-
1
-
-
77957934885
-
-
The article is related to the research project Legal Aspects of Mobile Commerce and Pervasive Computing: Privacy, Marketing, Contracting and Liability Issues funded by the Danish Council for Independent Research; Social Sciences. See further information on the project, at:
-
The article is related to the research project Legal Aspects of Mobile Commerce and Pervasive Computing: Privacy, Marketing, Contracting and Liability Issues funded by the Danish Council for Independent Research; Social Sciences. See further information on the project, at: http://www.asb.dk/article.aspx/pid/ 19387.
-
-
-
-
2
-
-
77957932090
-
-
note
-
The second article in this two part series on Profiling the Mobile Customer will appear in the next issue of CLSR. The second article looks at alternative approaches to protect consumers privacy and data protection that include legislation, industry self-regulation and technology. It compares two leading self-regulatory codes from the United Kingdom and the United States that have been developed by industry associations for use by their members engaged in behavioural advertising.concluding that there are serious deficiencies in these current self-regulatory approaches in terms of addressing key privacy and data protection concerns of profiling for mobile customers and that current technology is not adequate to protect consumers, it concludes that legislation needs to be adopted in both the EU and the U.S. to close the gaps in the current regulatory frameworks and support stronger industry self-regulation. It offers suggestions for that reform to both protect consumers and enhance the regulatory environment for mobile commerce. available at www.sciencedirect.com www.compseconline.com/publications/prodclaw.htm comp u t e r law & s e c u rity rev iew 2 6 ( 2 0 1 0 ) 4 5 5 e4 7 8 0267-3649/e see front matter 2010 Nancy J. King & Pernille Wegener Jessen. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.clsr.2010.07.001
-
-
-
-
3
-
-
84892233762
-
-
Hildebrandt M. and Gutwirth, S. (eds.) Springer (Profiling the European Citizen) (emphasis in original)
-
Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen, Cross-Disciplinary Perspectives, Springer, p.1 (2008) (Profiling the European Citizen) (emphasis in original).
-
(2008)
Profiling the European Citizen, Cross-Disciplinary Perspectives
, pp. 1
-
-
-
5
-
-
77957960737
-
-
(resulting from the 21st Bureau Meeting, Lisbon, 13e15 April 2010) (CE Draft Recommendation on Profiling), available at:
-
Fin, p. 5 (resulting from the 21st Bureau Meeting, Lisbon, 13e15 April 2010) (CE Draft Recommendation on Profiling), available at: http://www.coe.int/ t/e/legal-affairs/legal-co-operation/data-protection/events/t-pd-and-t-pd-bur- meetings/2T-PD-BUR- 2009-02rev5-en-Fin.pdf.
-
Fin
, pp. 5
-
-
-
6
-
-
77957936415
-
-
Consultative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data: Application of Convention 108 to the Profiling MechanismdSome Ideas for the Future Work of the Consultative Committee, Consultative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data T-PD(2008)01, Centre de Recherches Informatique et Droit (CRID)
-
Dinant et al., Consultative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data: Application of Convention 108 to the Profiling MechanismdSome Ideas for the Future Work of the Consultative Committee, T-PD(2008)01, Centre de Recherches Informatique et Droit (CRID), p. 5, (Jan. 2008) (Dinant et al.), available at: http://www.statewatch.org/news/2008/aug/coe-profiling-paper.pdf.
-
Application of Convention 108 to the Profiling MechanismdSome Ideas for the Future Work of the Consultative Committee
, pp. 5
-
-
Dinant1
-
7
-
-
77957933125
-
-
note
-
Dinant et al., note 5, p. 5 (distinguishing consumer profiling by marketers from psychological profiling used by law enforcement to help identify criminal behaviour that attempts to get inside the criminals mind).
-
-
-
-
10
-
-
77957960523
-
-
alteration in original
-
FIDIS Journal of Identity in the Information Society 5 (2007), available at: http://www.fidis.net/fileadmin/journal/issues/1-2007/Profiling-into-the- future.pdf(alteration in original).
-
(2007)
FIDIS Journal of Identity in the Information Society
, vol.5
-
-
-
11
-
-
77957971084
-
-
note
-
According to Hildebrandt:Automated profiling can be described as the process of knowledge discovery in databases (KDD), of which data mining (DM; using mathematical techniques to detect relevant patterns), is a part. KDD is generally thought to consist of a number of steps:(1) recording of data(2) aggregation & tracking of data(3) identification of patterns in data (DM)(4) interpretation of outcome(5) monitoring data to check the outcome (testing)(6) applying the profiles. Ibid. p. 5 (citations omitted). This type of profiling is new in two ways: it is produced by machines and it differs from classical empirical statistics because it results from a hypothesis that emerges in the process of data mining that is then tested on the population rather than a sample. Ibid. p. 6. An advantage of KDD is that it can "trace and track correlations in an ever-growing mass of retained data and confront us with inferences drawn from past behaviour that would otherwise be lost to oblivion". Ibid. (citations omitted).
-
-
-
-
12
-
-
77957944636
-
-
note 4 (para. 10); Hotaling, note 11
-
CE Draft Recommendation on Profiling, note 4, p. 2 (para. 10); Hotaling, note 11, pp. 537e538 (explaining how online behavioural advertisers target consumers by acquiring user postings and clickstream data, analyse that data to form comprehensive personal profiles and serve advertisements that best match the interests expressed by the profiles). Hotaling also explains the direct marketing practice that segments tracked user history into distinct market segments. For example, within the broad market of automobiles, a company may create three distinct market segments: auto enthusiast, hybrid car shoppers and European import buyers. Ibid. p. 538. Then, based on a consumers comprehensive personal profile, he or she would be assigned to one of these segments to be used for direct marketing purposes. Ibid. Behavioural advertisers are able to assign consumers to precise market segments (group profiles) based on individual customer profiles
-
CE Draft Recommendation on Profiling
, vol.2
, pp. 537-538
-
-
-
13
-
-
77957936173
-
-
(discussing applications of profiling that include implementation of oneto- one marketing that entails targeting information and special offers toward each specific client). Categories of data used by behavioural advertisers to produce targeted advertising include behavioural data (qualifies consumers based on interests), transactional data (transactions-based behavioural data based on conversations, etc., which may be real-time), and other demographic data (including data derived from user site registration, data verified at the household level, such as age, marital status, home-owner, etc).complaint, Request for Investigation, Injunction and Other Relief: Google et al., Center for Digital Democracy (CDD), U.S. PIRG (a federation of state Public Interest Research Groups), World Privacy Forum (CDD et al.), before the Federal Trade Commission (FTC), pp. (8 Apr. 2010) (CDD Profiling Complaint), available at last accessed, 7 June 2010
-
Benoist, E., Collecting Data for the Profiling of Web Users, in Profiling the European Citizen, note 3, p. 172 (discussing applications of profiling that include implementation of oneto- one marketing that entails targeting information and special offers toward each specific client). Categories of data used by behavioural advertisers to produce targeted advertising include behavioural data (qualifies consumers based on interests), transactional data (transactions-based behavioural data based on conversations, etc., which may be real-time), and other demographic data (including data derived from user site registration, data verified at the household level, such as age, marital status, home-owner, etc).complaint, Request for Investigation, Injunction and Other Relief: Google et al., Center for Digital Democracy (CDD), U.S. PIRG (a federation of state Public Interest Research Groups), World Privacy Forum (CDD et al.), before the Federal Trade Commission (FTC), pp. 11e13 (8 Apr. 2010) (CDD Profiling Complaint), available at: http://democraticmedia.org/files/u1/ 20100407-FTCfiling.pdf(last accessed, 7 June 2010).
-
Collecting Data for the Profiling of Web Users in Profiling the European Citizen Note 3
, vol.11-13
, pp. 172
-
-
Benoist, E.1
-
14
-
-
77957970663
-
-
PhD Dissertation, Aarhus School of Business, Aarhus University, Aarhus, Denmark (Cleff, Mobile Advertising Dissertation). Mobile commerce (m-commerce) includes all commercial transactions conducted through mobile communications networks that interface with mobile devices. Ibid. (citing Turban et al., Electronic Commerce 2008: A Managerial Perspective, p. 431 (Pearson Prentice Hall, 2008)). Mobile Advertising (madvertising) is a part of mobile commerce. Cleff, Mobile Advertising Dissertation, p. 31. M-advertising can be defined "as the act of sending electronic advertisements to consumers who carry mobile devices". Ibid. p. 33. There are two major forms of m-advertising: "adsdeliveredin othermedia that feature a call-to-action, e.g.,anmadvertising delivered via text messages, and ads delivered on the mobile device itself, e.g., within a mobileWeb browser". Ibid. p. 34
-
See Cleff, E., Mobile Advertising: Proposals for Adequate Disclosure and Consent Mechanisms, PhD Dissertation, Aarhus School of Business, Aarhus University, Aarhus, Denmark, pp. 30e31 (2009) (Cleff, Mobile Advertising Dissertation). Mobile commerce (m-commerce) includes all commercial transactions conducted through mobile communications networks that interface with mobile devices. Ibid. (citing Turban et al., Electronic Commerce 2008: A Managerial Perspective, p. 431 (Pearson Prentice Hall, 2008)). Mobile Advertising (madvertising) is a part of mobile commerce. Cleff, Mobile Advertising Dissertation, p. 31. M-advertising can be defined "as the act of sending electronic advertisements to consumers who carry mobile devices". Ibid. p. 33. There are two major forms of m-advertising: "adsdeliveredin othermedia that feature a call-to-action, e.g.,anmadvertising delivered via text messages, and ads delivered on the mobile device itself, e.g., within a mobileWeb browser". Ibid. p. 34.
-
(2009)
Mobile Advertising: Proposals for Adequate Disclosure and Consent Mechanisms
, pp. 30-31
-
-
Cleff, E.1
-
15
-
-
77957956514
-
-
Cleff Mobile Advertising Dissertation, note 15
-
Cleff, Mobile Advertising Dissertation, note 15, p. 34.
-
-
-
-
16
-
-
77957963868
-
-
note 14 (asking the FTC to investigate behavioural advertisers including Microsoft, Google and Yahoo and leading companies providing auctioning and data collection/targeting systems that support consumer profiling, for unfair and deceptive trade practices under Section 5 of the Federal Trade Commission Act). The Complaint asks the FTC to ensure consumers have meaningful control over their information and asks the FTC to seek injunctive and compensatory relief). See also, Press Release, CDD, U.S. PIRG, and World Privacy Forum Call on Federal Trade Commission to Investigate Data Collection Wild West Involving Real-Time Advertising Auctions and Data Exchanges, CommonDreams.org (8 Apr. 2010), available at: last accessed
-
See, e.g., CDD Profiling Complaint, note 14, p. 3 (asking the FTC to investigate behavioural advertisers including Microsoft, Google and Yahoo and leading companies providing auctioning and data collection/targeting systems that support consumer profiling, for unfair and deceptive trade practices under Section 5 of the Federal Trade Commission Act). The Complaint asks the FTC to ensure consumers have meaningful control over their information and asks the FTC to seek injunctive and compensatory relief). See also, Press Release, CDD, U.S. PIRG, and World Privacy Forum Call on Federal Trade Commission to Investigate Data Collection Wild West Involving Real-Time Advertising Auctions and Data Exchanges, CommonDreams.org (8 Apr. 2010), available at: http://www. commondreams.org/newswire/2010/04/08-0 (last accessed, June 2010).
