Friday, November 30, 2012

Privacy Matters


Humans are distinguished from other life forms by their opposable thumbs.  And Americans are distinguished from the subjects of other nations by the Fourth Amendment.  Anyone who watches TV has probably mastered the 4th amendment fundamentals:  search and seizure without a warrant is unlawful, evidence gathered from an illegal search is “fruit of the poison tree,” and the government requires a court order to tap your phones.  It leaves us with a false sense of security, believing that we have a Constitutional right to our privacy.

Unfortunately, nothing can be further from the truth.  We live in a world where it is nearly impossible to cover our tracks.  If you use a cell phone, email, and Facebook, your every move is already recorded.    It may not be carved in stone, but you are certainly leaving a trail of bytes and cookies, as well as facilitating the rapid evaporation of your personal data, letters, pictures, and preferences into the cloud.  If you are like me, you are already bulging out all over cyberspace, getting thoroughly SPAM’d and phished many times daily.  I have lost count of how much of my life I have signed away by checking the “accept terms and conditions” boxes on various apps and websites.

I remember when the paradigm was to get everything “in writing.” As a child, it was fun to play with those thin shiny sheets of carbon paper.  I got a thrill from stacking alternating layers of paper and carbon, testing which writing implements got the greatest yield of layers.  Nothing made carbons like a Bic ballpoint.  I was excited to work as a temp in college, hoping for the opportunity to create multiple copies of official documents.  Sadly, my early employment years coincided with the mainstream deployment of Xerox machines, an adequate but far less satisfying method for cloning letters and reports.   It was just the first time that technology got out in front of me.

These days, we sign contracts, pay our bills, and file our taxes electronically without ever putting pen to paper.   We think nothing of giving our credit card numbers to any online retailer, along with our name, email address and phone number.  We do not think beyond the transaction, never questioning what happens after we log off.  And the disclosures in these transactions pale by comparison to the personal information that is exchanged by email.  Because emails are one-on-one conversations, we are foolish enough to believe they are private.   Snarky gossip or heartfelt confessions among friends or co-workers have a life well beyond the send button.  No one should make the mistake of expressing their anger or criticizing their bosses by email.   I used to advise the people in my department never to say anything by email they wouldn’t want their mother to see.

Given the recent revelations about David Petraeus and his assorted women friends, new questions about Internet and email privacy are being raised.  Many people, for example, are unaware that the government can access emails left on a server for more than 6 months without a warrant.   We are entering new territory that render our laws obsolete and leave the beloved Constitution sorely in need of updated reinterpretation.  No one wants wiretapping laws from the 1960s to determine whether the government can put GPS trackers on our cell phones!

Government abuse of private information is one thing.  What most online consumers are unaware of is the extent to which private companies, such as Google, Yahoo, and Facebook, collect and deploy our personal information.  It wasn’t until someone saw their neighbor’s photo on a billboard in Europe that we realized that we assigned property rights of our personal photos and other information about us to Facebook.   The games and apps on Facebook actually encourage the spilling of personal information, asking you to give up your friend lists and preferences.   

One of the most suspicious things I have seen is the suggestion that I use my Facebook username and password to tie in to other websites and applications.  While this cleverly masquerades as a convenience, it is nothing more than encouragement to give up my behaviors to Facebook.  Other sites create incentives in the form of large percentage discount coupons just for subscribing or “Like”-ing them.  The subscription is a license to hit you with one of those obtuse “Terms and Conditions” statements.  Buried in those annoying statements (that are conveniently tucked away off screen), they assert their right to put our preferences to use.  The results seem innocuous on our own computers, but we will never know exactly how deeply or widely our information is being used.  Consider those bandwagon teases in the side margins of Facebook and Google products declaring that Anna likes Whoopie Pies or Justin likes Plain Brown Wrapper Adult Products (fiction alert).  I always imagine my own name and picture in that spot.  Do I want my web purchase of undergarments to be advertised to my high school English teacher or former clients? 

We are badly in need of a consumer revolution.  The Internet industrial complex arose so quickly that a few private corporations are setting policies and practices that far exceed our ability to scrutinize or fight them.   I believe that we are being held hostage by unfavorable terms and conditions.  It is an all or nothing game where we are being forced to compromise our standards of privacy in order to play.  For now, these corporations have unchecked monopolistic powers.   In the meantime, I offer the following advice:

·         Do not use employer computers or email for personal communication.  Many employers have policies that state that their emails are not private.  Many websites use cookies to store information on computers that could violate employer guidelines.

·         Do not agree to participate in games and applications on Facebook that grant permission to share your Friends lists and preferences.  Be aware that many applications (Calendar, Spotify, Farmville, Words with Friends) broadcast every more you make to your Friends list.

·         To the extent possible, when you wish to read or access links posted to Facebook, copy the URL to a fresh browser.

·         Check your privacy settings frequently as the features and capabilities change periodically and without notice.

·         To the extent possible, vary your passwords from application to application.

If all this sounds a little pessimistic or cynical, start paying attention to the relationship between where you go on the Internet and the Facebook adds you see, the email SPAM you receive, and the unsolicited phone calls you get (I get several per day despite being on the National Do-Not-Call Registry).  The Internet may be a superhighway, am not giving up trying to keep my hands on the wheel.

No comments:

Post a Comment