textfiles/politics/cpsr-pri

395 lines
20 KiB
Plaintext

Statement of Marc Rotenberg,
Washington Director
Computer Professionals for Social Responsibility (CPSR)
Open Forum on Library and Information Service's Roles in the
National Research and Education Network (NREN)
National Commission on Libraries and
Information Science (NCLIS)
Washington, DC
July 21, 1992
Thank you for the opportunity to testify today before the
National Commission on Library and Information Science (NCLIS). My
name is Marc Rotenberg and I am the Director of the Washington
Office of Computer Professionals for Social Responsibility (CPSR).
CPSR is a national organization of professionals in the computing
field.
I would like to speak with you about privacy protection and the
future of the NREN. This is item 6 identified in the NREN research
agenda. Richard Civille will speak with you next about CPSR's work
to promote Local Civic Networks.
During the past few years CPSR has coordinated several national
efforts to promote privacy protection for network communication.
>From cryptography to Caller ID, we have sought to ensure that the
rapid developments in the communications infrastructure do not
diminish the privacy we all value. We believe that the future of
network communications depends largely on the ability to make
certain that sufficient privacy protection is available for all
users of the network.
In this effort we have worked closely with the library
community. It became clear to us that library organizations have a
special appreciation for the importance of privacy protection. For
many, privacy is the critical safeguard that protects intellectual
freedom and promotes the open exchange of information. The
American Library Association, the Association of Research and other
library organizations have all shown their support for privacy
protection through codes of conduct, policy statements, and research
conferences.
We have also worked closely with telecommunication policy
makers in the United States and around the world. The New York
state Public Service Commission issued a policy on
telecommunication privacy which set out several principles for
network communications. These recommendations have been followed
in several states. More recently, the Minister of Communications
in Canada issued a series of principles on communications policy.
Meanwhile, the Commission of the European Communities has put
forward a draft directive on Data Protection in Telecommunications.
The European Commission made a critical point about future
network development. It said that "the effective protection of
personal data and privacy is developing into an essential
precondition for social acceptance of new digital networks and
services." This view is shared by agencies in other countries that
have looked at the implications of advanced networking services.
For example, the Ministry of Posts and Telecommunications in Japan
recently concluded a study on the protection of personal data in the
telecommunications business and recommended a series of privacy
guidelines to accompany the introduction of new network services.
In the United States, however, we find ourselves in the midst
of the greatest privacy debate in a generation. In the absence of
a coherent federal policy to protect privacy, consumers have been
left to fend for themselves, and the response is not encouraging.
>From Pennsylvania to California, telephone companies now face
widespread and well-founded consumer opposition to new telephone
services. Part of the reason for this is that there has been
little effort in the United States at the federal level to develop
privacy principles for new network services.
CPSR would like to see an agency in the United States take on
the task of developing and promulgating privacy principles for
network services. We have already recommended the creation of a
data protection board which could, among other tasks, develop
appropriate principles for network communications. There is a
proposal before Congress to establish such an agency, but is
unclear whether it will be enacted this year.
Meanwhile, the Federal Communications Commission (FCC) has been
unwilling to address the privacy implications of new network
services. We are also somewhat disappointed that neither the
Computer Science and Technology Board (CSTB) of the National
Research Council or the Office of Technology Assessment (OTA) has
addressed privacy concerns for network users. Both the CSTB and
the OTA are well qualified to tackle this problem.
In the interim, NCLIS could take a leadership role, and help
develop and promulgate privacy principles for the emerging
communications infrastructure. It is clearly in the interest of
the library and information science community to ensure adequate
privacy protection, but unless some agency takes on this
responsibility it appears unlikely that the work will be
undertaken.
CPSR believes that it is in the long-term interest of our
country and of computer users around the world to ensure protection
for networked communication. The failure to develop such policy
may impose very high costs on all network users, and may ultimately
reduce greatly the value of the network to users.
Speaking academically, the absence of adequate protection for
electronic communication is a substantial gap in NREN policy that
should soon be addressed if the full potential of the
infrastructure is to be realized. Speaking practically, if we don't
get some good policy soon, we may all be buried in a blizzard of
electronic junkmail the likes of which we have never known.
I would like now to make three points about the current state
of privacy protection for NREN, and then propose a series of
principles for privacy protection. These principles may help "get
the ball rolling" and encourage the development of other
initiatives. I hope that NCLIS will recommend that the Office of
Science and Technology Policy (OSTP) give these principles full
consideration.
FINDING 1:
Commercialization of the NREN will exacerbate existing privacy
problems. Without a clear mechanism to protect privacy, user
concerns will increase.