-
CDD Profiling Complaint
, pp. 3
-
-
-
18
-
-
77957939075
-
-
note 14 (reporting that the Rubicon project serves both the UK and Europe and OpenX is working with Europes largest ad network operated by Orange of France Telecom)
-
CDD Profiling Complaint, note 14, pp. 20, 28 (reporting that the Rubicon project serves both the UK and Europe and OpenX is working with Europes largest ad network operated by Orange of France Telecom).
-
CDD Profiling Complaint
, vol.28
, pp. 20
-
-
-
19
-
-
77957950907
-
-
U.C. Berkeley School of Information (1 June 2009) (reporting the results of a recent study by graduate students comparing consumer expectations for online privacy with Internet companies data collection practices, including how companies gather information about users web activities using cookies and beacons, finding that despite consumer demand for control over howtheir personal information is collected and used, web analytics tools are used widely, often without users knowledge), available at: last accessed 7 June 2010
-
Gomez et al., KnowPrivacy Report, U.C. Berkeley School of Information, p. 5 (1 June 2009) (reporting the results of a recent study by graduate students comparing consumer expectations for online privacy with Internet companies data collection practices, including how companies gather information about users web activities using cookies and beacons, finding that despite consumer demand for control over howtheir personal information is collected and used, web analytics tools are used widely, often without users knowledge), available at: http://knowprivacy.org/report/KnowPrivacy-Final-Report.pdf(last accessed 7 June 2010).
-
Know Privacy Report
, pp. 5
-
-
Gomez1
-
20
-
-
77957953979
-
-
note 20 (reporting on data collected by TRUSTeaboutconsumer complaints relatedtoitsmemberwebsites). See also 2009 Study last accessed 7 June 2010
-
Gomez et al., note 20, pp. 19e20 (reporting on data collected by TRUSTeaboutconsumer complaints relatedtoitsmemberwebsites). See also 2009 Study: Consumer Attitudes about Behavioural Targeting, TRUSTe (4March2009), available at: http://www.truste.com/pdf/Behavioral-Targeting-Data-Sheet.pdf(last accessed 7 June 2010).
-
Consumer Attitudes about Behavioural Targeting, TRUSTe (4March2009)
, pp. 19-20
-
-
Gomez1
-
21
-
-
77957969446
-
-
note
-
See CE Draft Recommendation on Profiling, note 4, p. 2 (paras. 2, 3) (explaining that information and communication technologies (ICTs) allow the collection and processing of data on a large scale, including personal data, in both the private and public sectors, noting that continuous development of convergent technologies poses new challenges regarding collection and further processing of data). Data collection by ICTs may include traffic data and Internet user queries in search engines, data relating to consumer buying habits, data stemming from social networking and geo-location data concerning telecommunications devices, as well as the data stemming from video surveillance cameras, biometric systems and by Radio Frequency Identification Systems. Ibid.
-
-
-
-
22
-
-
84979819452
-
Implementing the legal criteria of meaningful consent in the concept of mobile advertising
-
(Cleff, CLSR)
-
See Cleff, E.B., Implementing the Legal Criteria of Meaningful Consent in the Concept of Mobile Advertising, 23-3 Computer Law & Security Report, pp. 262e269 (2007) (Cleff, CLSR).
-
(2007)
23-3 Computer Law & Security Report
, pp. 262-269
-
-
Cleff, E.B.1
-
23
-
-
50649098182
-
Direct marketing, mobile phones, and consumer privacy: Ensuring adequate disclosure and consent mechanisms for emerging mobile advertising practices
-
(King, FCLJ (2008)
-
King, N., Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices, 60-2 Federal Communications Law Journal, pp. 239e247 (2008) (King, FCLJ (2008)).
-
(2008)
60-2 Federal Communications Law Journal
, pp. 239-247
-
-
King, N.1
-
25
-
-
77957965129
-
Identity theft is top consumer complaint
-
(14 Feb. 2008) last accessed
-
Mantell, R., Identity theft is top consumer complaint, Market Watch (14 Feb. 2008), http://www.marketwatch.com/story/identity-theft-is-no-1-consumer- fraud-complaint (last accessed June 2010)
-
Market Watch
-
-
Mantell, R.1
-
26
-
-
77957952790
-
-
note
-
See CE Draft Recommendation on Profiling, note 4, p. 2. When profiles are attributed to an individual consumer (data subject) it is possible to generate new personal data. Ibid. The data subject has not communicated this new personal data to the controller and cannot be presumed to know about the new personal data generated by profiling, especially since the profiling activity may not be visible to the consumer. Ibid.
-
-
-
-
27
-
-
77957963866
-
-
Use of anonymous data for profiling purposes may satisfy data protection rights under Council of Europe Convention 108 and the Data Protection Directive, but it does not eliminate the individuals privacy rights under Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR). Dinant et al., note 5, pp. 30e31. See also, Article 15 of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281/31, 23.11.95 (Data Protection Directive). However, when a profile is "attributed" to a data subject, at least arguably this attribution creates new personal data that the data subject did not communicate to the controller, and therefore the data subjects rights under the Data Protection Directive would apply. See CE Draft Recommendation on Profiling, note 4, p. 2 (para. 7)
-
Use of anonymous data for profiling purposes may satisfy data protection rights under Council of Europe Convention 108 and the Data Protection Directive, but it does not eliminate the individuals privacy rights under Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR). Dinant et al., note 5, pp. 30e31. See also, Article 15 of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281/31, 23.11.95 (Data Protection Directive). However, when a profile is "attributed" to a data subject, at least arguably this attribution creates new personal data that the data subject did not communicate to the controller, and therefore the data subjects rights under the Data Protection Directive would apply. See CE Draft Recommendation on Profiling, note 4, p. 2 (para. 7).
-
-
-
-
28
-
-
77957947009
-
-
Scholars have argued that most profiling is done on the basis of anonymized data to which EU data protection legislation does not apply available at: last accessed 7 June 2010 In the same way, the application of a group profile to an anonymous person does not generally fall within the scope of EU data protection legislation, although it may have substantial consequences for this person. Ibid
-
Scholars have argued that most profiling is done on the basis of anonymized data to which EU data protection legislation does not apply. See, e.g., Wim Schreurs et al., Legal Issues: Report on the Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS deliverable 7.3, p. 49 (2005), available at: http://www.fidis.net/resources/deliverables/ profiling/d73- report-on-actual-and-possible-profiling-techniques-in-the- fieldof- ambient-intelligence/doc/26/(last accessed 7 June 2010). In the same way, the application of a group profile to an anonymous person does not generally fall within the scope of EU data protection legislation, although it may have substantial consequences for this person. Ibid.
-
(2005)
Legal Issues: Report on the Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS Deliverable 7.3
, pp. 49
-
-
Schreurs, W.1
-
29
-
-
77957969663
-
-
Hildebrandt, note 8, p. 9. A second privacy concern is the risk of unfair discrimination based on refined profiling technologies that allow sophisticated market discrimination, such as price discrimination between groups of customers that is based on undisclosed group profiles. Ibid. p.10. While price discrimination"maybe a good thing in a market economy . fairness again depends on consumers awareness of the way they are categorized". Ibid
-
Hildebrandt, note 8, p. 9. A second privacy concern is the risk of unfair discrimination based on refined profiling technologies that allow sophisticated market discrimination, such as price discrimination between groups of customers that is based on undisclosed group profiles. Ibid. p.10. While price discrimination"maybe a good thing in a market economy . fairness again depends on consumers awareness of the way they are categorized". Ibid.
-
-
-
-
30
-
-
77957955855
-
-
Hildebrandt, note 8, p. 9
-
Hildebrandt, note 8, p. 9.
-
-
-
-
31
-
-
77957962828
-
-
Hildebrandt, note 8, p. 10
-
Hildebrandt, note 8, p. 10.
-
-
-
-
32
-
-
77957963048
-
-
Hildebrandt, note 8, p. 10
-
Hildebrandt, note 8, p. 10.
-
-
-
-
33
-
-
77957942583
-
-
Hildebrandt, note 8, p. 16e17 (arguing for regulationthat creates a privacy right to access, in real-time, knowledge profiles being applied to people; including the potential consequences, in order to protect personal autonomy). Hildebrandt argues that Transparency- Enhancing Technologies (TETs), as well as Privacy- Enhancing Technologies (PETs), need to be provided with respect to the use of the smart technologies that enable Ambient Intelligent (AmI) Environments). She lists sensor technologies, RFID systems, nanotechnology and miniaturization as the enabling technologies. Ibid. pp. 7, 15e17
-
Hildebrandt, note 8, p. 16e17 (arguing for regulationthat creates a privacy right to access, in real-time, knowledge profiles being applied to people; including the potential consequences, in order to protect personal autonomy). Hildebrandt argues that Transparency- Enhancing Technologies (TETs), as well as Privacy- Enhancing Technologies (PETs), need to be provided with respect to the use of the smart technologies that enable Ambient Intelligent (AmI) Environments). She lists sensor technologies, RFID systems, nanotechnology and miniaturization as the enabling technologies. Ibid. pp. 7, 15e17
-
-
-
-
34
-
-
77957961840
-
Targeting bad behaviour: Why federal regulators must treat online behavioural marketing as spyware
-
(Ng) (commenting that "targeted ads can be highly manipulative, causing consumers to lose autonomy because of the ad companies creationofpsychological profilesbasedonthe companiesperceived notions of the users interest, rather than the users own choices")
-
See also, Ng, H., Targeting Bad Behaviour: Why Federal Regulators Must Treat Online Behavioural Marketing as Spyware, 31 Hastings Communications and Entertainment Law Journal, p. 374 (2009) (Ng) (commenting that "targeted ads can be highly manipulative, causing consumers to lose autonomy because of the ad companies creationofpsychological profilesbasedonthe companiesperceived notions of the users interest, rather than the users own choices").
-
(2009)
31 Hastings Communications and Entertainment Law Journal
, pp. 374
-
-
Ng, H.1
-
35
-
-
77957954188
-
-
note
-
See CE Draft Recommendation on Profiling, note 4, p. 3 (para. 12) and p. 7(C.4.11) (recommending that the processing of sensitive data in the context of profiling be prohibited except if these data are necessary for the lawful and specific purposes of processing and domestic law provides appropriate safeguards). Sensitive data is defined to mean "personal data revealing the racial origin, political opinions or religious or other beliefs, as well as personal data on health, sex life or criminal convictions, as well as other data defined as sensitive by domestic legislation". Ibid. p. 5.
-
-
-
-
36
-
-
77957961841
-
-
See CE Draft Recommendation on Profiling, note 4, p. 2 (para. 7)
-
See CE Draft Recommendation on Profiling, note 4, p. 2 (para. 7)
-
-
-
-
37
-
-
77957956513
-
-
(Advertising and Consumer Rights) (reporting a recommendation by Ed May, chief executive of Consumer Focus, to place all childrens websites under the supervision of the UK Advertising Standards Authority as an important step for childrens rights because "At the heart of our request are recent research findings that UK children really do not understand that the company websites they use are designed as a marketing activity to build brand loyalty and to generate sales".) (Summary EU Advertising and Consumer Rights Regulation), available at: http://www.euractiv.com/en/innovation/advertising-consumer-rights/ article-187133 (last accessed 7 June 2010)
-
Advertising and Consumer Rights, EurActiv.com (6 Jan. 2010) (Advertising and Consumer Rights) (reporting a recommendation by Ed May, chief executive of Consumer Focus, to place all childrens websites under the supervision of the UK Advertising Standards Authority as an important step for childrens rights because "At the heart of our request are recent research findings that UK children really do not understand that the company websites they use are designed as a marketing activity to build brand loyalty and to generate sales".) (Summary EU Advertising and Consumer Rights Regulation), available at: http://www.euractiv.com/en/innovation/advertising-consumer-rights/article- 187133 (last accessed 7 June 2010).
