Personal tools

nren_privacy_testimony.txt

"Proposed Privacy Guidelines for the NREN"

Statement of Marc Rotenberg,
Washington Director
Computer Professionals for Social Responsibility (CPSR)

Open Forum on Library and Information Service's Roles in the
National Research and Education Network (NREN)

National Commission on Libraries and
Information Science (NCLIS)
Washington, DC
July 21, 1992

Thank you for the opportunity to testify today before
the National Commission on Library and Information Science
(NCLIS). My name is Marc Rotenberg and I am the Director of
the Washington Office of Computer Professionals for Social
Responsibility (CPSR). CPSR is a national organization of
professionals in the computing field.
I would like to speak with you about privacy protection
and the future of the NREN. This is item 6 identified in the
NREN research agenda. Richard Civille will speak with you
next about CPSR's work to promote Local Civic Networks.
During the past few years CPSR has coordinated several
national efforts to promote privacy protection for network
communication. From cryptography to Caller ID, we have
sought to ensure that the rapid developments in the
communications infrastructure do not diminish the privacy we
all value. We believe that the future of network
communications depends largely on the ability to make certain
that sufficient privacy protection is available for all users
of the network.
In this effort we have worked closely with the library
community. It became clear to us that library organizations
have a special appreciation for the importance of privacy
protection. For many, privacy is the critical safeguard that
protects intellectual freedom and promotes the open exchange
of information. The American Library Association, the
Association of Research and other library organizations have
all shown their support for privacy protection through codes
of conduct, policy statements, and research conferences.
We have also worked closely with telecommunication
policy makers in the United States and around the world.
The New York state Public Service Commission issued a policy
on telecommunication privacy which set out several principles
for network communications. These recommendations have been
followed in several states. More recently, the Minister of
Communications in Canada issued a series of principles on
communications policy. Meanwhile, the Commission of the
European Communities has put forward a draft directive on
Data Protection in Telecommunications.
The European Commission made a critical point about
future network development. It said that "the effective
protection of personal data and privacy is developing into an
essential precondition for social acceptance of new digital
networks and services." This view is shared by agencies in
other countries that have looked at the implications of
advanced networking services. For example, the Ministry of
Posts and Telecommunications in Japan recently concluded a
study on the protection of personal data in the
telecommunications business and recommended a series of
privacy guidelines to accompany the introduction of new
network services.
In the United States, however, we find ourselves in the
midst of the greatest privacy debate in a generation. In the
absence of a coherent federal policy to protect privacy,
consumers have been left to fend for themselves, and the
response is not encouraging. From Pennsylvania to
California, telephone companies now face widespread and well-
founded consumer opposition to new telephone services. Part
of the reason for this is that there has been little effort
in the United States at the federal level to develop privacy
principles for new network services.
CPSR would like to see an agency in the United States
take on the task of developing and promulgating privacy
principles for network services. We have already recommended
the creation of a data protection board which could, among
other tasks, develop appropriate principles for network
communications. There is a proposal before Congress to
establish such an agency, but is unclear whether it will be
enacted this year.
Meanwhile, the Federal Communications Commission (FCC)
has been unwilling to address the privacy implications of new
network services. We are also somewhat disappointed that
neither the Computer Science and Technology Board (CSTB) of
the National Research Council or the Office of Technology
Assessment (OTA) has addressed privacy concerns for network
users. Both the CSTB and the OTA are well qualified to
tackle this problem.
In the interim, NCLIS could take a leadership role, and
help develop and promulgate privacy principles for the
emerging communications infrastructure. It is clearly in the
interest of the library and information science community to
ensure adequate privacy protection, but unless some agency
takes on this responsibility it appears unlikely that the
work will be undertaken.
CPSR believes that it is in the long-term interest of
our country and of computer users around the world to ensure
protection for networked communication. The failure to
develop such policy may impose very high costs on all network
users, and may ultimately reduce greatly the value of the
network to users.
Speaking academically, the absence of adequate
protection for electronic communication is a substantial gap
in NREN policy that should soon be addressed if the full
potential of the infrastructure is to be realized. Speaking
practically, if we don't get some good policy soon, we may
all be buried in a blizzard of electronic junkmail the likes
of which we have never known.
I would like now to make three points about the current
state of privacy protection for NREN, and then propose a
series of principles for privacy protection. These
principles may help "get the ball rolling" and encourage the
development of other initiatives. I hope that NCLIS will
recommend that the Office of Science and Technology Policy
(OSTP) give these principles full consideration.

