1. What are the four categories in Daniel Solove’s
taxonomy of privacy? Come up with your own examples of activities conducted by
government agencies falling into each of these categories.
“Information collection
refers to activities that gather personal information." An example of
information collection by a government agency would be educational records held
by a public university.
“Information processing
refers to activities that store, manipulate, and use personal data that has
been collected." An example of information processing would be making a
prediction about the number of graduates who are going to fall behind in
repaying their federal student loans.
“Information dissemination
refers to activities that spread personal information." An example of
information dissemination is when a state government releases a list of felons who
are ineligible to vote.
“Invasion refers to
activities that intrude upon a person's daily life." An example of a government
activity in this category is requiring those who wish to purchase a gun to have
a criminal background check and to register their gun.
2. How does the Employee Polygraph Protection Act help
job applicants and company employees maintain their privacy? What is the most
significant loophole in the Employee Polygraph Protection Act?
The Employee Polygraph
Protection Act helps jobs applicants and company employees maintain their
privacy by making it illegal for companies to require polygraph tests as a condition
of employment (except for a few types of job). The EPPA also makes it illegal for
companies to give polygraph tests to current employees, with a few exceptions.
The most significant loophole of the Employee Polygraph Protection Act is that
it does not apply to federal, state, or local government agencies.
3. What is the purpose of the Children’s Online
Privacy Protection Act?
The purpose of the
Children's Online Privacy Protection Act is to reduce the amount of personal
information gathered from children using the Internet.
4. What are the two principal purposes of the
Genetic Information Nondiscrimination Act?
The two principal
purposes of the Genetic Information Nondiscrimination Act are:
(1) To prevent health
insurance companies and health plan administrators from using genetic
information when making decisions about “coverage, rates, or preexisting conditions;”
(2) To prohibit most
employers from taking genetic information into account when making decisions
related to the terms of employment (e.g., hiring, firing, and promotions);
5. Give two examples of the Census Bureau illegally
revealing census data to other federal agencies.
During World War I, the
Census Bureau provided the names and addresses of young men to the military,
which was searching for draft resistors. After the attack on Pearl Harbor, the
Census Bureau provided the Justice Department with information about the
general location of Japanese-Americans. The Army used this information to round
up Japanese-Americans and send them to internment camps.
6. Name two notable successes claimed by the
National Crime Information Center.
o The National Crime Information Center helped the FBI
identify James Earl Ray as the assassin of Dr. Martin Luther King, Jr.
o The NCIC helped the FBI capture Timothy McVeigh, who
was later convicted of the bombing of the Federal Building in Oklahoma City.
7. What is the purpose of the OneDOJ database? What
are its weaknesses, according to the critics of this database?
The purpose of the
OneDOJ database is to give state and local police officers accessto information
generated by five federal law enforcement agencies. Since the database contains
incident reports, interrogation summaries, and other such information, there is
information about people who have never been arrested or charged with a crime. Critics
say local police should not have access to this kind of information, which may include
unsubstantiated and erroneous reports that will never be corrected or removed.
8. Which country leads the world in the deployment
of closed-circuit television cameras?
Great Britain leads the
world in the deployment of closed-circuit television cameras.
9. Provide an example of overt surveillance by a
government agency in the United States.
An example of overt
surveillance by a government agency in the United States is the use of closed-circuit
television cameras to provide security in public places.
10. Provide two examples of covert surveillance by
the U.S. government.
Two examples of covert
surveillance by the U.S. government are wiretapping and the use of hidden
microphones (bugs).
11. What right is guaranteed by the Fourth Amendment
to the U.S. Constitution?
The Fourth Amendment to
the U.S. Constitution protects people from unreasonable searches and seizures
of their property by law enforcement authorities.
12. Why was the U.S. Supreme Court decision in
Nardone v. United States so important?
The U.S. Supreme Court
decision in Nardone v. United States established that evidence collected from
warrantless wiretaps is inadmissible in court.
13. What was the key ruling of the U.S. Supreme
Court in the case of Weiss v. United States?
In Weiss v. United
States, the Supreme Court ruled that the the ban on the admissibility of
evidence collected from warrantless wiretaps included intrastate as well as interstate
telephone calls.
14. How did the decision of the U.S. Supreme Court
in the case of Katz v. United States change the concept of privacy?
In Charles Katz v.