-
Advertising and Consumer Rights, EurActiv.com (6 Jan. 2010)
-
-
-
38
-
-
77957965332
-
-
note 38 (discussing the need to make allowances for vulnerable groups of consumers through regulation of advertising)
-
Advertising and Consumer Rights, note 38 (discussing the need to make allowances for vulnerable groups of consumers through regulation of advertising).
-
Advertising and Consumer Rights
-
-
-
40
-
-
77957942586
-
-
last accessed 7 June 2010
-
Countries, U.S., European Commission Trade, available at:http://ec.europa.eu/trade/creating-opportunities/bilateralrelations/ countries/united-states/index-en.htm (last accessed 7 June 2010).
-
Countries, U.S., European Commission Trade
-
-
-
42
-
-
67649951505
-
Consumer acceptance of electronic commerce
-
(defining trust in online retailing as "the belief that allows consumers to willingly become vulnerable to web retailers after having taken the retailers characteristics into consideration"); Consumers trust toward an online retailer is influenced by their perception of the likelihood that their personal information will not be abused
-
Pavlou, P.A., Consumer acceptance of electronic commerce: Integrating Trust and Risk with the Technology Acceptance Model. 7(3) International Journal of Electronic Commerce, pp. 105e106 (2003) (defining trust in online retailing as "the belief that allows consumers to willingly become vulnerable to web retailers after having taken the retailers characteristics into consideration"); Consumers trust toward an online retailer is influenced by their perception of the likelihood that their personal information will not be abused.
-
(2003)
Integrating Trust and Risk with the Technology Acceptance Model. 7(3) International Journal of Electronic Commerce
, pp. 105-106
-
-
Pavlou, P.A.1
-
43
-
-
33745325788
-
Your privacy is sealed: Effects of web privacy seals on trust and personal disclosures
-
Rifon et al., Your Privacy is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures, 39(2) Journal of Consumer Affairs, p. 345 (2005).
-
(2005)
Journal of Consumer Affairs
, vol.39
, Issue.2
, pp. 345
-
-
Rifon1
-
44
-
-
77957947341
-
-
note
-
Council Directive 2005/29/EC, OJ L 149/22, 11.06.2005 (Unfair Commercial Practices Directive) (last accessed 15 Jan. 2010); The Federal Trade Commission Act, 15 U.S.C. x 57a(a)(1)(b) (2010) (prohibiting unfair or deceptive trade practices). The European Unions Unfair Commercial Practices Directive, which must be implemented into Member-States laws and allows Member States to adopt national laws that provide additional health and safety protections for consumers, is similar to the Federal Trade Commission Act in the United States (FTC Act). Both EU and U.S. laws apply to unfair and deceptive marketing practices.compare U.S.C. x 57a(a)(1)(b) (2010) (providing FTC enforcement authority that covers unfair or deceptive acts or practices that occur in or affect interstate commerce) and the EUs Unfair Commercial Practices Directive, arts. 3, 11, 19. U.S. law also allows U.S. states to adopt laws that are more protective of consumers than the federal law. FTC, Comments of Verizon Wireless in re Telemarketing Sales Rules Review, FTC File No. P994414 (Fed. Trade Commn 16 May 2006), available at: http://www.ftc.gov/bcp/rulemaking/tsr/comments/ verizon.htm (last accessed 7 June 2010). However, unlike the FTC Act, the EUs Unfair Commercial Practices Directive more specifically defines prohibited business practices. See, for example, Unfair Commercial Practices Directive, arts. 6 (defining misleading actions), 7 (defining misleading omissions), 8 (defining aggressive commercial practices), 9 (prohibiting use of harassment, coercion and undue influence).
-
-
-
-
45
-
-
77957942810
-
-
note
-
For an example of a Federal Trade Commission enforcement action against a company that violated its own privacy policy, see Agreement Containing Consent Order, Gateway Learning Corp., File No. 042-3047 (Fed. Trade Commn 2003), available at: http://www.ftc.gov/os/caselist/0423047/040707agree0423047.pdf(last accessed 7 June 2010). See also, 15 U.S.C. x 57a(a)(1)(b); Unfair Commercial Practices Directive, note 44, art. 6(2)(b) (prohibiting, as a misleading action, the non-compliance with commitments made by a business that are capable of being verified (e.g., not merely aspirational) and made by a business in a code of conduct to which the business has agreed to be bound). The situation of businesses adopting privacy policies but failing to follow them is an example of the weakness in relying on industry self-regulation to protect consumers privacy and personal data and why government regulation may be needed.
-
-
-
-
46
-
-
77957965334
-
-
(discussing the Federal Trade Commissions enforcement action in The BJs Wholesale Club Case from September 2005 which concluded it is an unfair trade practice for a business to collect sensitive personal information, such as credit card numbers, unless reasonable security exists to protect the information). The EUs Data Protection Directive requires data controllers to provide security for personal data whether or not the data is sensitive. Data Protection Directive, note 28, art. 17
-
See Eisenhauer, M., The IAPP Information Privacy Case Book: A Global Survey of Privacy and Security Enforcement Actions With Recommendations for Reducing Risks, International Association of Privacy Professionals (IAPP), pp. 53-55 (2008) (discussing the Federal Trade Commissions enforcement action in The BJs Wholesale Club Case from September 2005 which concluded it is an unfair trade practice for a business to collect sensitive personal information, such as credit card numbers, unless reasonable security exists to protect the information). The EUs Data Protection Directive requires data controllers to provide security for personal data whether or not the data is sensitive. Data Protection Directive, note 28, art. 17.
-
(2008)
The IAPP Information Privacy Case Book: A Global Survey of Privacy and Security Enforcement Actions with Recommendations for Reducing Risks, International Association of Privacy Professionals (IAPP)
, pp. 53-55
-
-
Eisenhauer, M.1
-
47
-
-
77957964305
-
When mobile phones are RFID-equipped, finding E.U.-U.S. solutions to protect consumer privacy and facilitate mobile commerce, 15 Michigan telecommunications and technology law review
-
(King, MTTLR (2008)). Under the European Unions regulatory framework, mobile phone devices and mobile communication services are regulated as information society services. See Thematic Portal, Information Society and Media Directorate, European Commission last accessed 7 June 2010 Directive of the European Parliament and of the Council 2000/31/EC of 8 June 2000 on Certain Legal Aspects of Information Society Services, in Particular e-Commerce, in the Internal Market, OJ L 178/1,17.07. 2000, preamble paras. 2, 4e5, 7e9 (E-Privacy Directive). The ECommerce Directive requires that specified types of information be included in promotional offers and that required information be clear. Ibid. art. 6. Advertisements, including m-ads, must be identifiable to the consumer as commercial communications. Ibid. arts. 6(a), 7
-
King, N., When Mobile Phones Are RFID-Equipped, Finding E.U.-U.S. Solutions to Protect Consumer Privacy and Facilitate Mobile Commerce, 15 Michigan Telecommunications and Technology Law Review, pp. 156e168 (2008) (King, MTTLR (2008)). Under the European Unions regulatory framework, mobile phone devices and mobile communication services are regulated as information society services. See Thematic Portal, Information Society and Media Directorate, European Commission, at: http://ec.europa. eu/information-society/index-en.htm (last accessed 7 June 2010). Regulation of e-commerce is generally addressed as regulation of information society services. See, e.g., Directive of the European Parliament and of the Council 2000/31/EC of 8 June 2000 on Certain Legal Aspects of Information Society Services, in Particular e-Commerce, in the Internal Market, OJ L 178/1,17.07. 2000, preamble paras. 2, 4e5, 7e9 (E-Privacy Directive). The ECommerce Directive requires that specified types of information be included in promotional offers and that required information be clear. Ibid. art. 6. Advertisements, including m-ads, must be identifiable to the consumer as commercial communications. Ibid. arts. 6(a), 7.
-
(2008)
Regulation of E-commerce is Generally Addressed as Regulation of Information Society Services
, pp. 156-168
-
-
King, N.1
-
48
-
-
77957963049
-
-
King, MTTLR (2008), note 47, pp. 156e168
-
King, MTTLR (2008), note 47, pp. 156e168.
-
-
-
-
49
-
-
77957943772
-
-
note
-
Summary EU Advertising and Consumer Rights Regulation, note 38, pp. 2e3 (commenting that "in principle, advertisers are bound by the code of conduct set out by the International Chamber of Commerce [ICC code of conduct], but electronic communications is outgrowing the current regulation and raising important questions regarding advertising and consumer rights in the online world".). See ICC International Code of Advertising Practice, Commission on Marketing, Advertising and Distribution (French Version, April 1997) (ICC code of conduct), available at: http://www.iccwbo.org/id905/index.html (last accessed 7 June 2010). In 2008 the Digital Marketing Communications Best Practice guidebook (October 2008) was produced by self-regulatory organizations that included advertising agencies (available at the website of the European Advertising Standards Alliance (EASA), www.easa-alliance.org) (last accessed 7 June 2010). Behavioural advertising was a particular concern raised in the European Commissions European Consumer Summit in 2009. On the topic of behavioural advertising, EU Consumer Affairs Commissioner Kuneva warned: "there is a lack of consumer awareness surrounding the collection of data", yet "personal data is the new oil of the Internet and the currency of the digital world". See Summary EU Advertising and Consumer Rights Regulation, note 38, p. 4
-
-
-
-
50
-
-
77957958879
-
-
note
-
Regulation (EC) No 1211/2009 of the European Parliament and scope by defining personal data as information relating to an of the Council of 25 November 2009 establishing the Body of European Regulators for Electronic Communications (BEREC) and the Office; Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002/22/EC on universal service and users rights relating to electronic communications networks and services; Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector; Regulation (EC) No 2006/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws; Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009 amending Directives 2002/21/EC on a common regulatory framework for electronic communications networks and services; 2002/19/EC on access to, and interconnection of, electronic communications networks and associated facilities; and 2002/20/EC on the authorization of electronic communications networks and services, OJ L 337, 18.12.09, pp. 1-69 (EU Telecoms Reform Package).
-
-
-
-
51
-
-
77957971082
-
-
Federal Trade Commission, Self-Regulatory Principles For online behavioral advertising, February 2009 (FTC Guidelines), available at last accessed7 June2010 MediaWeek (21 Mar.) (reporting that U.S. Representative Rich Boucher is expected to introduce a newconsumer privacy bill that will "impact the entire 25 billion online ad market and that the proposed financial reform bill would greatly expand the regulatory powers of the Federal Trade Commission). To date, draft legislation thatwould regulate the online behavioural advertising industry has been circulatedfor comment.SeeStaff DiscussionDraft,H.R.-,ABill to require notice and consent of an individual prior to the collection and disclosure of certain personal information relating to that individual, In the House of Representatives, 111th Congress, 1st Session (3 May 2010), available at: http://www.boucher.house.gov/images/stories/Privacy- Draft-5-10.pdf(last accessed 7 June 2010)
-
Federal Trade Commission, Self-Regulatory Principles For online behavioral advertising, February 2009 (FTC Guidelines), available at: http://www.ftc.gov/os/2009/02/P085400behavadreport.pdf(last accessed7 June2010); Shields,M., PatrollingBadBehaviour, New FTC powers, Boucher Bill could crimp Web , MediaWeek (21 Mar. 2010) (reporting that U.S. Representative Rich Boucher is expected to introduce a newconsumer privacy bill that will "impact the entire 25 billion online ad market and that the proposed financial reform bill would greatly expand the regulatory powers of the Federal Trade Commission). To date, draft legislation thatwould regulate the online behavioural advertising industry has been circulatedfor comment.SeeStaff DiscussionDraft,H.R.-,ABill to require notice and consent of an individual prior to the collection and disclosure of certain personal information relating to that individual, In the House of Representatives, 111th Congress, 1st Session (3 May 2010), available at: http://www.boucher.house.gov/images/stories/Privacy-Draft-5-10.pdf(last accessed 7 June 2010).