FINDING 1:
Commercialization of the NREN will exacerbate
existing privacy problems. Without a clear mechanism
to protect privacy, user concerns will increase.
Much of the discussion surrounding the NREN today
focuses on the opportunity to develop commercial services and
to provide network access for private carriers. We do not
oppose efforts to provide commercial services. Clearly, there
is an important opportunity to develop new services and to
offer products through the network. At the same time, it is
apparent that the commercialization of the NREN will create
new pressures on privacy protection.
In the current network environment, made up primarily of
researchers and scientists, there is little incentive or
opportunity to gather personal data, to compile lists, or to
sell personal information. This is likely to change. Once
commercial transactions begin to take place on the net, the
information environment will resemble a hybrid of credit card
and telephone call transactions. Records of individual
purchases will be available and will possess commercial
value. The NREN community will face a whole new set of
privacy issues.
We anticipate that there will be three different types
of privacy problems as the NREN continues to evolve. First,
as commercial organizations become users of the network, they
will gather personal data, and wish to sell lists. The
address files for list servers could be sold, and users may
find themselves "subscribed" to lists they have no interest
in. These activities will raise traditional privacy concerns
about the restrictions on disclosure and secondary use, the
opportunity for users to obtain information held by others,
and the need to minimize the collection of personal
information.
Second, efforts to promote competitiveness in the
delivery of network services may also lead to the disclosure
of network data which will compromise user privacy.
This problem is already apparent in the current rules
for the operation of the telephone network. The Federal
Communication Commission requires telephone companies to
provide records of customer phone calls to other companies so
that competing companies may analyze calling patterns and
sell their services. Large companies objected to the
disclosure of this sensitive information. As a result the
FCC required that telephone companies obtain authorization
before releasing these numbers. But this restriction only
applies to telephone customers with more than 20 lines.
The disclosure of Customer Proprietary Network
Information (CPNI) has already surprised many telephone
customers who now receive calls from companies with whom they
have no prior relationship. These companies are able to
describe the customer's telephone calling habits in great
detail. Users of NREN services are also likely to object to
the disclosure of network information.
The third problem is that law enforcement agencies are
likely to make "greater demands" on communication service
providers to turn over records of electronic communications
to the government and to provide assistance in the execution
of warrants. I say "greater demands" with some reservation
since the recent proposal from the Federal Bureau of
Investigation to require that all communications equipment in
the United States be capable of wiretapping seems about the
greatest demand conceivable. Still, we should anticipate
that the government demands for access to the contents and
records of NREN communications are likely to increase.

FINDING 2:
Current privacy protections are inadequate
Electronic communications are provided some protection
against unlawful interception by the Electronic
Communications Privacy Act (ECPA) of 1986. This law extends
the very important guarantees contained within the 1968
wiretap statute to digital communication and stored
electronic mail. But this protection now appears inadequate.
As a general matter, the wiretap law protects the contents of
an electronic message against unlawful disclosure; it does
not protect the record of the transaction against disclosure.
ECPA also does not appear to protect critical personal
information, such as a person's telephone number, from
improper disclosure. For example, the Calling Number
Identification (CNID) service is probably a violation of the
wiretap statute and clearly a violation of the wiretap law of
several states. Nonetheless, the service has been offered
over the objection of consumer groups, technical experts, and
legal scholars.

FINDING 3:
Technical safeguards provide only a partial
solution
There are some in the network community who believe that
technology will provide a solution to these emerging privacy
problems. New techniques in cryptography provide ways to
protect the contents of an electronic message and even to
protect the identity of the message author. An article that
will appear next month in Scientific American titled
"Achieving Electronic Privacy" describes in more detail how
it may be possible through technical means to recapture some
privacy.
CPSR has supported many efforts to improve technical
means for privacy protection. In fact, CPSR has been of the
leading proponents of the widespread us of cryptography to
protect electronic communications. We have opposed
restrictions by both the National Security Agency and the
Federal Bureau of Investigation on the use of cryptography.
We have also supported the development of privacy-enhancing
technologies, such as telephone cards which are widely used
in Europe and Japan, and recommended that policy makers
explore technical means to protect information.
Nonetheless, we do not believe that technical safeguards
will provide sufficient protection for networked
communications. Our right of privacy is based on
Constitutional principles and our national history, and
reflects our commitment to certain political ideals. The
protection of privacy is ultimately a policy decision that
must be resolved through our political institutions.
Clearly, technology provides useful developments that we
should incorporate into future networks, but it would be a
mistake to assume that technology alone will provide
sufficient protection.
This point was made two decades ago by former White
House Science Adviser Jerome Wiesner who also served as
president of MIT. In testimony before Congress on the privacy
implications of databanks, Professor Wiesner said:

"There are those who hope new technology can redress
these invasions of personal autonomy that information
technology now makes possible, but I don't share this
hope. To be sure, it is possible and desirable to
provide technical safeguards against unauthorized
access. It is even conceivable that computers could be
programmed to to have their memories fade with time and
to eliminate specific identity. Such safeguards are
highly desirable, but the basic safeguards cannot be
provided by new inventions. They must be provided by
the legislative and legal systems of this country. We
must face the need to provide adequate guarantees for
individual privacy."
We believe that the development of NREN privacy policy
should be conducted in this spirit: looking for opportunities
to incorporate technical safeguards while recognizing that
the ultimate decisions are policy-based.

