATA[<p>Current privacy laws developed as responses to sector-specific concerns. The United States operates from a patchwork of federal and state laws, budded in common-law doctrines. It’s from this jigsaw framework that we have our current data privacy regulations.</p>

<h3 id="a-the-list-a" id="a-the-list-a">The list</h3>

<p>In alphabetical order, the following is a list of some laws that protect privacy in the U.S.</p>
<ul><li>The <a href="https://www.ftc.gov/enforcement/statutes/childrens-online-privacy-protection-act" rel="nofollow">Children’s Online Privacy Protection Act (“<p class="small">coppa</p>”)<span style="color:#069">*</span></a> of 1998 protects information collected from children over the internet. “Children” is defined as persons under 13. Websites that collect such information must
<ul><li>notify parents of information practices;</li>
<li>obtain verifiable parental consent for the collection, use, or disclosure of children’s personal information;</li>
<li>let parents prevent further maintenance, use, or future collection of their child’s personal information;</li>
<li>provide parents access to their child’s personal information;</li>
<li>not require a child to provide more personal information than is reasonably necessary to participate in an activity; and</li>
<li>maintain reasonable procedures to protect the confidentiality, security, and integrity of the personal information.</li></ul></li>
<li>The <a href="https://www.nacdl.org/Landing/ComputerFraudandAbuseAct" rel="nofollow">Computer Fraud and Abuse Act (“<p class="small">cfaa</p>”)<span style="color:#069">*</span></a> of 1984 “prohibits intentionally accessing a computer without authorization or in excess of authorization,” meaning you can’t access data in a computer beyond what you’re allowed. One example could be illegally gaining access to a computer. However, this act also prevents users who are authorized to access a computer from obtaining information to which they <em>aren’t</em> authorized on that computer.</li>
<li>The <a href="https://www.ftc.gov/enforcement/statutes/controlling-assault-non-solicited-pornography-marketing-act-2003-can-spam-act" rel="nofollow">Controlling the Assault of Non-Solicited Pornography and Marketing (“<p class="small">can-spam</p>”)<span style="color:#069">*</span></a> Act of 2003 regulates who can send unsolicited commercial email. A permitted commercial email must include the following: accurate and non-misleading routing and heading information (i.e., “From,” “To,” and “Reply to” fields), a subject line that’s non-deceptive, and a notice to the recipient of the email providing the right to opt out. (The law, though, doesn’t state where the notice must appear; it merely states that it must be clear and conspicuous so that the recipient need not search for it.) Also required are: an internet-based opt-out mechanism capable of receiving opt-out requests; a clear identification that the email is an advertisement or solicitation (note: this requirement isn’t applicable if the sender is given the recipient’s consent to send such an email); and the sender’s physical mailing address.</li>
<li>The <a href="https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1285" rel="nofollow">Electronic Communications Privacy Act (“<p class="small">ecpa</p>”)<span style="color:#069">*</span></a> of 1986 updates the Federal Wiretap Act of 1968 to include protection of not only telephone communications but also “computer and other digital and electronic communications.”</li>
<li>The <a href="https://www.ftc.gov/enforcement/statutes/fair-credit-reporting-act" rel="nofollow">Fair Credit Report Act (“<p class="small">fcra</p>”)<span style="color:#069">*</span></a> of 1970 applies to consumer reporting agencies and the reports generated to consumers regarding their credit reports and activity.</li>
<li>The <a href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" rel="nofollow">Family Educational Rights and Privacy Act (“<p class="small">ferpa</p>”)<span style="color:#069">*</span></a> of 1974 “protects the privacy of student education records.”</li>
<li>The <a href="https://www.ftc.gov/enforcement/statutes/federal-trade-commission-act" rel="nofollow">Federal Trade Commission Act (“<p class="small">ftc</p> Act”)<span style="color:#069">*</span></a> of 1914 prohibits unfair or deceptive practices and has been applied to offline and online privacy and data security policies.</li>
<li>The <a href="https://www.cdc.gov/phlp/publications/topic/hipaa.html" rel="nofollow">Health Insurance Portability and Accountability Act (“<p class="small">hipaa</p>”)<span style="color:#069">*</span></a> of 1996 governs individuals’ health information. <p class="small">hipaa</p> also revised the Security Breach Notification Rule, which requires covered entities to <a href="https://content.next.westlaw.com/Document/I02064fbd1cb611e38578f7ccc38dcbee/View/FullText.html?contextData=(sc.Default)&amp;transitionType=Default&amp;firstPage=true" rel="nofollow">provide notice of breach of protected health information.<span style="color:#069">*</span></a></li>
<li>The <a href="https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act" rel="nofollow">Gramm–Leach–Bliley Act (“<p class="small">glba</p>”)<span style="color:#069">*</span></a> of 1999 was enacted to regulate the collection, use, and disclosure of financial information. It applies to <a href="https://content.next.westlaw.com/Document/I02064fbd1cb611e38578f7ccc38dcbee/View/FullText.html?contextData=(sc.Default)&amp;transitionType=Default&amp;firstPage=true" rel="nofollow">personal information collected by financial institutions for financial products and services.<span style="color:#069">*</span></a></li>
<li>The <a href="https://www.consumeradvocates.org/for-consumers/robocalls-telemarketing" rel="nofollow">Telephone Consumer Protection Act (“<p class="small">tcpa</p>”)<span style="color:#069">*</span></a> of 1991 limits robocalls—though additional limits can’t hurt. Generally, these callers can’t do the following:
<ul><li>“call before 8 a.m. or after 9 p.m.”;</li>
<li>call if you’ve chosen to opt out of calls from that specific caller or if you’ve added your name to the Do Not Call List,</li>
<li>send unsolicited fax messages to your home or office (yes, some people and places still send faxes (e.g., law firms)); and</li>
<li>“refuse to provide their name, the name of the person or organization on whose behalf they are calling, and contact information for that person or organization.”</li></ul></li></ul>