-
(2010)
Patrolling Bad Behaviour, New FTC Powers, Boucher Bill Could Crimp Web
-
-
Shields, M.1
-
52
-
-
77957940476
-
-
note
-
See Treaty of Lisbon amending the Treaty on European Union, the Treaty establishing the European Community, OJ C 306/1, 17.12. 2007 (recognizing Article 8 of the European Convention for the Protection ofHuman Rights and Fundamental Freedoms(ECHR) and requiring Members of the European Union to respect the fundamental rights guaranteed by the Convention), consolidated version, available at: http://eur-lex.europa.eu/JOHtml.do/uriOJ:C:2008:115: SOM:EN:HTML (last accessed 7 June 2010). The Charter of Fundamental Rights of the European Union provides: "Everyone has the right to the protection of personal data concerning him or her". Charter of Fundamental Rights of the EuropeanUnion, art. 8, 2000 OJ C 364/1 (hereinafter EU Charter), available at: http://www.europarl. europa.eu/charter/pdf/text-en.pdf(last accessed 7 June 2010).
-
-
-
-
53
-
-
77957957185
-
-
See Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data including its additional protocol (CETS 108, 1981 and CETS 181, 2001, hereinafter convention 108) 31st International Conference of Data Protection and Privacy Commissioners, Madrid, Spain (5 Nov. 2009) (explaining the application of the ECHR and convention to automatic profiling practices including online behavioural advertising), available at last accessed 7 June 2010 See also, European Court of Justice, In re Bodil Lindqvist Case C-101/2001, recital 27, judgment 6 Nov. 2003 (holding the "act of referring, on an Internet page, to various persons and identifying them by name or by other means, for instance by giving their telephone number or information regarding their working conditions and hobbies, constitutes the processing of personal data wholly or partly by automatic means within the meaning of Article 3(1) of Directive 95/46)
-
See Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data including its additional protocol (CETS 108, 1981 and CETS 181, 2001, hereinafter convention 108); Polakiewicz, J, "Smile! Theres a camera behind the ad or Send it to a friend: privacy in light of the new advertising techniques", 31st International Conference of Data Protection and Privacy Commissioners, Madrid, Spain (5 Nov. 2009) (explaining the application of the ECHR and convention to automatic profiling practices including online behavioural advertising), available at: http://www.coe.int/t/e/ legal- affairs/legal-co-operation/data-protection/Intervention% 20Madrid%20Conference%205%20November%202009.pdf(last accessed 7 June 2010). See also, European Court of Justice, In re Bodil Lindqvist Case C-101/2001, recital 27, judgment 6 Nov. 2003 (holding the "act of referring, on an Internet page, to various persons and identifying them by name or by other means, for instance by giving their telephone number or information regarding their working conditions and hobbies, constitutes the processing of personal data wholly or partly by automatic means within the meaning of Article 3(1) of Directive 95/46").
-
Smile! Theres A Camera behind the Ad or Send It to A Friend: Privacy in Light of the New Advertising Techniques
-
-
Polakiewicz, J.1
-
54
-
-
77957938032
-
-
See generally note 28; E-Privacy Directive, note 47
-
See generally, Data Protection Directive, note 28; E-Privacy Directive, note 47.
-
Data Protection Directive
-
-
-
56
-
-
0347793132
-
International covenant on civil and political rights and optional protocol to the international covenant on civil and political rights
-
Data Protection Directive, note 28, art. 4. preamble para. 10 Privacy as a fundamental right is also recognized in international law U.N. GAOR, 21st Sess., Supp. No.16, U.N. Doc. A/6316 (ICCPR)
-
Data Protection Directive, note 28, art. 4. preamble para. 10 (providing that "the object of the national laws on the processing of personal data is to protect fundamental rights and freedoms, notably the right to privacy, which is recognized both in Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms and in the general principles of Community law"). Privacy as a fundamental right is also recognized in international law. See, e.g., International Covenant on Civil and Political Rights and Optional Protocol to the International Covenant on Civil and Political Rights, G.A. Res. 2200 (XXI), U.N. GAOR, 21st Sess., Supp. No.16, U.N. Doc. A/6316 (1966) (ICCPR).
-
(1966)
G.A. Res.
, vol.21
, pp. 2200
-
-
-
57
-
-
77957934475
-
-
note
-
Data Protection Directive, note 28, art. 2(a) (including natural persons "who canbe identified, directly or indirectly, inparticular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity"). But see Dinant et al., note 6, pp. 12e14 (stating that, unlike the other provisions in the Data Protection Directive, Article of this directive, which deals with automated individual decisions, may make it unlawful tomake a decision about an individual solely on the basis of automated data processing, even when no personally-identifying information is used in the process, if several cumulative conditions are met). The Data Protection Directive defines the processing of personal data broadly as "any operation or set ofoperationswhichisperformeduponpersonaldata,whether or not byautomaticmeans, such as collection, recording, organization, storage, adaptation or alteration, retrieval,.use,.dissemination, [etc]". Data Protection Directive, note 28, art. 2(b).
-
-
-
-
58
-
-
77957939705
-
-
Data Protection Directive, note 28, art. 10
-
Data Protection Directive, note 28, art. 10.
-
-
-
-
59
-
-
77957945073
-
-
note
-
The eight requirements to process personal data in the EU are: 1) fair and lawful processing; 2) collection and processing only for a proper purpose; 3) that data be adequate, relevant and not excessive; 4) that data be accurate and up to date; 5) that data be retained no longer than necessary; 6) that the data subject (consumer) have access to his or her data from the data controller; 7) that the data be kept secure; and 8) no transfer of personal data to a country that does not provide an adequate level of privacy and personal data protection. See generally, Data Protection Directive, note 28, arts. 6 et seq.
-
-
-
-
60
-
-
77957940074
-
-
Data Protection Directive, note 28, art. 6(1)(b)
-
Data Protection Directive, note 28, art. 6(1)(b).
-
-
-
-
61
-
-
77957951732
-
-
Data Protection Directive, note 28, art. 7
-
Data Protection Directive, note 28, art. 7.
-
-
-
-
62
-
-
77957939706
-
-
Data Protection Directive, note 28, art. 12
-
Data Protection Directive, note 28, art. 12.
-
-
-
-
63
-
-
77957935306
-
-
Data Protection Directive, note 28, art. 6(1)(c)
-
Data Protection Directive, note 28, art. 6(1)(c).
-
-
-
-
64
-
-
77957950280
-
-
Data Protection Directive, note 28, art. 8 (prohibiting the processing of special categories of personal data without explicit consent, with certain exceptions)
-
Data Protection Directive, note 28, art. 8 (prohibiting the processing of special categories of personal data without explicit consent, with certain exceptions).
-
-
-
-
65
-
-
84885131830
-
-
note 28, see also National Data Protection Commissioners last accessed 7 June 2010
-
See Data Protection Directive, note 28, p. see also National Data Protection Commissioners, http://ec.europa.eu/justice- home/fsj/privacy/ nationalcomm/index-en.htm (last accessed 7 June 2010).
-
Data Protection Directive
-
-
-
66
-
-
77957940269
-
-
note 47, art. 1 (does not reflect 2009 amendments by the EU Telecoms Reform Package, note 50)
-
E-Privacy Directive, note 47, art. 1 (does not reflect 2009 amendments by the EU Telecoms Reform Package, note 50).
-
E-Privacy Directive
-
-
-
67
-
-
77957940269
-
-
note 47, art. 13(1). It specifically covers telemarketing calls made by autodialing equipment and electronic mail. Ibid. The exception only applies if all of the following conditions are met: (1) the consumer is a customer of the person sending the direct marketing communications; (2) the consumers electronic contact details were obtained by the person sending the direct marketing from the consumer in the context of a sale of a product or service; and (3) the consumer has the opportunity to object, free of charge, at the time the contact details were collected as well as later, to the sending of direct marketing communications. Ibid
-
E-Privacy Directive, note 47, art. 13(1). It specifically covers telemarketing calls made by autodialing equipment and electronic mail. Ibid. The exception only applies if all of the following conditions are met: (1) the consumer is a customer of the person sending the direct marketing communications; (2) the consumers electronic contact details were obtained by the person sending the direct marketing from the consumer in the context of a sale of a product or service; and (3) the consumer has the opportunity to object, free of charge, at the time the contact details were collected as well as later, to the sending of direct marketing communications. Ibid.
-
E-Privacy Directive
-
-
-
68
-
-
77957961603
-
-
note 47, art.
-
E-Privacy Directive, note 47, art. 13(2).
-
E-Privacy Directive
, vol.1
, pp. 2
-
-
-
69
-
-
77957966269
-
-
The E-Privacy Directive prohibits using electronic communications networks to store information or to gain access to information stored in the terminal equipment of the subscriber or user unless consumers have been given clear and comprehensive information consistent with the Data Protection Directive and the opportunity to refuse processing of their personal data Recent amendments to the E-Privacy Directive enhance consumers privacy with respect to cookies but are not yet effective. See Section 5.1 of this article (the EUs Telecoms Reform Package)
-
The E-Privacy Directive prohibits using electronic communications networks to store information or to gain access to information stored in the terminal equipment of the subscriber or user unless consumers have been given clear and comprehensive information consistent with the Data Protection Directive and the opportunity to refuse processing of their personal data. E-Privacy Directive, note 47, art. 5(3). Recent amendments to the E-Privacy Directive enhance consumers privacy with respect to cookies but are not yet effective. See Section 5.1 of this article (the EUs Telecoms Reform Package).
-
E-Privacy Directive, Note 47, Art.
, vol.5
, pp. 3
-
-
-
70
-
-
84856429470
-
-
(Alfred Büllesbach et al. eds.)
-
See Concise European IT Law, pp. 169-170 (Alfred Büllesbach et al. eds., 2006).
-
(2006)
Concise European IT Law
, pp. 169-170
-
-
-
71
-
-
77957940269
-
-
Traffic data is "any data processed for the purpose of the conveyance of a communication on an electronic communications network or for the billing thereof" note 47, art.2(b). Location data means "any data processed in an electronic communications network, including the geographic position of the terminal equipment of a user of a publicly available electronic communications service". Ibid. art. 2(c).
-
Traffic data is "any data processed for the purpose of the conveyance of a communication on an electronic communications network or for the billing thereof". E-Privacy Directive, note 47, art.2(b). Location data means "any data processed in an electronic communications network, including the geographic position of the terminal equipment of a user of a publicly available electronic communications service". Ibid. art. 2(c). The definition of location data has recently been amended broadening its scope as follows: "location data means any data processed in an electronic communications network or by an electronic communications service, indicating the geographic position of the terminal equipment of a user of a publicly available electronic communications service". EU Telecoms Reform Package, note 50, at art. 2(c) (emphasis added to highlight the new wording). The scope of the E-Privacy Directive was also amended to clarify that it applies "to the processing of personal data in connection with the provision of publicly available electronic communications services in public communications networks in the Community, including public communications networks supporting data collection and identification devices". EU Telecoms Reform Package, note 50, art. 3.
