Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Murky Consent: An Approach to the Fictions of Consent in Privacy Law

Solove, Daniel J., Murky Consent: An Approach to the Fictions of Consent in Privacy Law (August 20, 2023). 104 Boston University Law Review 593 (2024), GWU Legal Studies Research Paper No. 2023-23, GWU Law School Public Law Research Paper No. 2023-23, Available at SSRN: https://ssrn.com/abstract=4333743 or http://dx.doi.org/10.2139/ssrn.4333743  – “Consent plays a profound role in nearly all privacy laws. As Professor Heidi Hurd aptly said, consent works “moral magic” – it transforms things that would be illegal and immoral into lawful and legitimate activities. As to privacy, consent authorizes and legitimizes a wide range of data collection and processing. There are generally two approaches to consent in privacy law. In the United States, the notice-and-choice approach predominates; organizations post a notice of their privacy practices and people are deemed to consent if they continue to do business with the organization or fail to opt out. In the European Union, the General Data Protection Regulation (GDPR) uses the express consent approach, where people must voluntarily and affirmatively consent. Both approaches fail. The evidence of actual consent is non-existent under the notice-and-choice approach. Individuals are often pressured or manipulated, undermining the validity of their consent. The express consent approach also suffers from these problems – people are ill-equipped to decide about their privacy, and even experts cannot fully understand what algorithms will do with personal data. Express consent also is highly impractical; it inundates individuals with consent requests from thousands of organizations. Express consent cannot scale. In this Article, I contend that most of the time, privacy consent is fictitious. Privacy law should take a new approach to consent that I call “murky consent.” Traditionally, consent has been binary – an on/off switch – but murky consent exists in the shadowy middle ground between full consent and no consent. Murky consent embraces the fact that consent in privacy is largely a set of fictions and is at best highly dubious. Because it conceptualizes consent as mostly fictional, murky consent recognizes its lack of legitimacy. To return to Hurd’s analogy, murky consent is consent without magic. Rather than provide extensive legitimacy and power, murky consent should authorize only a very restricted and weak license to use data. Murky consent should be subject to extensive regulatory oversight with an ever-present risk that it could be deemed invalid. Murky consent should rest on shaky ground. Because the law pretends people are consenting, the law’s goal should be to ensure that what people are consenting to is good. Doing so promotes the integrity of the fictions of consent. I propose four duties to achieve this end: (1) duty to obtain consent appropriately; (2) duty to avoid thwarting reasonable expectations; (3) duty of loyalty; and (4) duty to avoid unreasonable risk. The law can’t make the tale of privacy consent less fictional, but with these duties, the law can ensure the story ends well.”

AI Can Tell Your Political Affiliation Just by Looking at Your Face

Gizmodo: “A study recently published in the peer-reviewed American Psychologist journal claims that a combination of facial recognition and artificial intelligence technology can accurately assess a person’s political orientation by simply looking at that person’s blank, expressionless face. The study was authored by researchers at the Graduate School of Business at Stanford University. Researchers write… Continue Reading

How G.M. Tricked Millions of Drivers Into Being Spied On

The New York Times – “Kashmir Hill is a technology reporter who has been covering the privacy implications of connected cars, including her own. Automakers have been selling data about the driving behavior of millions of people to the insurance industry. In the case of General Motors, affected drivers weren’t informed, and the tracking led… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, April 20, 2024

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, April 20, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Introducing Dark Web Monitoring for credential leaks

Proton Blog: “Your email address is your online identity(new window), and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches affecting online services are increasingly common, with tens of billions… Continue Reading

How to delete your search history

Proton VPN: “Your search history is a window into your inner life. Anyone with access to it knows what your hobbies and interests are, your sexual orientation and preferences, the things that worry you (for example your medical concerns), your political affiliations, your financial situation, and much more.  In this article, we’ll explore why it’s… Continue Reading

Cops can force suspect to unlock phone with thumbprint, US court rules

Ars Technica: “The US Constitution’s Fifth Amendment protection against self-incrimination does not prohibit police officers from forcing a suspect to unlock a phone with a thumbprint scan, a federal appeals court ruled yesterday. The ruling does not apply to all cases in which biometrics are used to unlock an electronic device but is a significant… Continue Reading

How Political Campaigns Use Your Data to Target You

EFF: “Data about potential voters—who they are, where they are, and how to reach them—is an extremely valuable commodity during an election year. And while the right to a secret ballot is a cornerstone of the democratic process, your personal information is gathered, used, and sold along the way. It’s not possible to fully shield… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, April 13, 2024

Pete Recommends – Weekly highlights on cyber security issues, April 13, 2024 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex… Continue Reading