<p>On the state side, California was the first state to enact a security breach notification law. To date, <a href="https://content.next.westlaw.com/Document/I02064fbd1cb611e38578f7ccc38dcbee/View/FullText.html?contextData=(sc.Default)&amp;transitionType=Default&amp;firstPage=true" rel="nofollow">forty-eight states have enacted their own laws that notify users of a data breach.<span style="color:#069">*</span></a> With California as a main hub for technology innovation, it’s little surprise to see California as the first state to issue a law that, on its face, deals with the collection of digital information. The <a href="https://www.oag.ca.gov/privacy/ccpa" rel="nofollow">California Consumer Privacy Act (“<p class="small">ccpa</p>”),<span style="color:#069">*</span></a> which strongly resembles the <p class="small">gdpr</p>, was passed in 2018 and went into effect in 2020. Significant takeaways are that consumers in the state of California now have the right to request the deletion of their data, so long as other laws are not affected by this request; businesses are required to disclose how information is collected and shared; and consumers have the right to instruct a company not to sell their information.</p>

<h4 id="works-cited" id="works-cited">Works cited</h4>
<ul><li><a href="https://www.oag.ca.gov/privacy/ccpa" rel="nofollow">The California Consumer Privacy Act, California Civil Code § 1798.100 (2018).<span style="color:#069">*</span></a></li>
<li><a href="https://www.ftc.gov/enforcement/statutes/childrens-online-privacy-protection-act" rel="nofollow">The Children&#39;s Online Privacy Protection Act, 15 U.S.C. §§ 6501-6506 (1998).<span style="color:#069">*</span></a></li>
<li><a href="https://www.nacdl.org/Landing/ComputerFraudandAbuseAct" rel="nofollow">The Computer Fraud and Abuse Act, 18 USC § 1030 (1984).<span style="color:#069">*</span></a></li>
<li><a href="https://www.ftc.gov/enforcement/statutes/controlling-assault-non-solicited-pornography-marketing-act-2003-can-spam-act" rel="nofollow">The Controlling the Assault of Non-Solicited Pornography and Marketing Act, 15 U.S.C. §§ 7701-7713 (2003).<span style="color:#069">*</span></a></li>
<li><a href="https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1285" rel="nofollow">The Electronic Communications Privacy Act, 18 USC § 2510 (1986).<span style="color:#069">*</span></a></li>
<li><a href="https://www.ftc.gov/enforcement/statutes/fair-credit-reporting-act" rel="nofollow">The Fair Credit Report Act, 15 U.S.C. § 1681 (1970).<span style="color:#069">*</span></a></li>
<li><a href="https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html" rel="nofollow">The Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g (1974).<span style="color:#069">*</span></a> of 1974 “protects the privacy of student education records.”</li>
<li><a href="https://www.ftc.gov/enforcement/statutes/federal-trade-commission-act" rel="nofollow">The Federal Trade Commission Act, 15 U.S.C. §§ 41-58 (1914).<span style="color:#069">*</span></a></li>
<li><a href="https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act" rel="nofollow">The Gramm–Leach–Bliley Act, 15 USC §§ 6801-6827 (1999).<span style="color:#069">*</span></a></li>
<li><a href="https://www.cdc.gov/phlp/publications/topic/hipaa.html" rel="nofollow">The Health Insurance Portability and Accountability Act, 110 Stat. 1936 (1996).<span style="color:#069">*</span></a></li>
<li><a href="https://www.brookings.edu/blog/techtank/2018/07/12/filling-the-gaps-in-u-s-data-privacy-laws/" rel="nofollow">Kerry, Cameron F.: “Filling the gaps in US data privacy laws,” Brookings (2008).<span style="color:#069">*</span></a></li>
<li><a href="https://content.next.westlaw.com/Document/I02064fbd1cb611e38578f7ccc38dcbee/View/FullText.html?contextData=(sc.Default)&amp;transitionType=Default&amp;firstPage=true" rel="nofollow">Jolly, Ieuan: “Data protection in the United States: overview,” Loeb &amp; Loeb LLP (2008).<span style="color:#069">*</span></a></li>
<li><a href="https://www.consumeradvocates.org/for-consumers/robocalls-telemarketing" rel="nofollow">The Telephone Consumer Protection Act, 47 U.S.C. § 227 <em>et seq.</em> (1991).<span style="color:#069">*</span></a></li></ul>
]]></content:encoded>
      <guid>https://datalawbytes.xyz/a-patchwork-of-acts</guid>
      <pubDate>Tue, 29 Dec 2020 00:14:41 +0000</pubDate>
    </item>
    <item>
      <title>The Federal Trade Commission’s authority to enforce cybersecurity in the U.S.</title>
      <link>https://datalawbytes.xyz/the-federal-trade-commissions-authority-to-enforce-cybersecurity-in-the-u-s?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[FTC v. Wyndham gave the power of enforcing cybersecurity in the United States to the hands of the Federal Trade Commission.!--more-- The Third Circuit of the United States Court of Appeals held that Wyndham violated the p class=&#34;small&#34;ftc/p Act when it deceived its customers about its cybersecurity measures. Following a number of data breaches against Wyndham’s systems, thousands of guests of Wyndham suffered fraudulent financial charges. The p class=&#34;small&#34;ftc/p then brought suit against Wyndham. In the end, the Third Circuit ruled that the p class=&#34;small&#34;ftc/pʼs power to regulate unfair and deceptive practices extends to cybersecurity.