-
E-Privacy Directive
-
-
-
72
-
-
77957956278
-
-
note 47, art. 6(3). Furthermore, the public carrier must erase or make anonymous such traffic data when it is no longer needed for the purpose of transmitting a communication, unless the subscriber has given consent or another exception applies. Ibid. art.
-
E-Privacy Directive, note 47, art. 6(3). Furthermore, the public carrier must erase or make anonymous such traffic data when it is no longer needed for the purpose of transmitting a communication, unless the subscriber has given consent or another exception applies. Ibid. art. 6(1).
-
E-Privacy Directive
, vol.6
, pp. 1
-
-
-
73
-
-
77957936413
-
-
note 47, art. Article 9 also gives subscribers the right to withdraw their consent to the use of location data that is personal data. Ibid. art. 9(1)e(3). Location data: "May refer to the latitude, longitude and altitude of the users terminal equipment, to the direction of travel; to the level of accuracy of the location information; to the identification of the network cell in which the terminal equipment is located at a certain point in time and to the time the location was recorded". Ibid. preamble para. 14. Access to location data is essential to providing location-based services through a telecommunications network
-
E-Privacy Directive, note 47, art. 9(1). Article 9 also gives subscribers the right to withdraw their consent to the use of location data that is personal data. Ibid. art. 9(1)e(3). Location data: "May refer to the latitude, longitude and altitude of the users terminal equipment, to the direction of travel; to the level of accuracy of the location information; to the identification of the network cell in which the terminal equipment is located at a certain point in time and to the time the location was recorded". Ibid. preamble para. 14. Access to location data is essential to providing location-based services through a telecommunications network.
-
, vol.9
, pp. 1
-
-
Directive, E.1
-
74
-
-
78650345071
-
Review of the European data protection directive
-
(Information Commissioners Office) (Rand Report)
-
See also, Robinson et al., Review of the European Data Protection Directive, Rand Europe, pp. 22-40 (Information Commissioners Office, 2009) (Rand Report).
-
(2009)
Rand Europe
, pp. 22-40
-
-
Robinson1
-
75
-
-
33750246340
-
-
note 74
-
Rand Report, note 74, pp. 45e46.
-
Rand Report
, pp. 45-46
-
-
-
76
-
-
33750246340
-
-
note 74
-
Rand Report, note 74, p. 24.
-
Rand Report
, pp. 24
-
-
-
77
-
-
77957583537
-
Are IP addresses "personally-identifiable information"?
-
Static IP addresses do not change and the same number is assigned to the same computer over time In contrast, dynamic IP addresses are assigned to a computer for the duration of the users Internet session and a new IP address number is assigned for each subsequent Internet use session. Ibid. Further, even with assignment of a dynamic IP address that is not a hybrid IP address, it may be realistically possible to identify an individual user because other data is captured about the users computer system or other personal data is available to enable identification and tracking of the user. Ibid. pp. 692e704
-
Static IP addresses do not change and the same number is assigned to the same computer over time. Lah, F., Are IP Addresses "personally-identifiable information"? 4 I/S: A Journal of Law and Policy for the Information Society, pp. 689e692 (2008e2009). In contrast, dynamic IP addresses are assigned to a computer for the duration of the users Internet session and a new IP address number is assigned for each subsequent Internet use session. Ibid. Static IP addresses serve as constant identifiers, permitting individuals online behaviour to be tracked over time and creation of individual profiles. Ibid. A third form of IP addresses, sometimes called "hybrid" IP addresses, are dynamically assigned IP addresses that include a static component. Ibid. Like static IP addresses, hybrid IP addresses may enable identification of the user with some degree of accuracy and better support the creation of consumer profiles. Ibid. (reporting that current IP addressing technology can contain a Host ID, or interface identifier, "that remains constant even when the Network ID, or topographic portion, of the address changes" and thus "may be considered a hybrid of the static and dynamic forms of IP addresses, with part of it remaining constant and the other part changing"). This type of "constant interface identifier could potentially be used to track the movement and usage of a particular device as it connects from different locations". Ibid. Further, even with assignment of a dynamic IP address that is not a hybrid IP address, it may be realistically possible to identify an individual user because other data is captured about the users computer system or other personal data is available to enable identification and tracking of the user. Ibid. pp. 692e704.
-
(2008)
4I/S: A Journal of Law and Policy for the Information Society
, pp. 689-692
-
-
Lah, F.1
-
80
-
-
65549101538
-
Data protection legislation: What is at stake for our society and democracy?
-
(discussing secondary identifiers that include IP addresses)
-
Poullet, Y., Data protection legislation: What is at stake for our society and democracy? 25 Computer Law and Security Review, p. 220 (2009) (discussing secondary identifiers that include IP addresses).
-
(2009)
25 Computer Law and Security Review
, pp. 220
-
-
Poullet, Y.1
-
81
-
-
77957966690
-
-
Article 29 Data Protection Working Partys, Opinion 4/2007 on the Concept of Personal Data, pp. 16e17, 01248/07/EN/WP 136 (June 20, 2007) [hereinafter Art. 29 Opinion 4/2007], available at: Recently the Article 29 Data Protection Working Party sent a letter to three major search engines (Google, Yahoo! and Microsofts Bing) warning them that their "methods of making users search data anonymous", including retention of users IP addresses for periods longer than necessary, were in conflict with the EUs rules on data protection available at: http://www.euractiv.com/en/infosociety/internet-searchengines- scolded-eu-regulators-news-494549/utm-sourceEurActivNewsletter&utm- campaign2bbe971f0e-my-google-analytics-key&utm-mediumemail (last accessed 7 June 2010). Search engine data is an important source of tracking data for behavioural advertising
-
Article 29 Data Protection Working Partys, Opinion 4/2007 on the Concept of Personal Data, pp. 16e17, 01248/07/EN/WP 136 (June 20, 2007) [hereinafter Art. 29 Opinion 4/2007], available at: http://ec.europa.eu/justice-home/fsj/ privacy/docs/wpdocs/2007/wp136-en.pdf. Recently the Article 29 Data Protection Working Party sent a letter to three major search engines (Google, Yahoo! and Microsofts Bing) warning them that their "methods of making users search data anonymous", including retention of users IP addresses for periods longer than necessary, were in conflict with the EUs rules on data protection. Internet search engines scolded by EU regulators, EurActiv (27 May 2010), available at: http://www.euractiv.com/en/infosociety/internet-searchengines- scolded-eu-regulators-news-494549/utm-sourceEurActivNewsletter&utm- campaign2bbe971f0e-my- google-analytics-key&utm-mediumemail (last accessed 7 June 2010). Search engine data is an important source of tracking data for behavioural advertising.
-
Internet search engines scolded by EU regulators, EurActiv (27 May 2010)
-
-
-
82
-
-
77957950485
-
-
note 79
-
Art 29 Opinion 4/2007, note 79, p. 17.
-
(2007)
Art 29 Opinion
, vol.4
, pp. 17
-
-
-
83
-
-
77957970876
-
Germany rules IP address tracking reaches data protection law
-
A German association of data protection authorities has ruled that tracking using IP addresses breaches German law (9 Feb.) last accessed, 7 June. 2010 See IP Address in Anti-Piracy Probe Was Not Personal Data, Says French Court, Out-Law.com (2 Feb. 2010), Available At: Http://www.out-law.com//default. aspx/page10802 (Last Accessed 7 June 2010). the Courts Opinion Is Reported in French At: Http://www.legalis.net/jurisprudence-decision.php3/id-article2852 (Last Accessed 7 June 2010). Further, A Decision by the European Court of Justice Supports the View That IP Addresses Are Personal Data. See Online Behavioural Advertising, What All Global Companies Need to Know, Baker & McKenzie (Materials Provided for A Seminar on This Topic Held on 18 May 2010, Referencing Promusicae V. Telefonica, A Decision of the European Court of Justice, 29 Jan.
-
A German association of data protection authorities has ruled that tracking using IP addresses breaches German law. See Germany rules IP address tracking reaches data protection law, Napier News (9 Feb. 2010), available at: http://www.napiernews. eu/2010/02/germany-rules-ip-address-tracking-breaches- dataprotection- law/(last accessed, 7 June. 2010). In contrast, A French Court
-
(2008)
Napier News Contrast, A French Court Held An IP Address Was Not Personal Data
-
-
-
84
-
-
48349111313
-
Access channels in m-commerce services
-
Cavtat, Croatia (June 25-28) (describing access channels for mobile users to m-commerce including those in the mobile operator network, WAP (Wireless Application Profile) and WLAN/WiFi (Wireless Local Access Networks). On the other hand, mobile users who access the Internet from a mobile phone using a cellular providers data service or using WAP (Wireless Application Protocol) generally do not reveal their individual IP addresses. Ibid
-
Sarajlic, A. and Omerasevic, D., Access Channels in m- Commerce Services, Proceedings of the ITI 2007 29th Int.conf. on Information Technology Interfaces, Cavtat, Croatia, pp. 507e512 (June 25e28, 2007)(describing access channels for mobile users to m-commerce including those in the mobile operator network, WAP (Wireless Application Profile) and WLAN/WiFi (Wireless Local Access Networks). On the other hand, mobile users who access the Internet from a mobile phone using a cellular providers data service or using WAP (Wireless Application Protocol) generally do not reveal their individual IP addresses. Ibid.
-
(2007)
Proceedings of the ITI 2007 29th Int.conf. on Information Technology Interfaces
, pp. 507-512
-
-
Sarajlic, A.1
Omerasevic, D.2
-
85
-
-
78649314041
-
Practical mobile internet access traceability
-
University of Cambridge (13 Jan.) last accessed 7 June 2010
-
Clayton, R., Practical mobile Internet access traceability, Light Blue Touchpaper, Security Research, Computer Laboratory, University of Cambridge (13 Jan. 2010), available at: http://www.lightbluetouchpaper.org/2010/01/13/ practical-mobile-internetaccess- traceability/(last accessed 7 June 2010).
-
(2010)
Light Blue Touchpaper, Security Research, Computer Laboratory
-
-
Clayton, R.1
-
86
-
-
77957958662
-
How unique is your web browser?
-
Fingerprinting algorithms may be applied to databases of information captured when an Internet users browser visits a website in order to produce a device fingerprint that can be used as a global identifier, akin to a cookie, to track the device. Ibid.
-
Eckersley, P., How Unique is Your Web Browser? Electronic Frontier Foundation (undated) (discussing that device fingerprints are a "means to distinguish machines behind a single IP address, even if those machines block cookies entirely"). Fingerprinting algorithms may be applied to databases of information captured when an Internet users browser visits a website in order to produce a device fingerprint that can be used as a global identifier, akin to a cookie, to track the device. Ibid. pp. 1e4.