Much of the discussion surrounding the NREN today focuses on
the opportunity to develop commercial services and to provide
network access for private carriers. We do not oppose efforts to
provide commercial services. Clearly, there is an important
opportunity to develop new services and to offer products through
the network. At the same time, it is apparent that the
commercialization of the NREN will create new pressures on privacy
protection.
In the current network environment, made up primarily of
researchers and scientists, there is little incentive or
opportunity to gather personal data, to compile lists, or to sell
personal information. This is likely to change. Once commercial
transactions begin to take place on the net, the information
environment will resemble a hybrid of credit card and telephone
call transactions. Records of individual purchases will be
available and will possess commercial value. The NREN community
will face a whole new set of privacy issues.
We anticipate that there will be three different types of
privacy problems as the NREN continues to evolve. First, as
commercial organizations become users of the network, they will
gather personal data, and wish to sell lists. The address files
for list servers could be sold, and users may find themselves
"subscribed" to lists they have no interest in. These activities
will raise traditional privacy concerns about the restrictions on
disclosure and secondary use, the opportunity for users to obtain
information held by others, and the need to minimize the collection
of personal information.
Second, efforts to promote competitiveness in the delivery of
network services may also lead to the disclosure of network data
which will compromise user privacy.
This problem is already apparent in the current rules for the
operation of the telephone network. The Federal Communication
Commission requires telephone companies to provide records of
customer phone calls to other companies so that competing companies
may analyze calling patterns and sell their services. Large
companies objected to the disclosure of this sensitive information.
As a result the FCC required that telephone companies obtain
authorization before releasing these numbers. But this restriction
only applies to telephone customers with more than 20 lines.
The disclosure of Customer Proprietary Network Information
(CPNI) has already surprised many telephone customers who now
receive calls from companies with whom they have no prior
relationship. These companies are able to describe the customer's
telephone calling habits in great detail. Users of NREN services
are also likely to object to the disclosure of network information.
The third problem is that law enforcement agencies are likely
to make "greater demands" on communication service providers to
turn over records of electronic communications to the government
and to provide assistance in the execution of warrants. I say
"greater demands" with some reservation since the recent proposal
>from the Federal Bureau of Investigation to require that all
communications equipment in the United States be capable of
wiretapping seems about the greatest demand conceivable. Still, we
should anticipate that the government demands for access to the
contents and records of NREN communications are likely to increase.
FINDING 2:
Current privacy protections are inadequate
Electronic communications are provided some protection against
unlawful interception by the Electronic Communications Privacy Act
(ECPA) of 1986. This law extends the very important guarantees
contained within the 1968 wiretap statute to digital communication
and stored electronic mail. But this protection now appears
inadequate. As a general matter, the wiretap law protects the
contents of an electronic message against unlawful disclosure; it
does not protect the record of the transaction against disclosure.
ECPA also does not appear to protect critical personal
information, such as a person's telephone number, from improper
disclosure. For example, the Calling Number Identification (CNID)
service is probably a violation of the wiretap statute and clearly
a violation of the wiretap law of several states. Nonetheless,
the service has been offered over the objection of consumer groups,
technical experts, and legal scholars.
FINDING 3:
Technical safeguards provide only a partial solution
There are some in the network community who believe that
technology will provide a solution to these emerging privacy
problems. New techniques in cryptography provide ways to protect
the contents of an electronic message and even to protect the
identity of the message author. An article that will appear next
month in Scientific American titled "Achieving Electronic Privacy"
describes in more detail how it may be possible through technical
means to recapture some privacy.
CPSR has supported many efforts to improve technical means for
privacy protection. In fact, CPSR has been of the leading
proponents of the widespread us of cryptography to protect
electronic communications. We have opposed restrictions by both
the National Securit y Agency and the Federal Bureau of
Investigation on the use of cryptography. We have also supported
the development of privacy-enhancing technologies, such as
telephone cards which are widely used in Europe and Japan, and
recommended that policy makers explore technical means to protect
information.
Nonetheless, we do not believe that technical safeguards will
provide sufficient protection for networked communications. Our
right of privacy is based on Constitutional principles and our
national history, and reflects our commitment to certain political
ideals. The protection of privacy is ultimately a policy decision
that must be resolved through our political institutions. Clearly,
technology provides useful developments that we should incorporate
into future networks, but it would be a mistake to assume that
technology alone will provide sufficient protection.
This point was made two decades ago by former White House
Science Adviser Jerome Wiesner who also served as president of MIT.
In testimony before Congress on the privacy implications of
databanks, Professor Wiesner said: "There are those who hope new
technology can redress these invasions of personal autonomy that
information technology now makes possible, but I don't share this
hope. To be sure, it is possible and desirable to provide
technical safeguards against unauthorized access. It is even
conceivable that computers could be programmed to to have their
memories fade with time and to eliminate specific identity. Such
safeguards are highly desirable, but the basic safeguards cannot be
provided by new inventions. They must be provided by the
legislative and legal systems of this country. We must face the
need to provide adequate guarantees for individual privacy."