&#xA;&#xA;An overview&#xA;Wyndham is a company running hotels throughout the U.S. At the time of the breaches, each hotel was part of a property management system that processed sensitive guest information; this information comprised “names, home addresses, email addresses, telephone numbers, payment card account numbers, expiration dates, and security codes.”span style=&#34;color:#069&#34;/span Starting in April 2008, attackers broke into the local network of a Wyndham hotel located in Phoenix, Arizona. This computer, like those in other hotels, was connected to Wyndham’s central hub of its property management system. The attackers used brute-force methods--i.e., “repeatedly guessing user’s login IDs and passwords&#34;span style=&#34;color:#069&#34;/span--to access an administrator account on Wyndham’s network. By doing this, the attackers then were able to steal unencrypted information of &#34;over 5000,000 accounts, which they [then] sent to a domain in Russia.”span style=&#34;color:#069&#34;/span In March 2009, Wyndham suffered another attack. This time, the attackers easily accessed Wyndham’s network with the administrative account they previously obtained. They then stole thousands of unencrypted payment card information. Wyndham’s network was breached yet again later in 2009. The attackers accessed even more payment card information by stealing information of “approximately 69,000 customers from the property management systems of 28 hotels.”span style=&#34;color:#069&#34;/span Wyndham didn’t learn about these incidents until January 2010, when a credit card company received many complaints from cardholders about fraudulent charges they were receiving.&#xA;&#xA;Following these fraudulent charges, the p class=&#34;small&#34;ftc/p brought suit against Wyndham alleging, among other things, that Wyndham:&#xA;&#xA;practiced deceptive practices by allowing its hotels to store payment card information in unencrypted form,&#xA;didn’t monitor its network for malware,&#xA;allowed easy access to its passwords,&#xA;didn’t employ reasonable security measures like firewalls, and&#xA;failed to restrict unauthorized access to its networks. Due to 619,000 customers being affected, fraudulent charges led to a loss of 10.6 million USD.&#xA;&#xA;As a consequence, the p class=&#34;small&#34;ftc/p further argued that the customers suffered financial injury by expending time and effort to resolve these issues.&#xA;&#xA;So the FTC can regulate cybersecurity now?&#xA;Section 5span style=&#34;color:#069&#34;/span%20OR%20(granuleid:USC-prelim-title15-section45)&amp;f=treesort&amp;edition=prelim&amp;num=0&amp;jumpTo=true) of the p class=&#34;small&#34;ftc/p Act gives the p class=&#34;small&#34;ftc/p great power to prevent deceptive trade practices. Wyndham argued whether this applied to cybersecurity practices. It also argued that, even if the p class=&#34;small&#34;ftc/p did have the authority, Wyndham wasn’t given fair notice that its cybersecurity measures fell short of the p class=&#34;small&#34;ftc/p’s standards, as required by Due Process.span style=&#34;color:#069&#34;/span It claimed that practices are “unfair” only if they’re marked by injustice, partiality, or deception.span style=&#34;color:#069&#34;/span Wyndham reasoned this was so because it didn’t engage in unfair practices per its own privacy policy. The Third Circuit, however, disagreed: a “company does not act equitably when it publishes a privacy policy to attract customers who are concerned about data privacy, fails to make good on that promise by investing inadequate resources in cybersecurity, exposes its unsuspecting customers to substantial financial injury, and retains the profits of their business.”span style=&#34;color:#069&#34;/span&#xA;&#xA;Wyndham alleged it didn’t receive notice of what specific cybersecurity practices were necessary to avoid liability. The court countered that “[f]air notice is satisfied here as long as the company can reasonably foresee that a court could construe its conduct as falling within the meaning of the statute.”span style=&#34;color:#069&#34;/span In fact, the p class=&#34;small&#34;ftc/p previously advised businesses on how to establish security practices: in 2007, they published a manual called “Protecting Personal Information: A Guide for Business,&#34; which contained several recommendations for basic security measures. The guidebook “described a data security plan ‘checklist’ for companies to follow. The guidebook encouraged practices like data encryption, strong passwords, and the use of firewalls that Wyndham failed to implement; the guidebook therefore could have helped Wyndham determine in advance that the p class=&#34;small&#34;ftc/p would view its data security measures as inadequate.”span style=&#34;color:#069&#34;/span&#xA;&#xA;The court’s holding&#xA;In the end, the Third Circuit held that the p class=&#34;small&#34;ftc/p indeed has power to regulate data security through the “unfair” and “deceptive” practices definitions dictated in § 5.span style=&#34;color:#069&#34;/span It’s this power that gave the p class=&#34;small&#34;ftc/p the authority to enforce data security practices in the U.S., and it began only in 2015. It’s a new power, sure, but a power that hasn’t dwindled. Breaches have come long before Wyndham, they have come in the years since, they will continue to come, and the p class=&#34;small&#34;ftc/p will continue enforcing basic security standards whenever possible. ❖&#xA;&#xA;Works cited&#xA;Binkley, J.: &#34;Fair notice of unfair practices: Due Process in p class=&#34;small&#34;ftc/p data security enforcement after Wyndham,” 31 Berkeley Tech. L.J. 1079, at 1084 (2016).span style=&#34;color:#069&#34;/span&#xA;F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236, at (3rd Cir. 2015).span style=&#34;color:#069&#34;/span&#xA;Hartzog, Woodrow &amp; Solove, Daniel J.: “The scope and potential of p class=&#34;small&#34;ftc/p data protection,&#34; 83 George Washington Law Review 2230 (2015).span style=&#34;color:#069&#34;/span]]&gt;</description>
      <content:encoded><![CDATA[<p><em>FTC v. Wyndham</em> gave the power of enforcing cybersecurity in the United States to the hands of the Federal Trade Commission. The Third Circuit of the United States Court of Appeals held that Wyndham violated the <p class="small">ftc</p> Act when it deceived its customers about its cybersecurity measures. Following a number of data breaches against Wyndham’s systems, thousands of guests of Wyndham suffered fraudulent financial charges. The <p class="small">ftc</p> then brought suit against Wyndham. In the end, the Third Circuit ruled that the <p class="small">ftc</p>ʼs power to regulate unfair and deceptive practices extends to cybersecurity.</p>