-
Electronic Frontier Foundation (Undated) (Discussing That Device Fingerprints Are A "means to Distinguish Machines behind A Single IP Address, even if Those Machines Block Cookies Entirely")
, pp. 1-4
-
-
Eckersley, P.1
-
87
-
-
77957944230
-
-
See also Center for Digital Democracy and U.S. Public Interest Research Group, 13 January 2009 (CDD Complaint of Unfair or Deceptive Mobile Marketing Practices) (amending November 2006 petition to the FTC requesting an investigation into and relief from tracking and targeting practices in online advertising) last accessed, 7 June 2010 Currently certain browsers on mobile devices make them more difficult to fingerprint, however these devices lack good cookie control options so they are readily tracked by other means such as mobile cookies. Eckersley, p. 9. last accessed, 7 June 2010 Currently certain browsers on mobile devices make them more difficult to fingerprint, however these devices lack good cookie control options so they are readily tracked by other means such as mobile cookies. Eckersley http://www.democraticmedia.org/ current-projects/privacy/analysis/mobile-marketing
-
See also, Complaint and Request for Inquiry and Injunctive Relief Concerning Unfair and Deceptive Mobile Marketing Practices, Center for Digital Democracy and U.S. Public Interest Research Group, 13 January 2009 (CDD Complaint of Unfair or Deceptive Mobile Marketing Practices) (amending November 2006 petition to the FTC requesting an investigation into and relief from tracking and targeting practices in online advertising), available at: http://www.democraticmedia.org/current-projects/privacy/analysis/ mobile-marketing (last accessed, 7 June 2010). Currently certain browsers on mobile devices make them more difficult to fingerprint, however these devices lack good cookie control options so they are readily tracked by other means such as mobile cookies. Eckersley, p. 9.
-
Complaint and Request for Inquiry and Injunctive Relief Concerning Unfair and Deceptive Mobile Marketing Practices
-
-
-
88
-
-
84925126378
-
-
note 8 (arguing profiles "may be protected from access via intellectual property rights of the profiler or be considered part of the companys trade secrets)
-
Hildebrandt, note 8, p. 13 (arguing profiles "may be protected from access via intellectual property rights of the profiler or be considered part of the companys trade secrets)
-
Hildebrandt
, pp. 13
-
-
-
90
-
-
77957945495
-
-
note 8 See also note 74, p. 27 (Information Commissioners Office, 2009) (pointing out that one of the main weaknesses in the Data Protection Directive is that the link between the concept of personal data and real privacy risks is unclear)
-
Hildebrandt, note 8, p. 13. See also, Rand Report, note 74, p. 27 (Information Commissioners Office, 2009) (pointing out that one of the main weaknesses in the Data Protection Directive is that the link between the concept of personal data and real privacy risks is unclear).
-
Rand Report
, pp. 13
-
-
Hildebrandt1
-
92
-
-
77957962038
-
-
Data Protection Directive, note 28 (art. 8) (prohibiting the processing of special categories of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, and the processing of data concerning health or sex life unless the data subject has given their explicit consent or there are other legitimate grounds for processing the data)
-
Data Protection Directive, note 28 (art. 8) (prohibiting the processing of special categories of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, and the processing of data concerning health or sex life unless the data subject has given their explicit consent or there are other legitimate grounds for processing the data).
-
-
-
-
95
-
-
77957955854
-
-
These privacy gaps are further addressed in the second article in this series on Profiling the Mobile Customer that will appear in the next volume of the CLSR
-
These privacy gaps are further addressed in the second article in this series on Profiling the Mobile Customer that will appear in the next volume of the CLSR.
-
-
-
-
96
-
-
0000320829
-
The right to privacy
-
(arguing individuals have a "right to be let alone"); King, N., Fundamental Human Right Principle Inspires U.S. Data Privacy Law, But Protection Are Less Than Fundamental, in Challenges of Privacy and Data Protection Law p. 76 (Cahiers Du Centre De Recherches Informatique Et Droit, 2008) (CRID treatise) (discussing the evolution of privacy law in the U.S. and concluding U.S. privacy law falls short of protections data privacy as a fundamental human right)
-
Warren, Samuel and Brandeis, Louis, The Right to Privacy, 4 Harvard Law Review, pp. 193e195 (1890) (arguing individuals have a "right to be let alone"); King, N., Fundamental Human Right Principle Inspires U.S. Data Privacy Law, But Protection Are Less Than Fundamental, in Challenges of Privacy and Data Protection Law p. 76 (Cahiers Du Centre De Recherches Informatique Et Droit, 2008) (CRID treatise) (discussing the evolution of privacy law in the U.S. and concluding U.S. privacy law falls short of protections data privacy as a fundamental human right).
-
(1890)
4 Harvard Law Review
, pp. 193-195
-
-
Warren, S.1
Brandeis, L.2
-
97
-
-
77957939505
-
-
note 93 97-98. As the U.S. Supreme Court said, "choices central to personal dignity and autonomy are central to the liberty protected by the Fourteenth Amendment [of the U.S.constitution]. At the heart of liberty is the right to define ones own concept of existence, of meaning, of the universe and of the mystery of human life". Ibid. (quoting Planned Parenthood of So. Pa v. Casey, 505 U.S. 833, 851 (U.S. S. Ct.)
-
See generally, CRID Treatise, note 93, pp. 85e87, 97e98. As the U.S. Supreme Court said, "choices central to personal dignity and autonomy are central to the liberty protected by the Fourteenth Amendment [of the U.S.constitution]. At the heart of liberty is the right to define ones own concept of existence, of meaning, of the universe and of the mystery of human life". Ibid. p. 85 (quoting Planned Parenthood of So. Pa v. Casey, 505 U.S. 833, 851 (U.S. S. Ct., 1992).
-
(1992)
CRID Treatise
, vol.85
, pp. 85-87
-
-
-
98
-
-
3042749885
-
-
(2nd ed.) (Solove et al.) (discussing numerous court opinions considering tort claims of intrusion into seclusion including wiretapping and other forms of electronic surveillance). To prevail in such a tort case the plaintiff must show both the unreasonable intrusion by the defendant and that the intrusion would be highly offensive to a reasonable person, but need not prove that the defendant publicly disclosed private information. Ibid, p.76; CRID Treatise, note 93, pp. 90e92
-
Solove, Daniel J., Rotenberg, Marc and Schwartz, Paul, Information Privacy Law, pp. 76e102 (2nd ed., 2006) (Solove et al.) (discussing numerous court opinions considering tort claims of intrusion into seclusion including wiretapping and other forms of electronic surveillance). To prevail in such a tort case the plaintiff must show both the unreasonable intrusion by the defendant and that the intrusion would be highly offensive to a reasonable person, but need not prove that the defendant publicly disclosed private information. Ibid, p.76; CRID Treatise, note 93, pp. 90e92.
-
(2006)
Information Privacy Law
, pp. 76-102
-
-
Solove, D.J.1
Rotenberg, M.2
Schwartz, P.3
-
99
-
-
80053926144
-
Just click submit: The collection, dissemination, and tagging of personally-identifying information
-
(describing U.S. federal privacy law as "sectoral, protecting only certain individuals in certain economic sectors against certain privacy-invading threats") (Ciocchetti (2008). By comparison, The Privacy Act of 1974, 5 U.S.C. x552(a), is a law of general application that protects the personal information of individuals in their records that are maintained by government, however it does not regulate private businesses collection or use of consumers personal information
-
Ciocchetti, Corey, Just Click Submit: The Collection, Dissemination, and Tagging of personally-identifying information, 10 Vanderbilt Journal of Entertainment and Technology Law, p. 609 (2008) (describing U.S. federal privacy law as "sectoral, protecting only certain individuals in certain economic sectors against certain privacy-invading threats") (Ciocchetti (2008). By comparison, The Privacy Act of 1974, 5 U.S.C. x552(a), is a law of general application that protects the personal information of individuals in their records that are maintained by government, however it does not regulate private businesses collection or use of consumers personal information.
-
(2008)
10 Vanderbilt Journal of Entertainment and Technology Law
, pp. 609
-
-
Corey, C.1
-
100
-
-
77957949176
-
Congressional subcommittees have been holding hearings to explore whether there is a need to regulate behavioural advertising, but no legislation has been adopted as of the date of this writing
-
Beginning in 2008 (23 April) (reporting that House of Representatives subcommittee hearings focused on efforts by Internet providers to collect and share data on consumers behaviour to target online advertising and cable companies to target ads at subscribers via their set top boxes) last accessed 7 June 2010 Noyes, Andrew, House Internet privacy, data breach bills could merge, CongressDaily (5 June 2009) (reporting that consumer privacy bills currently in Congressional subcommittees could be merged and that if adopted would give Web users greater protection in how information collected online is stored and used), available at: http://www.nextgov.com/nextgov/ng-20090506-2018.php (last accessed 7 June 2010)
-
Beginning in 2008, Congressional subcommittees have been holding hearings to explore whether there is a need to regulate behavioural advertising, but no legislation has been adopted as of the date of this writing. Schatz, Amy, Lawmakers Examine Privacy Practices at Cable, Web Firms, Wall Street Journal (23 April 2009) (reporting that House of Representatives subcommittee hearings focused on efforts by Internet providers to collect and share data on consumers behaviour to target online advertising and cable companies to target ads at subscribers via their set top boxes), available at: http://online.wsj.com/ article/SB124050539070948681.html (last accessed 7 June 2010); Noyes, Andrew, House Internet privacy, data breach bills could merge, CongressDaily (5 June 2009) (reporting that consumer privacy bills currently in Congressional subcommittees could be merged and that if adopted would give Web users greater protection in how information collected online is stored and used), available at: http://www.nextgov.com/nextgov/ng-20090506-2018.php (last accessed 7 June 2010).
-
(2009)
Schatz, Amy, Lawmakers Examine Privacy Practices at Cable, Web Firms, Wall Street Journal
-
-
-
101
-
-
77957949813
-
-
For example, unlike the U.S.constitution, Californias state constitution provides more privacy protection than the federal constitution because it applies in business to consumer contexts that do not involve government actions
-
For example, unlike the U.S.constitution, Californias state constitution provides more privacy protection than the federal constitution because it applies in business to consumer contexts that do not involve government actions. Cal.const. art. I x 1; Hill v. NCAA, 865 P.2d 638 (California, 1994).
-
(1994)
Cal.const. Art. i X 1; Hill V. NCAA, 865 P.2d 638 (California)
-
-
-
102
-
-
77957967535
-
-
Interview, NYMITY January (Callahan Interview) last accessed 7 June 2010
-
Interview, NYMITY, Mary Ellen Callahan, Behavioural Advertising, Hogan & Hartson LLP (January 2009) (Callahan Interview), available at: http://www.nymity.com/Free-Privacy- Resources/Privacy-Interviews/2009/Mary- Ellen-Callahan.aspx (last accessed 7 June 2010).
-
(2009)
Mary Ellen Callahan, Behavioural Advertising, Hogan & Hartson LLP
-
-
-
105
-
-
0004320806
-
-
Pub. L. No.104-191, 110 Stat. 1936 (codified, as amended, in 42 U.S. C. x 1936 and other sections of the U.S.code)
-
Health Insurance Portability and Accountability Act of 1996, Pub. L. No.104-191, 110 Stat. 1936 (codified, as amended, in 42 U.S. C. x 1936 and other sections of the U.S.code).
-
Health Insurance Portability and Accountability Act of 1996
-
-
-
108
-
-
77957943313
-
-
U.S.C. x222 (c) (requires telecommunications carriers to obtain customer approval to use, disclose or permit access to individually identifiable Customer Proprietary Network Information except to provide telecommunications services and related services or as required by law); 47 C.F.R. x 64.2003 (CPNI Regulation)
-
U.S.C. x222 (c) (requires telecommunications carriers to obtain customer approval to use, disclose or permit access to individually identifiable Customer Proprietary Network Information except to provide telecommunications services and related services or as required by law); 47 C.F.R. x 64.2003 (CPNI Regulation).