United States, the U.S. Supreme Court broadened the concept of privacy by affirming
that citizens should be protected from all electronic surveillance conducted
without warrants, including bugs.
15. How did Operation Shamrock begin? What abuses
arose from the continuation of Operation Shamrock?
Operation Shamrock
began during World War II, when the U.S. government decided it needed to
monitor all telegram traffic entering and leaving the United States, presumably
as a way of combating espionage. Eventually the Johnson and Nixon administrations
used this surveillance infrastructure to monitor the activities of American citizens
opposed to the Vietnam War, including the Reverend Dr. Martin Luther King, Jr.,
The Reverend Ralph Abernathy, Black Panther Leader Eldrige Cleaver, pediatrician
Dr. Benjamin Spock, folk singer Joan Baez, and actress Jane Fonda.
16. What was the purpose of the Carnivore system?
The purpose of the
Carnivore system was to enable the FBI to monitor Internet traffic, including
email messages.
17. Why did the National Security Agency begin its
secret wiretapping program?
The National Security
Agency began its secret wiretapping program after 9/11 in the hope that it
could gather information that could prove valuable in preventing further terrorist
attacks.
18. Why did the TALON database spark controversy?
The TALON database was
supposed to store reports about suspicious activities or terrorist threats near
military bases. Controversy ensued when it was revealed that the database was
also being used to store reports about anti-war protests and emails from
university students planning protests against on-campus military recruiting.
19. What is a pen register?
A pen register is a
surveillance device attached to a suspect's phone line that displays the number
being dialed.
20. What is a trap-and-trace device?
A trap-and-trace device
is a surveillance device attached to a suspect's phone line that displays the
phone numbers of people calling the suspect.
21. What is a roving wiretap?
A roving wiretap is a
wiretap that moves from phone to phone. Roving wiretaps are authorized by the
Electronic Communications Privacy Act when a suspect attempts to avoid
surveillance by using many different phones.
22. What are the implications of the Stored
Communication Act for all those who let an Internet service provider handle
their email?
The Stored
Communications Act allows police to read emails more than 180 days old stored
by an Internet Service Provider, without a search warrant. This is an important
issue because most people allow their email provider to store their email
messages.
23. What are the three most controversial provisions
of the USA PATRIOT Act?
The three most
controversial provisions of the USA PATRIOT Act are
o Allowing the use of roving wiretaps;
o Permitting the surveillance of “lone wolf” suspects
not linked to terrorist groups;
o Allowing the FBI to seize business, medical,
educational, and library records without showing probable cause.
24. Why has the expansion in the use of National
Security Letters raised privacy concerns?
The expansion in the
use of National Security Letters has raised privacy concerns for a variety of
reasons. The FBI can issue these letters without showing probable cause, and it
has been issuing about 50,000 National Security Letters every year. Typically a
gag order is associated with a National Security Letter. The gag order prevents
the recipient of the letter (such as a library or educational institution) from
disclosing receipt of the letter.
25. Briefly summarize in your own words the five
tenets of the Code of Fair Information Practices.
The Code of Fair
Information Practices has these five tenets:
·
There cannot be
any secret databases;
·
People have the
right to know what information about them is stored and how it is being used;
·
People should be
able to prevent information collected for one purpose to be used for another
purpose;
·
People have the
right to correct errors in the information about them;
·
Organizations
maintaining databases should make sure the data are reliable and secure.
26. Robert Bellair has said, “The Privacy Act, it
turns out, is no protection at all. You can drive a truck through the Privacy
Act”. Explain why Bellair and other privacy advocates feel the Privacy Act of
1974 is a weak piece of legislation.
The Privacy Act is
criticized by Bellair and others because it applies only to government databases;
only covers records indexed by a personal identifier, do not assign any federal
agency the responsibility of enforcing its provisions, and allows federal
agencies to share records.
27. The Fair Credit Report Act says that information
which may negatively affect an individual’s credit rating must be removed after
seven years. What are two exceptions to this guideline?
Information about
criminal convictions may be kept indefinitely, and bankruptcy information may
be held for 10 years.
28. How does the Fair and Accurate Credit
Transactions Act help consumers verify the accuracy of their credit reports?
The Fair and Accurate
Credit Transactions Act helps consumers verify the accuracy of their credit
reports by giving them the right to request a free copy of their credit report
once a year from each of the three major credit reporting bureaus.