We believe that the development of NREN privacy policy should
be conducted in this spirit: looking for opportunities to
incorporate technical safeguards while recognizing that the
ultimate decisions are policy-based. PRIVACY GUIDELINES
Before discussing the proposed privacy principles, I would like
to say a few words about the desirability of developing these
principles. Privacy protection in electronic environments is a
particularly complex policy problem. There is legal jargon and
technical jargon. There are rapid changes. And there are
certainly a wide range of opinions about how best to achieve
privacy, even about what privacy means.
Privacy principles have helped to clarify goals and to convey
objectives in non-technical terms. Well developed polices are
"technology neutral" and are adaptable as new technologies emerge.
Professional organizations have made widespread use of such
principles for codes of ethics and for public education.
There are a number of such polices in the privacy realm. Some
of these polices have been extremely influential in the development
of public policy, national law, and international agreements. For
example, the Code of Fair Information Practices was the basis for
the Privacy Act of 1974, the most extensive privacy law in the
United States. The Code was developed by a special task force
created by the Secretary of Health, Education, and Welfare in 1973.
Other codes have formed the basis for data protection law in Great
Britain.
All of these codes seek to establish certain responsibilities
for organizations that collect personal information, and to create
certain rights for individuals.
In developing these telecommunication privacy guidelines, we
examined existing codes and particularly the principles developed
by the Organization for Economic and Cooperative Development (OECD)
in 1981. We also incorporated several additional principles that
we believe are necessary to protect personal information in
communication environments.
Taken as a whole, the principles are intended to improve
privacy protection for network communications as the NREN continues
to evolve. RECOMMENDATION 1:
The confidentiality of electronic communications should be
protected.
The primary purpose of a communication network is to ensure
that information can travel between two points without alteration,
interception, or disclosure. A network that fails to achieve this
goal will not serve as a reliable conduit for information.
Therefore the primary goal should be to guarantee the
confidentiality of electronic communications. RECOMMENDATION 2:
Privacy considerations must be recognized explicitly in the
provision, use and regulation of telecommunication services.
The addition of new services to a communications infrastructure
will necessarily raise privacy concerns. Users should be fully
informed about the privacy implications of these services so that
they are able to make appropriate decisions about the use of
services. RECOMMENDATION 3:
The collection of personal data for telecommunication services
should be limited to the extent necessary to provide the service.
Users should not be required to disclose personal data which is
not necessary for the rendering of the service. In particular, the
use of the Social Security number should be avoided. In no
instance, should it be used as both an identifier and
authenticator. RECOMMENDATION 4:
Service providers should not disclose information without the
explicit consent of service users. Service providers should be
required to make known their data collection practices to service
users.
Service providers have a responsibility to inform users about
the collection of personal information and to protect the
information against unlawful disclosure. Personally identifiable
information should not be disclosed without the affirmative consent
of the user. RECOMMENDATION 5:
Users should not be required to pay for routine privacy
protection. Additional costs for privacy should only be imposed for
extraordinary protection.
The premise of the federal wiretap statue is that all users of
the public network are entitled to the same degree of legal
protection against the unlawful disclosure of electronic
communications. This principle should be carried forward into the
emerging network environment. Segmented levels of privacy
protection are also likely to introduce new transaction costs and
create inefficiencies. Where special charges are imposed for
privacy, it should be for "armored car" service. RECOMMENDATION
6:
Service providers should be encouraged to explore technical
means to protect privacy.
Service providers should pursue technical means to protect
privacy, particularly where such means may improve the delivery of
service and reduce the risk of privacy loss. RECOMMENDATION 7:
Appropriate security polices should be developed to protect
network communications
Security is an element of privacy protection but it is not
synonymous with privacy protection. Appropriate security policies
should be put in place to protect privacy. However, it should be
recognized that some security measures may compromise privacy
protection. Network monitoring, for example, or the collection of
detailed audit trail information will raise substantial privacy
concerns. Therefore, security policies should be designed to serve
the larger goal of privacy protection. RECOMMENDATION 8:
A mechanism should be established to ensure the observance of
these principles.
Good principles without appropriate oversight and enforcement
are insufficient to protect privacy. This has been the experience
of the United States with the Privacy Act of 1974 and of the
European countries with the OECD principles of 1981. In both
instances, fine principles lacked sufficient oversight and
enforcement mechanisms.
Additional principles may be appropriate and these principles
may well need modification. But we hope that they will provide a
good starting point for a discussion on communications privacy for
the NREN. [Attachments: "Protecting Privacy," Communications of
the ACM, April 1992; "Communications Privacy: Implications for
Network Design," Proceedings of INET '92, Kobe, Japan)] &