{"id":1186,"date":"2011-04-13T07:10:08","date_gmt":"2011-04-13T15:10:08","guid":{"rendered":"\/?p=1186"},"modified":"2011-04-16T05:25:03","modified_gmt":"2011-04-16T13:25:03","slug":"privacy-bill-of-rights-establishes-device-identifiers-as-pii","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1186","title":{"rendered":"Privacy Bill of Rights establishes device identifiers as PII"},"content":{"rendered":"<p>In my view\u00a0the <a href=\"\/wp-content\/images\/2011\/04\/KerryDraftPrivacyBill.pdf\">Commercial Privacy Bill of Rights<\/a>\u00a0drafted by US Senators McCain and Kerry\u00a0would significantly\u00a0strengthen the identify fabric of the Internet\u00a0through its proposal\u00a0that\u00a0<strong>&#8220;a unique persistent identifier\u00a0associated with an individual or a networked device used by such an individual&#8221;<\/strong>\u00a0must be\u00a0treated as\u00a0<strong>personally identifiable information<\/strong> (Section 3 &#8211; 4 &#8211; vii).\u00a0\u00a0 This clear and central statement marks a real step forward.\u00a0 Amongst other things, it covers the MAC addresses of wireless devices and the serial numbers and random identifiers of mobile phones and laptops.<\/p>\n<p>From this fact alone the bill\u00a0could play a key role in limiting\u00a0a number\u00a0of the most privacy-invasive practices used today by Internet services &#8211; including location-based services.\u00a0\u00a0For example, a company like Apple could no longer\u00a0glibly claim, <a href=\"\/?p=1184\">as it does in its current iTunes privacy policy<\/a>,\u00a0that device identifiers\u00a0and location information are &#8220;not personally identifying&#8221;.\u00a0 Nor\u00a0could\u00a0it profess, as iTunes also currently does, that this means it can\u00a0&#8220;<em>collect, use, transfer, and disclose&#8221;\u00a0 <\/em>the information<em>\u00a0&#8220;for any purpose&#8221;.\u00a0 <\/em>Putting\u00a0location information\u00a0under the firm control of users is a key legislative requirement addressed by the bill.<\/p>\n<p>The bill\u00a0also contributes both to the security of the Internet and to individual privacy\u00a0by unambiguously embracing\u00a0&#8220;Minimal Disclosure for a Constrained Use&#8221; as set out in Law 2 of the <a href=\"https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf\">Laws of Identity<\/a>.\u00a0\u00a0Title III explicitly establishes a &#8220;Right to Purpose Specification;\u00a0Data Minimization; Constraints on Distribution; and Data Integrity.&#8221;<\/p>\n<p>Despite these real positives, the bill as currently formulated leaves me eager to consult a bevy of lawyers &#8211; not a good sign.\u00a0\u00a0This may\u00a0be because it is\u00a0still\u00a0a &#8220;working draft&#8221;, with numerous provisions that\u00a0must be clarified.\u00a0<\/p>\n<p>For example,\u00a0how would the population at large ever understand the byzantine interlocking of\u00a0opt-in and opt-out clauses described in Section 202?\u00a0 At this point, I don&#39;t.<\/p>\n<p>And\u00a0what does the\u00a0list of exceptions to Unauthorized Use in Section 3 paragraph 8 imply?\u00a0 Does it mean\u00a0such uses can be made without notice and consent?<\/p>\n<p>I&#39;ll be looking for comments by legal and policy experts.\u00a0 Already, <a href=\"http:\/\/epic.org\/2011\/04\/senators-kerry-and-mccain-intr.html\" class=\"broken_link\">EPIC has expressed <\/a>both support\u00a0and reservations:<\/p>\n<p style=\"padding-left: 30px;\">Senators John Kerry (D-MA) and John McCain (R-AZ) have introduced the <a href=\"http:\/\/epic.org\/privacy\/consumer\/Commercial_Privacy_Bill_of_Rights_Text.pdf\">&#8220;Commercial Privacy Bill of Rights Act of 2011,&#8221;<\/a> aimed at protecting consumers&#8217; privacy both online and offline. The Bill endorses several &#8220;Fair Information Practices,&#8221; gives consumers the ability to opt-out of data disclosures to third-parties, and restricts the sharing of sensitive information.<\/p>\n<p style=\"padding-left: 30px;\">But the Bill does not allow for a private right of action, preempts better state privacy laws, and includes a &#8220;Safe Harbor&#8221; arrangement that exempts companies from significant privacy requirements.<\/p>\n<p style=\"padding-left: 30px;\">EPIC has supported privacy laws that provide meaningful enforcement, limit the ability of companies&#8217; to exploit loopholes for behavioral targeting, and ensure that the Federal Trade Commission can investigate and prosecute unfair and deceptive trade practices, as it did with <a href=\"http:\/\/www.ftc.gov\/opa\/2011\/03\/google.shtm\" target=\"_blank\">Google Buzz<\/a>. For more information, see <a href=\"http:\/\/epic.org\/privacy\/consumer\/online_tracking_and_behavioral.html\" class=\"broken_link\">EPIC: Online Tracking and Behavioral Profiling<\/a> and <a href=\"http:\/\/epic.org\/privacy\/internet\/ftc\/\" class=\"broken_link\">EPIC: Federal Trade Commission<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But despite real positives, the bill as currently formulated leaves me eager to consult a bevy of lawyers&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,17,3,40,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1186"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1186"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1186\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}