<h3 id="an-overview" id="an-overview">An overview</h3>

<p>Wyndham is a company running hotels throughout the U.S. At the time of the breaches, each hotel was part of a property management system that processed sensitive guest information; this information comprised <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">“names, home addresses, email addresses, telephone numbers, payment card account numbers, expiration dates, and security codes.”<span style="color:#069">*</span></a> Starting in April 2008, attackers broke into the local network of a Wyndham hotel located in Phoenix, Arizona. This computer, like those in other hotels, was connected to Wyndham’s central hub of its property management system. The attackers used brute-force methods—i.e., <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">“repeatedly guessing user’s login IDs and passwords”<span style="color:#069">*</span></a>—to access an administrator account on Wyndham’s network. By doing this, the attackers then were able to steal unencrypted information of <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">“over 5000,000 accounts, which they [then] sent to a domain in Russia.”<span style="color:#069">*</span></a> In March 2009, Wyndham suffered another attack. This time, the attackers easily accessed Wyndham’s network with the administrative account they previously obtained. They then stole thousands of unencrypted payment card information. Wyndham’s network was breached yet again later in 2009. The attackers accessed even more payment card information by stealing information of <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">“approximately 69,000 customers from the property management systems of 28 hotels.”<span style="color:#069">*</span></a> Wyndham didn’t learn about these incidents until January 2010, when a credit card company received many complaints from cardholders about fraudulent charges they were receiving.</p>

<p>Following these fraudulent charges, the <p class="small">ftc</p> brought suit against Wyndham alleging, among other things, that Wyndham:</p>
<ol><li>practiced deceptive practices by allowing its hotels to store payment card information in unencrypted form,</li>
<li>didn’t monitor its network for malware,</li>
<li>allowed easy access to its passwords,</li>
<li>didn’t employ reasonable security measures like firewalls, and</li>
<li>failed to restrict unauthorized access to its networks. Due to 619,000 customers being affected, fraudulent charges led to a loss of 10.6 million USD.</li></ol>

<p>As a consequence, the <p class="small">ftc</p> further argued that the customers suffered financial injury by expending time and effort to resolve these issues.</p>

<h3 id="so-the-ftc-can-regulate-cybersecurity-now" id="so-the-ftc-can-regulate-cybersecurity-now">So the FTC can regulate cybersecurity now?</h3>

<p><a href="https://uscode.house.gov/view.xhtml?req=(title:15%20section:45%20edition:prelim)%20OR%20(granuleid:USC-prelim-title15-section45)&amp;f=treesort&amp;edition=prelim&amp;num=0&amp;jumpTo=true" rel="nofollow">Section 5<span style="color:#069">*</span></a> of the <p class="small">ftc</p> Act gives the <p class="small">ftc</p> great power to prevent deceptive trade practices. Wyndham argued whether this applied to cybersecurity practices. It also argued that, even if the <p class="small">ftc</p> <em>did</em> have the authority, Wyndham wasn’t given fair notice that its cybersecurity measures fell short of the <p class="small">ftc</p>’s standards, as required by <a href="https://www.law.cornell.edu/wex/due_process" rel="nofollow">Due Process.<span style="color:#069">*</span></a> It claimed that practices are “unfair” only if they’re marked by <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">injustice, partiality, or deception.<span style="color:#069">*</span></a> Wyndham reasoned this was so because it didn’t engage in unfair practices per its own privacy policy. The Third Circuit, however, disagreed: a <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">“company does not act equitably when it publishes a privacy policy to attract customers who are concerned about data privacy, fails to make good on that promise by investing inadequate resources in cybersecurity, exposes its unsuspecting customers to substantial financial injury, and retains the profits of their business.”<span style="color:#069">*</span></a></p>

<p>Wyndham alleged it didn’t receive notice of what specific cybersecurity practices were necessary to avoid liability. The court countered that <a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow">“[f]air notice is satisfied here as long as the company can reasonably foresee that a court could construe its conduct as falling within the meaning of the statute.”<span style="color:#069">*</span></a> In fact, the <p class="small">ftc</p> previously advised businesses on how to establish security practices: in 2007, they published a manual called “Protecting Personal Information: A Guide for Business,” which contained several recommendations for basic security measures. The guidebook <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2772576" rel="nofollow">“described a data security plan ‘checklist’ for companies to follow. The guidebook encouraged practices like data encryption, strong passwords, and the use of firewalls that Wyndham failed to implement; the guidebook therefore could have helped Wyndham determine in advance that the <p class="small">ftc</p> would view its data security measures as inadequate.”<span style="color:#069">*</span></a></p>

<h3 id="the-court-s-holding" id="the-court-s-holding">The court’s holding</h3>

<p>In the end, the Third Circuit held that the <p class="small">ftc</p> indeed has power to regulate data security through the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2461096" rel="nofollow">“unfair” and “deceptive” practices definitions dictated in § 5.<span style="color:#069">*</span></a> It’s this power that gave the <p class="small">ftc</p> the authority to enforce data security practices in the U.S., and it began only in 2015. It’s a new power, sure, but a power that hasn’t dwindled. Breaches have come long before Wyndham, they have come in the years since, they will continue to come, and the <p class="small">ftc</p> will continue enforcing basic security standards whenever possible. ❖</p>