PRIVACY GUIDELINES
Before discussing the proposed privacy principles, I
would like to say a few words about the desirability of
developing these principles. Privacy protection in
electronic environments is a particularly complex policy
problem. There is legal jargon and technical jargon. There
are rapid changes. And there are certainly a wide range of
opinions about how best to achieve privacy, even about what
privacy means.
Privacy principles have helped to clarify goals and to
convey objectives in non-technical terms. Well developed
polices are "technology neutral" and are adaptable as new
technologies emerge. Professional organizations have made
widespread use of such principles for codes of ethics and for
public education.
There are a number of such polices in the privacy realm.
Some of these polices have been extremely influential in the
development of public policy, national law, and international
agreements. For example, the Code of Fair Information
Practices was the basis for the Privacy Act of 1974, the most
extensive privacy law in the United States. The Code was
developed by a special task force created by the Secretary of
Health, Education, and Welfare in 1973. Other codes have
formed the basis for data protection law in Great Britain.
All of these codes seek to establish certain
responsibilities for organizations that collect personal
information, and to create certain rights for individuals.
In developing these telecommunication privacy
guidelines, we examined existing codes and particularly the
principles developed by the Organization for Economic and
Cooperative Development (OECD) in 1981. We also incorporated
several additional principles that we believe are necessary
to protect personal information in communication
environments.
Taken as a whole, the principles are intended to improve
privacy protection for network communications as the NREN
continues to evolve.

RECOMMENDATION 1:
The confidentiality of electronic communications
should be protected.
The primary purpose of a communication network is to
ensure that information can travel between two points without
alteration, interception, or disclosure. A network that
fails to achieve this goal will not serve as a reliable
conduit for information. Therefore the primary goal should
be to guarantee the confidentiality of electronic
communications.

RECOMMENDATION 2:
Privacy considerations must be recognized
explicitly in the provision, use and regulation of
telecommunication services.
The addition of new services to a communications
infrastructure will necessarily raise privacy concerns.
Users should be fully informed about the privacy implications
of these services so that they are able to make appropriate
decisions about the use of services.

RECOMMENDATION 3:
The collection of personal data for
telecommunication services should be limited to the
extent necessary to provide the service.
Users should not be required to disclose personal data
which is not necessary for the rendering of the service. In
particular, the use of the Social Security number should be
avoided. In no instance, should it be used as both an
identifier and authenticator.

RECOMMENDATION 4:
Service providers should not disclose information
without the explicit consent of service users.
Service providers should be required to make known
their data collection practices to service users.
Service providers have a responsibility to inform users
about the collection of personal information and to protect
the information against unlawful disclosure. Personally
identifiable information should not be disclosed without the
affirmative consent of the user.

RECOMMENDATION 5:
Users should not be required to pay for routine
privacy protection. Additional costs for privacy
should only be imposed for extraordinary protection.
The premise of the federal wiretap statue is that all
users of the public network are entitled to the same degree
of legal protection against the unlawful disclosure of
electronic communications. This principle should be carried
forward into the emerging network environment. Segmented
levels of privacy protection are also likely to introduce new
transaction costs and create inefficiencies. Where special
charges are imposed for privacy, it should be for "armored
car" service.

RECOMMENDATION 6:
Service providers should be encouraged to explore
technical means to protect privacy.
Service providers should pursue technical means to
protect privacy, particularly where such means may improve
the delivery of service and reduce the risk of privacy loss.

RECOMMENDATION 7:
Appropriate security polices should be developed
to protect network communications
Security is an element of privacy protection but it is
not synonymous with privacy protection. Appropriate security
policies should be put in place to protect privacy. However,
it should be recognized that some security measures may
compromise privacy protection. Network monitoring, for
example, or the collection of detailed audit trail
information will raise substantial privacy concerns.
Therefore, security policies should be designed to serve the
larger goal of privacy protection.

RECOMMENDATION 8:
A mechanism should be established to ensure the
observance of these principles.
Good principles without appropriate oversight and
enforcement are insufficient to protect privacy. This has
been the experience of the United States with the Privacy Act
of 1974 and of the European countries with the OECD
principles of 1981. In both instances, fine principles
lacked sufficient oversight and enforcement mechanisms.

Additional principles may be appropriate and these
principles may well need modification. But we hope that they
will provide a good starting point for a discussion on
communications privacy for the NREN.

[Attachments: "Protecting Privacy," Communications of the
ACM, April 1992; "Communications Privacy: Implications for
Network Design," Proceedings of INET '92, Kobe, Japan)]

=============================================================
CPSR Washington Office, 666 Pennsylvania Ave., SE, Suite 303
Washington, DC 20003 202-544-9240 (tel) 202-547-5481 (fax)
rotenberg@washofc.cpsr.org

Archived CPSR Information
Created before October 2004
Announcements

Sign up for CPSR announcements emails

Chapters

International Chapters -

> Canada
> Japan
> Peru
> Spain
          more...

USA Chapters -

> Chicago, IL
> Pittsburgh, PA
> San Francisco Bay Area
> Seattle, WA
more...
Why did you join CPSR?

Interested in a forum in which to contribute efforts and share ideas and also, more specifically, a forum in which I may contribute some articles that I am working on.