Less privacy for digital data

Computers and the Internet have vastly extended the government's ability to collect and analyze personal information and have outpaced privacy protections in federal law, said James Dempsey, deputy director for the Center for Democracy and Technology.

"The digital revolution has been a boon to government surveillance and collection of information," Dempsey wrote in a paper on legal protections and the Internet Age. "We need to strengthen privacy statutes to restore a balance between government surveillance and personal privacy."

Laws written for a world of paper documents are proving inadequate for the electronic world, Dempsey wrote. For example:

* Protections in wiretapping law, including rules against using illegally obtained evidence, do not apply to e-mail or other Internet communications.

* Data stored in electronic networks does not have the same privacy protection as data stored in home or office computers or data on paper.

* Internet users are not entitled to notification when information is subpoenaed in civil suits from Internet service providers.

* Inconsistent privacy standards apply to different technologies. Privacy protections differ when watching the same movie via satellite, cable, cable modem and rental video.

There is no explicit constitutional guarantee of privacy, but the Fourth Amendment offers some protection against government intrusion in the paper world.

To get access to an individual's papers or effects, government agents first must obtain a warrant showing probable cause to believe that a crime has been or will be committed. They must also provide timely notice of a search and an inventory of items seized.

But Fourth Amendment protections do not cover much of the information stored or transmitted in the electronic world. The Supreme Court has ruled, for example, that information given to a third party is not protected under the Fourth Amendment. Thus, information extracted from medical records, credit applications, leases, purchase agreements, online transactions and similar sources "are available to law enforcement for the asking," Dempsey said.

"In an increasingly connected world, a recording of every telephone number dialed and the source of every call received can provide a very complete picture of a person's associations, habits, contacts, interests and activities," he said. Add e-mail, Web browsing, commercial and government databases and data mining, and the picture becomes a detailed dossier.

Featured

  • People
    Federal CIO Suzette Kent

    Federal CIO Kent to exit in July

    During her tenure, Suzette Kent pushed on policies including Trusted Internet Connection, identity management and the creation of the Chief Data Officers Council

  • Defense
    Essye Miller, Director at Defense Information Management, speaks during the Breaking the Gender Barrier panel at the Air Space, Cyber Conference in National Harbor, Md., Sept. 19, 2017. (U.S. Air Force photo/Staff Sgt. Chad Trujillo)

    Essye Miller: The exit interview

    Essye Miller, DOD's outgoing principal deputy CIO, talks about COVID, the state of the tech workforce and the hard conversations DOD has to have to prepare personnel for the future.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.