-
-
-
-
109
-
-
77957964307
-
-
King, FCLJ (2008), note 24, pp. 276e281
-
King, FCLJ (2008), note 24, pp. 276e281.
-
-
-
-
110
-
-
77957946584
-
-
King, FCLJ (2008), note 24, pp. 280e281
-
King, FCLJ (2008), note 24, pp. 280e281.
-
-
-
-
112
-
-
13844259700
-
-
15 U.S.C. x45 (Section 5). Deceptive practices include material misrepresentations or omissions that are likely to mislead reasonable consumers. Unfair practices are those that involve substantial harm to consumers where the harm is not reasonably avoidable by consumers and practices benefits to consumers do not outweigh the harm. Callahan Interview (2009), note 99
-
Federal Trade Commission Act (FTC Act), 15 U.S.C. x45 (Section 5). Deceptive practices include material misrepresentations or omissions that are likely to mislead reasonable consumers. Unfair practices are those that involve substantial harm to consumers where the harm is not reasonably avoidable by consumers and practices benefits to consumers do not outweigh the harm. Callahan Interview (2009), note 99.
-
Federal Trade Commission Act (FTC Act)
-
-
-
113
-
-
77957947754
-
-
See About FTC note 104
-
See About FTC, note 104.
-
-
-
-
118
-
-
77957939285
-
-
Since 2001 the Federal Trade Commission has brought at least twenty-three enforcement actions against companies that failed to provide reasonable protections for sensitive consumer information and it has brought at least eleven enforcement actions since 2004 that relate to misuse of spyware (9 July) (FTC Congressional Testimony), available at last accessed 7 June 2010
-
Since 2001 the Federal Trade Commission has brought at least twenty-three enforcement actions against companies that failed to provide reasonable protections for sensitive consumer information and it has brought at least eleven enforcement actions since 2004 that relate to misuse of spyware. FTC, Prepared Statement of the FTC on Behavioural Advertising, Before the Senate Committee on Commerce, Science, and Transportation, Washington, D.C., p.8 (9 July 2008) (FTC Congressional Testimony), available at: http://ftc.gov/os/2008/ 07/P085400behavioralad.pdf(last accessed 7 June 2010).
-
(2008)
FTC, Prepared Statement of the FTC on Behavioural Advertising, before the Senate Committee on Commerce, Science, and Transportation, Washington, D.C.
, pp. 8
-
-
-
119
-
-
77957944634
-
-
Solove et al. (2006), note 95, p. 32 (commenting that contracts often function "as a way of sidestepping state and federal law" that is designed to protect consumers privacy). For example, contractual language to acknowledge consumers consent to receive m-advertising or to use consumers personal data to generate advertising could be inserted in standard form contracts that consumers have little choice but to sign in order to receive the desired service
-
Solove et al. (2006), note 95, p. 32 (commenting that contracts often function "as a way of sidestepping state and federal law" that is designed to protect consumers privacy). For example, contractual language to acknowledge consumers consent to receive m-advertising or to use consumers personal data to generate advertising could be inserted in standard form contracts that consumers have little choice but to sign in order to receive the desired service.
-
-
-
-
120
-
-
79953677329
-
Advertiser tracking of Web surfing brings suits
-
Electronic Communications Privacy Act (ECPA), 18 U.S.C. x 2510 et seq.;Computer FraudandAbuse Act (CFAA), 18 U.S.C. x 1030 et seq.; Ng, note 35, pp. 374-382 (arguing the ECPA, which prohibits interception or unauthorized access to electronic communications but does not directly address online behavioural advertising (OBA), and the CFAA or analogous state laws that specifically regulate spyware could be used to regulate OBA) last accessed 7 June 2010
-
Electronic Communications Privacy Act (ECPA), 18 U.S.C. x 2510 et seq.;Computer FraudandAbuse Act (CFAA), 18 U.S.C. x 1030 et seq.; Ng, note 35, pp. 374-382 (arguing the ECPA, which prohibits interception or unauthorized access to electronic communications but does not directly address online behavioural advertising (OBA), and the CFAA or analogous state laws that specifically regulate spyware could be used to regulate OBA). See also, Baldas, T., Advertiser tracking ofWeb surfing brings suits, The National LawJournal (2 Mar. 2009), available at: http://www.law.com/jsp/nlj/PubArticleNLJ.jsp? id1202428674349&slreturn1 (last accessed 7 June 2010).
-
(2009)
The National LawJournal (2 Mar.)
-
-
Baldas, T.1
-
121
-
-
77957932722
-
-
Hotaling, note 11, pp. 549e550 (footnote146)
-
Hotaling, note 11, pp. 549e550 (footnote146)
-
-
-
-
123
-
-
77957935536
-
-
Ciocchetti (2008), note 96, p. 610
-
Ciocchetti (2008), note 96, p. 610.
-
-
-
-
124
-
-
77957932089
-
-
note 96, p. 610 (commenting that Congress has chosen not to mandate the posting of privacy policies for most companies operating Websites and that the threat of FTC scrutiny on broken privacy promises gives companies incentives to fail to post a privacy policy or to create a privacy policy that includes legalese and loopholes designed to avoid breaking any promises)
-
Ciocchetti (2008), note 96, p. 610. pp. 612e615 (commenting that Congress has chosen not to mandate the posting of privacy policies for most companies operating Websites and that the threat of FTC scrutiny on broken privacy promises gives companies incentives to fail to post a privacy policy or to create a privacy policy that includes legalese and loopholes designed to avoid breaking any promises).
-
(2008)
Ciocchetti
, pp. 612-615
-
-
-
125
-
-
77957934035
-
-
California Business and Professional Code x 22575 (requiring anyone collecting PII from a resident of the state to post a privacy policy, identify types of PII collected, disclose categories of external parties that information may be disclosed to, describe any policy allowing review or requested changes to PII, provide notice of how the company may alter its policy and include the effective date of the policy). See also Cal. Civ.code x 1798.83 (requiring, upon request, companies that disclose PII to third parties for direct marketing purposes to disclose the categories of PII the company has disclosed to third parties and the names of all third parties that received PII from the company for direct marketing purposes)
-
California Business and Professional Code x 22575 (requiring anyone collecting PII from a resident of the state to post a privacy policy, identify types of PII collected, disclose categories of external parties that information may be disclosed to, describe any policy allowing review or requested changes to PII, provide notice of how the company may alter its policy and include the effective date of the policy). See also Cal. Civ.code x 1798.83 (requiring, upon request, companies that disclose PII to third parties for direct marketing purposes to disclose the categories of PII the company has disclosed to third parties and the names of all third parties that received PII from the company for direct marketing purposes).
-
-
-
-
126
-
-
77957969215
-
-
note 96 (reporting the study of 25 most visited e-commerce websites in the U.S. which showed the vast majority reserve the right to collect PII and disseminate the information to unrelated third parties). He believes federal legislation is needed to require companies to either post a clear and conspicuous privacy policy that describes seven key PII practices in plain English or to associate (tag) their name to each piece of data they disseminate, with purchasers of the tagged PII being legally required to identify the seller whenever they solicit individuals identified by the purchased PII. It is argued such legislation will result in social pressure that will lead companies to draft and post better privacy policies. Ibid. p. 627
-
Ciocchetti (2008), note 96, p. 597 (reporting the study of 25 most visited e-commerce websites in the U.S. which showed the vast majority reserve the right to collect PII and disseminate the information to unrelated third parties). He believes federal legislation is needed to require companies to either post a clear and conspicuous privacy policy that describes seven key PII practices in plain English or to associate (tag) their name to each piece of data they disseminate, with purchasers of the tagged PII being legally required to identify the seller whenever they solicit individuals identified by the purchased PII. It is argued such legislation will result in social pressure that will lead companies to draft and post better privacy policies. Ibid. p. 627.
-
(2008)
Ciocchetti
, pp. 597
-
-
-
127
-
-
77957956949
-
-
U.S.C. x 222 (h)(1) (defining the scope of CPNI to include information that relates to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service . and that is made available to the carrier by the customer solely by virtue of the carrier-customer relationship). CPNI does not include collective data that relates to a group or category of services or customers, from which individual customer identities and characteristics have been removed. 47 U.S.C. x 222 (h)(2)
-
U.S.C. x 222 (h)(1) (defining the scope of CPNI to include information that relates to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service . and that is made available to the carrier by the customer solely by virtue of the carrier-customer relationship). CPNI does not include collective data that relates to a group or category of services or customers, from which individual customer identities and characteristics have been removed. 47 U.S.C. x 222 (h)(2).
-
-
-
-
128
-
-
77957952164
-
-
22 F.C.C.R. 6927 (2007 CPNI Order) (discussing the modification of the FCC rules to require carriers to obtain opt in consent n the form of express prior authorization from a customer before disclosing that customers CPNI to a carriers joint venture partner or independent contractor)
-
See Telecommunication Carriers Use of Customer Proprietary Network Information and Other Customer Information, Report and Order and further Notice of Proposed Rule-Making, 22 F.C.C.R. 6927, pp. 22e23 (2007) (2007 CPNI Order) (discussing the modification of the FCC rules to require carriers to obtain opt in consent n the form of express prior authorization from a customer before disclosing that customers CPNI to a carriers joint venture partner or independent contractor).
-
(2007)
Telecommunication Carriers Use of Customer Proprietary Network Information and Other Customer Information, Report and Order and Further Notice of Proposed Rule-Making
, pp. 22-23
-
-
-
129
-
-
77957961167
-
-
King, FCLJ (2008), note 24, at pp. 276e280
-
King, FCLJ (2008), note 24, at pp. 276e280.
-
-
-
-
132
-
-
77957947956
-
-
As mentioned earlier in this paper, a formal complaint was filed with the FTC in April 2010 by consumer privacy organizations asking the FTC to investigate businesses engaged in consumer profiling practices that are alleged to be unfair or deceptive practices in violation of Section 5 of the FTC Act. The scope of the requested investigation includes behavioural advertisers, third-party data providers, and other businesses providing ad-exchange systems that support the behavioural advertising industry and facilitate real-time consumer profiling. See generally, CDD Profiling Complaint, note 17. The Complaint provides a comprehensive description of the behavioural advertising industry and the development of real-time profiling technologies. The Complaint is still pending as of the publication date of this paper
-
As mentioned earlier in this paper, a formal complaint was filed with the FTC in April 2010 by consumer privacy organizations asking the FTC to investigate businesses engaged in consumer profiling practices that are alleged to be unfair or deceptive practices in violation of Section 5 of the FTC Act. The scope of the requested investigation includes behavioural advertisers, third-party data providers, and other businesses providing ad-exchange systems that support the behavioural advertising industry and facilitate real-time consumer profiling. See generally, CDD Profiling Complaint, note 17. The Complaint provides a comprehensive description of the behavioural advertising industry and the development of real-time profiling technologies. The Complaint is still pending as of the publication date of this paper.
-
-
-
-
134
-
-
77957948173
-
-
note
-
See EU Telecoms Reform Package, note 50 (incorporating E-Privacy Act Amendments, Art. 5(3)). These amendments expand the requirement to give notice and obtain the users consent to access or store information on the users terminal equipment to all situations where this occurs, even if the access or storage does not involve using an electronic communications network. Exceptions permit any technical storage or access for the sole purpose of carrying out the transmission of a communication over an electronic communications network or as strictly necessary in order for the provider of an information society service explicitly requested by the subscriber or user of the service. Ibid (based on comparison of Art. 5(3) of the E-Privacy Directive as adopted in 2002 with the amended version of Art. 5(3) as adopted in the EU Telecoms Reform Act).