<h4 id="works-cited" id="works-cited">Works cited</h4>
<ul><li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2772576" rel="nofollow">Binkley, J.: “Fair notice of unfair practices: Due Process in <p class="small">ftc</p> data security enforcement after <em>Wyndham</em>,” 31 Berkeley Tech. L.J. 1079, at 1084 (2016).<span style="color:#069">*</span></a></li>
<li><a href="https://scholar.google.com/scholar_case?case=252929576329936356&amp;q=799+F.3d+236&amp;hl=en&amp;as_sdt=400003" rel="nofollow"><em>F.T.C. v. Wyndham Worldwide Corp.</em>, 799 F.3d 236, at (3rd Cir. 2015).<span style="color:#069">*</span></a></li>
<li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2461096" rel="nofollow">Hartzog, Woodrow &amp; Solove, Daniel J.: “The scope and potential of <p class="small">ftc</p> data protection,” 83 George Washington Law Review 2230 (2015).<span style="color:#069">*</span></a></li></ul>
]]></content:encoded>
      <guid>https://datalawbytes.xyz/the-federal-trade-commissions-authority-to-enforce-cybersecurity-in-the-u-s</guid>
      <pubDate>Fri, 04 Dec 2020 17:41:21 +0000</pubDate>
    </item>
    <item>
      <title>The right to our digital info</title>
      <link>https://datalawbytes.xyz/the-right-to-our-digital-info?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[The United States lacks a single law regulating the collection and maintenance of data from individuals.!--more-- With life becoming digital, information becomes easier to steal. While industries already have implemented self-regulating standards, perhaps the U.S. could benefit from an over-arching law--similar to the p class=&#34;small&#34;gdpr/p--that would regulate data protection. People should have rights to this information, and those rights should be protected.&#xA;&#xA;The ideal right to privacy for U.S. citizens can be presumed by the Fourth Amendment:span style=&#34;color:#069&#34;/span&#xA;&#xA;  The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&#xA;&#xA;U.S. citizens have the right to be secure from unreasonable searches and seizures of property from their government. In the digital globe, technology accelerates life, and laws are slow to make pace. Laws arise when needs arise (thank you, common law.)span style=&#34;color:#069&#34;/span The current U.S. system of privacy protection is a messy patchwork of statutes governing privacy rights in separate sectors. This odd system mostly works, but it works because they met the needs as they arose. Of most privacy regulations in the United States, few are digital. Our rights to privacy have been on the forehead of our concerns during current worries of data protection. Can U.S. citizens know exactly who holds their personal information? Even if they do, can they be assured their information is properly protected?&#xA;&#xA;Currently, there is no U.S. federal regulation that covers all data. Sure, there are several acts that cover certain sectors (like p class=&#34;small&#34;hipaa/pspan style=&#34;color:#069&#34;/span does for health, the p class=&#34;small&#34;glba/pspan style=&#34;color:#069&#34;/span does for banking, p class=&#34;small&#34;coppa/pspan style=&#34;color:#069&#34;/span does for children, etc.), but nothing like what Europe has in the p class=&#34;small&#34;gdpr/p.span style=&#34;color:#069&#34;/span An individual’s right to their digital identity is recognized by the p class=&#34;small&#34;gdpr/p, as well as California’s Consumer Privacy Act (“p class=&#34;small&#34;ccpa/p.”)span style=&#34;color:#069&#34;/span Leave it to the states to figure things out beforehand, even if such an act was &#34;quickly negotiated.&#34;span style=&#34;color:#069&#34;/span Other countriesspan style=&#34;color:#069&#34;/span are weaving similar regulations to clothe their citizens with the same rights. &#xA;&#xA;The right to a digital I.D.&#xA;Sullivanspan style=&#34;color:#069&#34;/span advocates for the right to identity in the U.S., thereby protecting individuals with an enforceable, all-encompassing regulation. Digital identities are being recognized not just by industries but by governments as well. Sullivanspan style=&#34;color:#069&#34;/span explains how many government transactions are performed solely over the internet with little human interaction, if at all. People hope these systems store their digital information in secure frameworks, and store only the information required for processing. Hand signatures and photographs are becoming replaced by a digital signature--mere initials in some instances, full names in others. Wet ink is not required. Governments, both state and federal, are seeing this digital signature as a preferred form of identity, claiming the digital signature reduces costs, increases efficiency, and reduces fraud.span style=&#34;color:#069&#34;/span Because governments require online transactions, they ought to protect the information in those transactions. The right to a digital identity is about the individual’s right to be recognized and to transact as an individually identifiable person within the digital universe. ❖&#xA;&#xA;Works cited&#xA;The California Consumer Privacy Act, California Civil Code § 1798.100 (2018).span style=&#34;color:#069&#34;/span&#xA;The Children’s Online Privacy Protection Act, 15 U.S.C. §§ 6501-6506 (1998).span style=&#34;color:#069&#34;/span&#xA;General Data Protection Regulation (EU) 2016/679 (2016).span style=&#34;color:#069&#34;/span&#xA;The Gramm–Leach–Bliley Act, 15 USC §§ 6801-6827 (1999).span style=&#34;color:#069&#34;/span&#xA;Greenleaf, Graham: &#34;Global data privacy laws 2019: 132 national laws &amp; many bills,&#34; 157 Privacy Laws &amp; Business International Report, 14-18 (Feb. 2019).span style=&#34;color:#069&#34;/span&#xA;The Health Insurance Portability and Accountability Act, Pub.L. 104-191 (1996).span style=&#34;color:#069&#34;/span&#xA;Stephens, John: &#34;California Consumer Privacy Act,&#34; ABA Business and Corporate Litigation Committee Newsletter – Spring 2019 (Feb. 2019).span style=&#34;color:#069&#34;/span&#xA;Sullivan, Clare Linda: “Digital Identity, privacy and the right to the identity in the United States of America,&#34; Computer Law &amp; Security Review #29 348-358 (Dec. 2013).span style=&#34;color:#069&#34;/span&#xA;U.S. Const. Amend. IV.span style=&#34;color:#069&#34;*/span]]&gt;</description>
      <content:encoded><![CDATA[<p>The United States lacks a single law regulating the collection and maintenance of data from individuals. With life becoming digital, information becomes easier to steal. While industries already have implemented self-regulating standards, perhaps the U.S. could benefit from an over-arching law—similar to the <p class="small">gdpr</p>—that would regulate data protection. People should have rights to this information, and those rights should be protected.</p>