29. Summarize the major provisions of the Financial
Services Modernization Act.
The major provisions of
the Financial Services Modernization Act are: allowing banks to offer insurance
and brokerage services, requiring financial institutions to disclose their
privacy policies to their customers at least once a year, and requiring financial
institutions to take measures to prevent the unauthorized access of customers'
confidential information.
30. Give two examples of data mining programs run by
governments.
The IRS uses data
mining to determine whom it should audit. New York City's Syndromic
Surveillance System looks for epidemics, environmental problems, or bioterrorism.
The Terrorist Information Awareness project is a third example of data miningby
the U.S. government.
31. What are the problems with using the Social
Security number as an identification number?
Social Security numbers
are not unique. They are rarely checked, so criminals can get away with
supplying fake SSNs. They have no error-detecting capability, so SSNs are prone
to data-entry errors.
32. Give two arguments in favor of a national
identification card for the United States. Give two arguments against creating
a national identification card.
Proponents of a
national identification card argue that a modern identification card with
biometric data would be harder to forge than a Social Security card or a
driver's license. A national identification card would reduce illegal
immigration by making it impossible for an illegal alien to find work.
Opponents of a national
identification card say that corrupt offcials inside government agencies would
make it possible for people to obtain fake national identification cards. A
national identification card will simply make it easier for the government to
perform data mining on the activities of its citizens.
33. What are the rights provided by the Family
Education Rights and Privacy Act?
The Family Education
Rights and Privacy Act gives students 18 years old and older the right to
review their educational records. It also gives them the right to request changes
to records containing errors. Students may prevent others from accessing these records
without permission, except under certain circumstances. If a student is less than
18 years old, these rights are held by the student's parents or guardians.
34. How does the Video Privacy Protection Act
enhance privacy?
The Video Privacy
Protection Act enhances privacy by making it illegal for videotape service
providers to disclose rental records without the consent of the customer. The law
also requires stores to destroy information about who rented what within a year
of when the information is no longer needed for the purposes of the original
transaction.
35. Describe the privacy protections resulting from
the Health Insurance Portability and Accountability Act.
The Health Insurance
Portability and Accountability Act limits how doctors, hospitals, pharmacies,
and insurance companies can use medical information collected from patients.
The regulations forbid health care providers from releasing information to life
insurance companies, banks, or other businesses without specific signed
authorization from the person being treated. Health care providers must provide
their patients witha notice describing how they use the information they
gather. Patients have the right to see their medical records and request
corrections to errors they find in those records.
36. What is the purpose of the Freedom of
Information Act?
The purpose of the
Freedom of Information Act is to ensure that the public has access to the records
of the U.S. government.
37. Name two important exemptions in the Freedom of
Information Act that allow the government to withhold information.
The Freedom of
Information Act has nine exemptions, but two are particularly important. The
Government does not have to release documents if they contain trade secrets or
other confidential nancial or commercial information. The Government does not have
to release documents related to law enforcement investigations.
38. Give an example of how information gathered by
the E-ZPass system has been used for a purpose other than collecting tolls.
Information collected
by the E-ZPass network have been used to help obtain civil and criminal
convictions in court. For example, E-ZPass records were used as evidence in the
murder trial of Melanie McGuire. The records helped the prosecutor reconstruct her
movements.
39. How did the Federal Trade Commission reduce
unwanted telemarketing?
The Federal Trade
Commission reduced unwanted telemarketing by creating the National Do Not Call
Registry.
40. What is the purpose of the CALM Act?
The purpose of the CALM
Act is to ensure that television commercials are broadcast at the same volume
as the television programs they are interrupting.
41. Why have federal and state governments passed
laws limiting access to cold products containing pseudoephedrine?
Federal and state governments
have passed laws limiting access to cold products containing pseudoephedrine
because they are trying to eliminate the illegal manufacturing of
methamphetamine, and pseudoephedrine is an ingredient of methamphetamine.
42. Why has privacy groups objected to the
installation of advanced imaging technology scanners at airport security
checkpoints? How has the Transportation Security Administration responded to
these objections?
Privacy groups objected
to the installation of advanced imaging technology scanners at airport security
checkpoints because the scanners revealed anatomical features in great detail.
The Transportation Security Administration responded to this criticism by
developing new software that eliminates passenger-specific images and indicates
the location of threatening items on a generic outline of a person.