-
-
-
-
135
-
-
77957959096
-
-
note 50, at para. 66. The preamble of the EU Telecoms Reform Package anticipates that the users consent to processing of personal data may be expressed by appropriate browser settings or other applications where this is technically possible. Ibid
-
EU Telecoms Reform Package, note 50, at para. 66. The preamble of the EU Telecoms Reform Package anticipates that the users consent to processing of personal data may be expressed by appropriate browser settings or other applications where this is technically possible. Ibid.
-
EU Telecoms Reform Package
-
-
-
136
-
-
77957961836
-
-
Hogan & Hartson (16 Nov.) last accessed 7 June 2010 But see Article 29 Data Protection Working Partys, Opinion 2/2010 on Online Behavioural Advertising, pp. 8,9 (00909/10/EN, WP 171, 22 June 2010) (Art. 29 Opinion 2/2010) which states that it is the private sphere of the data subject that triggers the obligations in Article 5 (3), not the fact that information is, or is not, personal data
-
Nauwelaerts, W., EU E-Privacy Directive and Cookies: The Consent Requirement May Not Be as Broad as Believed, Hogan & Hartson (16 Nov. 2009), available at: http://www.hhdataprotection.com/2009/11/articles/international- compliance-inclu/eu-eprivacydirective- and-cookies-the-consent-requirement-may- not-be-asbroad- as-believed/(last accessed 7 June 2010). But see Article 29 Data Protection Working Partys, Opinion 2/2010 on Online Behavioural Advertising, pp. 8,9 (00909/10/EN, WP 171, 22 June 2010) (Art. 29 Opinion 2/2010) which states that it is the private sphere of the data subject that triggers the obligations in Article 5 (3), not the fact that information is, or is not, personal data.
-
(2009)
EU E-Privacy Directive and Cookies: The Consent Requirement May Not Be As Broad As Believed
-
-
Nauwelaerts, W.1
-
138
-
-
77957970873
-
-
11 Nov. available at last accessed 7 June 2010 Member states shall adopt and publish by 25 May 2011 the laws, regulations and administrative provisions necessary to comply with the directive 2009/136, see EU Telecoms Reform Package, note 50, article 4(1)
-
Europe Approves New Cookie Law, The Wall Street Journal Blogs (11 Nov. 2009), available at: http://blogs.wsj.com/digits/2009/11/11/europe-approves-new- cookie-law/(last accessed 7 June 2010); Member states shall adopt and publish by 25 May 2011 the laws, regulations and administrative provisions necessary to comply with the directive 2009/136, see EU Telecoms Reform Package, note 50, article 4(1).
-
(2009)
Europe Approves New Cookie Law, the Wall Street Journal Blogs
-
-
-
154
-
-
77957935305
-
-
note 4 (para. 4.4). Whether opt in or opt out consent is required is not addressed by the Council of Europes Draft Recommendations, but presumably interpretations of these terms would be consistent with the requirements of the Data Protection Directive
-
CE Draft Recommendation on Profiling, note 4, p. 6 (para. 4.4). Whether opt in or opt out consent is required is not addressed by the Council of Europes Draft Recommendations, but presumably interpretations of these terms would be consistent with the requirements of the Data Protection Directive
-
CE Draft Recommendation on Profiling
, pp. 6
-
-
-
155
-
-
77957935305
-
-
note 4 (para. 7) (commenting that "profiles, when they are attributed to a data subject, make it possible to generate new personal data")
-
CE Draft Recommendation on Profiling, note 4, p. 2 (para. 7) (commenting that "profiles, when they are attributed to a data subject, make it possible to generate new personal data").
-
CE Draft Recommendation on Profiling
, pp. 2
-
-
-
158
-
-
77957943018
-
-
Member States of the European Union transfer national legislative and executive powers to the Council of the European Union, the European Parliament and the European Commission in specific areas under European Union law. In contrast, Member States that are members of the Council of Europe commit themselves through conventions developed by the Member-States working together at the Council of Europe that are instruments of public international law. Non-EU countries may sign such conventions so the membership of the Council of Europe is broader than EU membership
-
Member States of the European Union transfer national legislative and executive powers to the Council of the European Union, the European Parliament and the European Commission in specific areas under European Union law. In contrast, Member States that are members of the Council of Europe commit themselves through conventions developed by the Member-States working together at the Council of Europe that are instruments of public international law. Non-EU countries may sign such conventions so the membership of the Council of Europe is broader than EU membership.
-
-
-
-
160
-
-
77957935305
-
-
note 4 (para. 9) (providing that Member States may require advance notification or prior checking to the supervisory authority for processing that uses profiling and entails special privacy and data protection risks)
-
CE Draft Recommendation on Profiling, note 4, p. 10 (para. 9) (providing that Member States may require advance notification or prior checking to the supervisory authority for processing that uses profiling and entails special privacy and data protection risks).
-
CE Draft Recommendation on Profiling
, pp. 10
-
-
-
161
-
-
77957956738
-
Brave new digital world where data collection opportunities are many and data use opportunities are rich, "notice" is failing when it comes to privacy
-
(Sept.) (no author provided). See also, Lukovitz, K., FTCs Focus Re Privacy Issues Emerging, MediaPost News (29 Jan. 2010) (reporting that the FTC is exploring whether a more complete solution to protect consumers privacy is needed that goes beyond an approach based on the "notice and choice" concept of information privacy)
-
"[I]n the brave new digital world where data collection opportunities are many and data use opportunities are rich, "notice" is failing when it comes to privacy". On notice, consent, and radical transparency, The Privacy Advisor, p. (Sept. 2009) (no author provided). See also, Lukovitz, K., FTCs Focus Re Privacy Issues Emerging, MediaPost News (29 Jan. 2010) (reporting that the FTC is exploring whether a more complete solution to protect consumers privacy is needed that goes beyond an approach based on the "notice and choice" concept of information privacy).
-
(2009)
On Notice, Consent, and Radical Transparency, the Privacy Advisor
-
-
-
162
-
-
77957949811
-
Operating without consumers knowledge or authorization, [behavioural targeting or BT] technology undermines the ability of users to consent by failing to provide effective notice of its existence
-
note 11
-
"Operating without consumers knowledge or authorization, [behavioural targeting or BT] technology undermines the ability of users to consent by failing to provide effective notice of its existence". Hotaling, note 11, pp. 551-560.
-
Hotaling
, pp. 551-560
-
-
-
163
-
-
25844507044
-
A concise introduction to autonomic computing
-
The question of whether notice and choice mechanisms are adequate to protect consumers privacy in ubiquitous computing environments and this era of autonomic computing is an important question and one that deserves much discussion and analysis. See generally, sources referenced in note 160 As such, it is beyond the scope of this paper
-
The question of whether notice and choice mechanisms are adequate to protect consumers privacy in ubiquitous computing environments and this era of autonomic computing is an important question and one that deserves much discussion and analysis. See generally, sources referenced in note 160; Sterritt et.al, A concise introduction to autonomic computing, 19 Advanced Engineering Informatics, pp. 181e187 (2005). As such, it is beyond the scope of this paper.
-
(2005)
19 Advanced Engineering Informatics
, pp. 181-187
-
-
Sterritt1
-
164
-
-
77957938451
-
-
(00909/10/EN, WP 171, 22 June 2010) (Art. 29 Opinion 2/2010) (based on the amended E-Privacy Directive to be implemented by May 2011)
-
See generally, Article 29 Data Protection Working Partys, Opinion 2/2010 on Online Behavioural Advertising, pp. 3,4 (00909/10/EN, WP 171, 22 June 2010) (Art. 29 Opinion 2/2010) (based on the amended E-Privacy Directive to be implemented by May 2011).
-
Article 29 Data Protection Working Partys, Opinion 2/2010 on Online Behavioural Advertising
, pp. 3-4
-
-
-
165
-
-
77957970472
-
-
29 Opinion 2/2010, note
-
Art. 29 Opinion 2/2010, note 163, pp. 7e9.
-
Art
, vol.163
, pp. 7-9
-
-
-
166
-
-
77957957186
-
-
29 Opinion 2/2010, note 163
-
Art. 29 Opinion 2/2010, note 163, pp. 7e9.
-
Art
, pp. 7-9
-
-
-
167
-
-
77957954634
-
-
29 Opinion 2/2010, note 163
-
Art. 29 Opinion 2/2010, note 163, pp. 13e15.
-
Art
, pp. 13-15
-
-
-
168
-
-
77957954190
-
-
note 51
-
See generally, FTC Guidelines, note 51.
-
FTC Guidelines
-
-
-
169
-
-
77957954190
-
-
note 51
-
FTC Guidelines, note 51, pp. 46e47.
-
FTC Guidelines
, pp. 46-47
-
-
-
170
-
-
77957954190
-
-
note 51
-
FTC Guidelines, note 51, p. 46.
-
FTC Guidelines
, pp. 46
-
-
-
171
-
-
77957954190
-
-
note 51 (adopting the view that the principles in the FTC Guidelines apply to any data collected for online behavioural advertising that could reasonably be associated with a particular consumer or with a particular computer or device, even if the data if non-PII)
-
FTC Guidelines, note 51, pp. 21e26 (adopting the view that the principles in the FTC Guidelines apply to any data collected for online behavioural advertising that could reasonably be associated with a particular consumer or with a particular computer or device, even if the data if non-PII).
-
FTC Guidelines
, pp. 21-26
-
-
-
172
-
-
77957967973
-
-
See generally, Dinant et al., note 5, pp. 30e31
-
See generally, Dinant et al., note 5, pp. 30e31.
-
-
-
-
173
-
-
77957954190
-
-
Note 51
-
FTC Guidelines, note 51, pp. 26e30.
-
FTC Guidelines
, pp. 26-30
-
-
-
174
-
-
77957956512
-
Ads from network advertisers are usually delivered based upon data collected about a given consumer as he or she travels across the different Websites in the advertising network. An individual network may contain hundreds or thousands of different, unrelated Websites and an individual Website may belong to multiple networks
-
note 51 (note 5)
-
"Ads from network advertisers are usually delivered based upon data collected about a given consumer as he or she travels across the different Websites in the advertising network. An individual network may contain hundreds or thousands of different, unrelated Websites and an individual Website may belong to multiple networks". FTC Guidelines, note 51, p. 3 (note 5).
-
FTC Guidelines
, pp. 3
-
-
-
175
-
-
77957954190
-
-
note 51
-
FTC Guidelines, note 51, p. 3.
-
FTC Guidelines
, pp. 3
-
-
-
176
-
-
77957954190
-
-
note 51
-
FTC Guidelines, note 51, pp. 26e30.
-
FTC Guidelines
, pp. 26-30
-
-
-
177
-
-
77957954190
-
-
note 51
-
FTC Guidelines, note 51, p. 47.
-
FTC Guidelines
, pp. 47
-
-
-
178
-
-
77957947752
-
Telecommunication carriers use of customer proprietary network information and other customer information
-
22 F.C.C. Record. (Federal Communications Commission characterizes "opt out" notices and consent as vague and ineffective)
-
See Telecommunication Carriers use of Customer Proprietary Network Information and Other Customer Information, Report and Order and Further Notice of Proposed Rule-making, 22 F.C.C. Record. pp. 6927, 6948 (2007) (Federal Communications Commission characterizes "opt out" notices and consent as vague and ineffective).
-
(2007)
Report and Order and Further Notice of Proposed Rule-making
, pp. 6927-6948
-
-
|