<p>The ideal right to privacy for U.S. citizens can be presumed by the <a href="https://www.law.cornell.edu/constitution/fourth_amendment" rel="nofollow">Fourth Amendment:<span style="color:#069">*</span></a></p>

<blockquote><p>The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.</p></blockquote>

<p>U.S. citizens have the right to be secure from unreasonable searches and seizures of property <em>from their government</em>. In the digital globe, technology accelerates life, and laws are slow to make pace. Laws arise when needs arise (thank you, <a href="https://en.wikipedia.org/wiki/Common_law" rel="nofollow">common law.)<span style="color:#069">*</span></a> The current U.S. system of privacy protection is a messy patchwork of statutes governing privacy rights in separate sectors. This odd system mostly works, but it works because they met the needs as they arose. Of most privacy regulations in the United States, few are digital. Our rights to privacy have been on the forehead of our concerns during current worries of data protection. Can U.S. citizens know exactly who holds their personal information? Even if they do, can they be assured their information is properly protected?</p>

<p>Currently, there is no U.S. federal regulation that covers all data. Sure, there are several acts that cover certain sectors (like <a href="https://www.cdc.gov/phlp/publications/topic/hipaa.html" rel="nofollow"><p class="small">hipaa</p><span style="color:#069">*</span></a> does for health, the <a href="https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act" rel="nofollow"><p class="small">glba</p><span style="color:#069">*</span></a> does for banking, <a href="https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule" rel="nofollow"><p class="small">coppa</p><span style="color:#069">*</span></a> does for children, etc.), but nothing like what Europe has in the <a href="https://gdpr-info.eu/" rel="nofollow"><p class="small">gdpr</p>.<span style="color:#069">*</span></a> An individual’s right to their digital identity is recognized by the <p class="small">gdpr</p>, as well as <a href="https://www.oag.ca.gov/privacy/ccpa" rel="nofollow">California’s Consumer Privacy Act (“<p class="small">ccpa</p>.”)<span style="color:#069">*</span></a> Leave it to the states to figure things out beforehand, even if such an act was <a href="https://www.americanbar.org/groups/business_law/publications/committee_newsletters/bcl/2019/201902/fa_9/" rel="nofollow">“quickly negotiated.”<span style="color:#069">*</span></a> <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3381593" rel="nofollow">Other countries<span style="color:#069">*</span></a> are weaving similar regulations to clothe their citizens with the same rights.</p>

<h3 id="the-right-to-a-digital-i-d" id="the-right-to-a-digital-i-d">The right to a digital I.D.</h3>

<p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2379252" rel="nofollow">Sullivan<span style="color:#069">*</span></a> advocates for the right to identity in the U.S., thereby protecting individuals with an enforceable, all-encompassing regulation. Digital identities are being recognized not just by industries but by governments as well. <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2379252" rel="nofollow">Sullivan<span style="color:#069">*</span></a> explains how many government transactions are performed solely over the internet with little human interaction, if at all. People hope these systems store their digital information in secure frameworks, and store only the information required for processing. Hand signatures and photographs are becoming replaced by a <em>digital signature</em>—mere initials in some instances, full names in others. Wet ink is not required. Governments, both state and federal, are seeing this digital signature as a preferred form of identity, claiming the digital signature <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2379252" rel="nofollow">reduces costs, increases efficiency, and reduces fraud.<span style="color:#069">*</span></a> Because governments require online transactions, they ought to protect the information in those transactions. The right to a digital identity is about the individual’s right to be recognized and to transact as an individually identifiable person within the digital universe. ❖</p>

