Privacy Lecture 2
Privacy Lecture 2
Post-Mid Lecture 2
Topics
1. Privacy Risks and Principles
2. The Fourth Amendment, Expectation of Privacy, and
Surveillance Technologies
3. The Business and Social Sectors
4. Government Systems
5. Protecting Privacy: technology, markets, rights, and laws
The Fourth Amendment
The Fourth Amendment
The right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not
be violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be seized.
—Fourth Amendment, U.S. Constitution
Two key problems arise from new technologies
which weaken Fourth Amendment protections
• First, much of our personal information is no longer safe in our homes or the
individual offices of our doctors and financial advisors. We carry a huge amount of
personal information on smartphones and laptops. Much personal information is in
huge databases outside of our control. Many laws allow law enforcement agencies
to get information from nongovernment databases without a court order. Federal
privacy rules allow law enforcement agencies to access medical records without
court orders
• In 1967, the Supreme Court reversed its position and ruled that the Fourth Amendment does apply to
conversations and that it applies in public places in some situations. In another case, law
enforcement agents had attached an electronic listening and recording device on the outside of a
telephone booth to record a suspect’s conversation. The court said that the Fourth Amendment
“protects people, not places,” and that what a person “seeks to preserve as private, even in an area
accessible to the public, may be constitutionally protected.” To intrude in places where a reasonable
person has a reasonable expectation of privacy, government agents need a court order.
• In Kyllo v. United States (2001), the Supreme Court ruled that police could not use thermal-imaging
devices to search a home from the outside without a search warrant. The Court stated that where
“government uses a device that is not in general public use, to explore details of the home that would
previously have been unknowable without physical intrusion, the surveillance is a ‘search.’” This
Supreme Court
decisions and
expectation of
privacy
Court’s interpretation of “expectation of
privacy” vs Our expectation of it!
• The Court has interpreted “expectation of privacy” in a very restrictive way.
• For example, it ruled that if we share information with businesses such as
our bank, then we have no reasonable expectation of privacy for that
information Law enforcement agents do not need a court order to get the
information.
• We do expect privacy of the financial information we supply a bank or other
financial institution.
• We share our Web activity with ISPs, websites, and search engine
companies merely by typing and clicking.
• We share many kinds of personal information at specific websites where we
expect it to be private. Is it safe from warrantless search?
Search and Seizure of Computers and
Phones
Search and Seizure of Computers and Phones
• But the California Supreme Court ruled otherwise where search of the
contents of a cellphone was permitted!
• Video surveillance systems monitor traffic and catch drivers who run
red lights.
• Cameras alone raise some privacy issues. When combined with face
recognition systems, they raise even more
Applications and Issues
• In the first large-scale, public application of face recognition, police in
Tampa, Florida, scanned the faces of all 100,000 fans and employees who
entered the 2001 Super Bowl (American football game). The system
searched computer files of criminals for matches, giving results within
seconds.