<h4 id="works-cited" id="works-cited">Works cited</h4>
<ul><li><a href="https://www.oag.ca.gov/privacy/ccpa" rel="nofollow">The California Consumer Privacy Act, California Civil Code § 1798.100 (2018).<span style="color:#069">*</span></a></li>
<li><a href="https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule" rel="nofollow">The Children’s Online Privacy Protection Act, 15 U.S.C. §§ 6501-6506 (1998).<span style="color:#069">*</span></a></li>
<li><a href="https://gdpr-info.eu/" rel="nofollow">General Data Protection Regulation (EU) 2016/679 (2016).<span style="color:#069">*</span></a></li>
<li><a href="https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act" rel="nofollow">The Gramm–Leach–Bliley Act, 15 USC §§ 6801-6827 (1999).<span style="color:#069">*</span></a></li>
<li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3381593" rel="nofollow">Greenleaf, Graham: “Global data privacy laws 2019: 132 national laws &amp; many bills,” <em>157 Privacy Laws &amp; Business International Report</em>, 14-18 (Feb. 2019).<span style="color:#069">*</span></a></li>
<li><a href="https://www.cdc.gov/phlp/publications/topic/hipaa.html" rel="nofollow">The Health Insurance Portability and Accountability Act, Pub.L. 104-191 (1996).<span style="color:#069">*</span></a></li>
<li><a href="https://www.americanbar.org/groups/business_law/publications/committee_newsletters/bcl/2019/201902/fa_9/" rel="nofollow">Stephens, John: “California Consumer Privacy Act,” <em>ABA Business and Corporate Litigation Committee Newsletter – Spring 2019</em> (Feb. 2019).<span style="color:#069">*</span></a></li>
<li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2379252" rel="nofollow">Sullivan, Clare Linda: “Digital Identity, privacy and the right to the identity in the United States of America,” <em>Computer Law &amp; Security Review</em> #29 348-358 (Dec. 2013).<span style="color:#069">*</span></a></li>
<li><a href="https://www.law.cornell.edu/constitution/fourth_amendment" rel="nofollow">U.S. Const. Amend. IV.<span style="color:#069">*</span></a></li></ul>
]]></content:encoded>
      <guid>https://datalawbytes.xyz/the-right-to-our-digital-info</guid>
      <pubDate>Mon, 30 Nov 2020 20:33:10 +0000</pubDate>
    </item>
    <item>
      <title>The digital I.D.</title>
      <link>https://datalawbytes.xyz/the-digital-id?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[In Barclay’s articlespan style=&#34;color:#069&#34;/span there is this idea of a digital identity, a persona created entirely in digital reality that is like you but isn’t you.!--more-- Instead, it’s an identity created from information a user provides, separate from their physical self. This information is plucked arbitrarily from website to website, dependent on what each site requests. From social media, it would be every bit of personally identifiable information provided, from plain text to image to video. From healthcare providers, it would be records submitted. From online bankers, it would be transactional information required to dish money out. Some of this revealing information can public, though many believe most of it should be private. Such information could be metadata pin-pointing a person’s location over a period of time. Surprise: this information belongs to the company providing the geolocation service.&#xA;&#xA;In criminal procedurespan style=&#34;color:#069&#34;/span there lies a theory called the mosaic theory,span style=&#34;color:#069&#34;/span) which proposes that many disparate parts may add to a complete (and seemingly correct) whole. In Carpenter,span style=&#34;color:#069&#34;/span the Supreme Court found that government tracking of a user’s global position over a fixed amount of time outside the scope of the warrant constitutes a search. If tracking a user over an extended period of time to determine criminal activity could be deemed a violation, what about tracking them without their informed consent?span style=&#34;color:#069&#34;/span Third-party trackers can create a second identity of a user, even if those trackers are providing beneficial services. Users equip technology that tracks their browsing, that tracks their movement, that tracks their cardiac information, that tracks their spending habits, that tracks their &#34;Likes.&#34;span style=&#34;color:#069&#34;/span Advertising companies target this juicy information so they can tailor products better suited to individual preferences. These companies are large miners of data; what they possess many would consider extremely sensitive. ❖&#xA;&#xA;Works cited&#xA;Barclay, Courtney: “A Comparison of Proposed Legislative Data Privacy Protections in the United States,” The computer law and security report #29(4) 369-367, at 360-361 (Aug. 2013).span style=&#34;color:#069&#34;/span&#xA;Carpenter v. United States, 138 S.Ct. 2206, at 2223 (2018).span style=&#34;color:#069&#34;/span]]&gt;</description>
      <content:encoded><![CDATA[<p>In <a href="https://www.sciencedirect.com/science/article/abs/pii/S0267364913000939" rel="nofollow">Barclay’s article<span style="color:#069">*</span></a> there is this idea of a digital identity, a persona created entirely in digital reality that is like you but isn’t you. Instead, it’s an identity created from information a user provides, separate from their physical self. This information is plucked arbitrarily from website to website, dependent on what each site requests. From social media, it would be every bit of personally identifiable information provided, from plain text to image to video. From healthcare providers, it would be records submitted. From online bankers, it would be transactional information required to dish money out. Some of this revealing information can public, though many believe most of it should be private. Such information could be metadata pin-pointing a person’s location over a period of time. Surprise: this information belongs to the company providing the geolocation service.</p>

<p>In <a href="https://www.law.cornell.edu/wex/criminal_procedure" rel="nofollow">criminal procedure<span style="color:#069">*</span></a> there lies a theory called the <a href="https://en.wikipedia.org/wiki/Mosaic_theory_(Fourth_Amendment)" rel="nofollow">mosaic theory,<span style="color:#069">*</span></a> which proposes that many disparate parts may add to a complete (and seemingly correct) whole. In <a href="https://en.wikipedia.org/wiki/Carpenter_v._United_States" rel="nofollow"><em>Carpenter,</em><span style="color:#069">*</span></a> the Supreme Court found that government tracking of a user’s global position over a fixed amount of time outside the scope of the warrant constitutes a search. If tracking a user over an extended period of time to determine criminal activity could be deemed a violation, what about tracking them <em>without</em> their <a href="https://en.wikipedia.org/wiki/Informed_consent" rel="nofollow">informed consent?<span style="color:#069">*</span></a> Third-party trackers can create a second identity of a user, even if those trackers are providing beneficial services. Users equip technology that tracks their browsing, that tracks their movement, that tracks their cardiac information, that tracks their spending habits, that tracks their “<a href="https://en.wikipedia.org/wiki/Like_button" rel="nofollow">Likes.”<span style="color:#069">*</span></a> Advertising companies target this juicy information so they can tailor products better suited to individual preferences. These companies are large miners of data; what they possess many would consider extremely sensitive. ❖</p>

<h4 id="works-cited" id="works-cited">Works cited</h4>
<ul><li><a href="https://www.sciencedirect.com/science/article/abs/pii/S0267364913000939" rel="nofollow">Barclay, Courtney: “A Comparison of Proposed Legislative Data Privacy Protections in the United States,” <em>The computer law and security report</em> #29(4) 369-367, at 360-361 (Aug. 2013).<span style="color:#069">*</span></a></li>
<li><a href="https://en.wikipedia.org/wiki/Carpenter_v._United_States" rel="nofollow"><em>Carpenter v. United States</em>, 138 S.Ct. 2206, at 2223 (2018).<span style="color:#069">*</span></a></li></ul>
]]></content:encoded>
      <guid>https://datalawbytes.xyz/the-digital-id</guid>
      <pubDate>Tue, 24 Nov 2020 04:46:05 +0000</pubDate>
    </item>
    <item>
      <title>The right to privacy</title>
      <link>https://datalawbytes.xyz/rights-to-our-info?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[Over 100 years ago, Samuel Warren and Louis Brandeis helped kindle the American lust for a right to privacy in their article &#34;The right to privacy.&#34;span style=&#34;color:#069&#34;/span)!--more-- Decades later, Brandeis (now Justice) got to revisit his march for privacy in his dissenting opinion in Olmstead:span style=&#34;color:#069&#34;/span privacy is “the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.” Fast-forward to Katz,span style=&#34;color:#069&#34;/span the Supreme Court held that citizens have a reasonable expectation of privacy from governmental intrusion.&#xA;&#xA;With technology creating digital I.D.s, does our &#34;right to privacy&#34; translate well into our digital lives, where our information is collected and stored by many others? We submit sensitive information like our name, date of birth, weight, and height; most information collectors store this and users go on with their lives. With data breaches becoming far too familiar, more U.S. citizens are becoming concerned with digital privacy. Security systems are fallible; locks can be broken. The only solution: never provide sensitive information. But even governments are moving into exclusively digital services requiring citizens to transact online. Filing taxes online is nothing new, and many other applications and forms usually are submitted digitally to federal and local governments. Our dealings with governments via the internet indicates our governing bodies want us to live digitally, yet there still is no one data-protection law covering us. Perhaps it is time for a federal digital privacy-protection act. ❖&#xA;&#xA;Works cited&#xA;Katz v. United States, 389 U.S. 347, at 350-351 (1967).span style=&#34;color:#069&#34;/span&#xA;Olmstead v. United States, 277 U.S. 438, at 478 (1928).span style=&#34;color:#069&#34;/span&#xA;Warren, Samuel &amp; Brandeis, Louis: &#34;The right to privacy,&#34; 4 Harvard L.R. 193 (Dec. 1890)span style=&#34;color:#069&#34;/span)]]&gt;</description>
      <content:encoded><![CDATA[<p>Over 100 years ago, Samuel Warren and Louis Brandeis helped kindle the American lust for a right to privacy in their article <a href="https://en.wikipedia.org/wiki/The_Right_to_Privacy_(article)" rel="nofollow">“The right to privacy.”<span style="color:#069">*</span></a> Decades later, Brandeis (now Justice) got to revisit his march for privacy in his dissenting opinion in <a href="https://en.wikipedia.org/wiki/Olmstead_v._United_States" rel="nofollow"><em>Olmstead</em>:<span style="color:#069">*</span></a> privacy is “the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.” Fast-forward to <a href="https://en.wikipedia.org/wiki/Katz_v._United_States" rel="nofollow"><em>Katz</em>,<span style="color:#069">*</span></a> the Supreme Court held that citizens have a reasonable expectation of privacy from governmental intrusion.</p>

<p>With technology creating digital I.D.s, does our “right to privacy” translate well into our digital lives, where our information is collected and stored by many others? We submit sensitive information like our name, date of birth, weight, and height; most information collectors store this and users go on with their lives. With data breaches becoming far too familiar, more U.S. citizens are becoming concerned with digital privacy. Security systems are fallible; locks can be broken. The only solution: never provide sensitive information. But even governments are moving into exclusively digital services requiring citizens to transact online. Filing taxes online is nothing new, and many other applications and forms usually are submitted digitally to federal and local governments. Our dealings with governments via the internet indicates our governing bodies want us to live digitally, yet there still is no one data-protection law covering us. Perhaps it <em>is</em> time for a federal digital privacy-protection act. ❖</p>

<h4 id="works-cited" id="works-cited">Works cited</h4>
<ul><li><a href="https://en.wikipedia.org/wiki/Katz_v._United_States" rel="nofollow"><em>Katz v. United States</em>, 389 U.S. 347, at 350-351 (1967).<span style="color:#069">*</span></a></li>
<li><a href="https://en.wikipedia.org/wiki/Olmstead_v._United_States" rel="nofollow"><em>Olmstead v. United States</em>, 277 U.S. 438, at 478 (1928).<span style="color:#069">*</span></a></li>
<li><a href="https://en.wikipedia.org/wiki/The_Right_to_Privacy_(article)" rel="nofollow">Warren, Samuel &amp; Brandeis, Louis: “The right to privacy,” 4 Harvard L.R. 193 (Dec. 1890)<span style="color:#069">*</span></a></li></ul>
]]></content:encoded>
      <guid>https://datalawbytes.xyz/rights-to-our-info</guid>
      <pubDate>Wed, 18 Nov 2020 23:19:38 +0000</pubDate>
    </item>
  </channel>
</rss>