|
Vol. 71, No. 10,
October 1998
Invasions of Computer Privacy
By Michael K. McChrystal,
William C. Gleisner III, and Michael J. Kuborn
In the Information Age, the issue of privacy is being discussed with
more passion than ever before. Americans have always cherished their privacy,
perhaps because we also have respected the power of information. What the
Information Age has changed is the ease with which information can be gathered
and stored and then used to threaten privacy. As collectors, purveyors,
and repositories of information, lawyers need to know the general lay of
the land concerning computer privacy law. Just as importantly, we need to
advise our clients about the law as it relates to protecting and gathering
information.
Possessors vs. subjects of information
The law provides one set of protections for possessors of computerized
information and a different set for the subjects of the information and
ne'er the twain shall meet. |
One crucial point must be recognized at the outset: The law provides one
set of protections for possessors of computerized information and a different
set of protections for the subjects of the information. This distinction
is important because much of the information about ourselves that we rightly
regard as most private is stored in the computers of others, such as lawyers,
doctors, employers, insurers, financial institutions, government agencies,
friends, and coworkers.
With respect to possessors, computer information receives expansive statutory
protection in Wisconsin. It is a crime knowingly to access, modify, or destroy
computer data, programs, or supporting documentation without authorization.1 In a sense, this provides a wildly expansive form
of privacy protection specific to the computer as a medium. Imagine similar
privacy protection being afforded paper documents such that it would be
a crime "willfully, knowingly, and without authorization" to "access"
a piece of paper containing data of any kind.2
One would have to be very careful in picking up someone else's newspaper.
Notwithstanding the sweep of Wisconsin's computer crimes statute, the
extent of computer privacy remains very much in doubt. Although the statutory
language is sweeping, it may be so sweeping as to be unenforceable and,
in some respects, unreliable as a method of protecting privacy. Moreover,
while the statute creates computer privacy rights, it is unclear whether
it provides a private remedy when those rights are violated. The statute
does not, in its own terms, establish a private cause of action for a violation,
and no reported Wisconsin decision directly addresses the issue. On the
other hand, the statute does define data as property, and tort law typically
provides a remedy for intentional, nonconsensual, and harmful interference
with another's property.3
The statute is most limited, however, in that its protection seems to
run only to the owner or possessor of the data, computer, or program. While
data may be property and protectible as such, data about me often
will not be my property. This is because the computer crimes statute
appears to protect the possessors of data, and not necessarily the
subjects of the data.
It should be emphasized that the subjects of computer information do
receive protection in varied branches of the law. Duties of confidentiality
can arise by statute or contractual agreement or by virtue of a professional
relationship, so that some possessors of information owe a duty to some
subjects of the information they possess. In many circumstances, tort remedies
may be available in addition to any breach of contract remedy.
A recent federal district court decision in Missouri4
provides a good compendium of the issues that can arise. In that case, two
lawyers left a law firm in which they had participated in the defense of
Chrysler Corp. against class actions alleging certain defects in Chrysler
vehicles. Before leaving the firm, the lawyers copied various computer files
relating to the actions against Chrysler, allegedly in violation of a state
computer crimes statute similar to the one in Wisconsin.5
The lawyers thereafter were involved in a class action against Chrysler
alleging defects different from those alleged in the cases that they had
helped defend. Chrysler brought suit against the lawyers for breach of the
fiduciary duties of loyalty and confidentiality, violation of the computer
"tampering" statute (which specifically allowed a private action
for damages),6 and breach of written confidentiality
agreements. The court found that triable issues existed as to all such claims.
Persons who provide professional services and who elicit private information
to do so usually have a duty to protect the confidentiality of the information
they receive. In fields such as health care and financial services, state
and federal statutes and regulations elaborate these duties. Privacy duties
also may arise by contract. For example, many Web sites announce privacy
policies that may contractually bind the site's sponsor if a transaction
is entered into and the protections promised by the policy aren't delivered.
If someone intentionally steals corporate or business secrets over the
Internet, a host of federal criminal and civil laws also come into play.
These remedies are rather comprehensively cataloged in a recent article.7 Assuming the culprits can be identified, criminal
remedial responses might include prosecution pursuant to:
a) the Economic Espionage Act of 1996, 18 U.S.C.
§ 670;
b) the National
Stolen Property Act, 18 U.S.C. § 2311, et seq.;
c) the Wire
Fraud Act, 18 U.S.C. § 1343, et seq.;
d) the Intercepted
Wire & Electronic Communications Act, 18 U.S.C. § 2510-1521;
e) the Stored
Wire & Electronic Communications Act, 18 U.S.C. § 2701-2711;
or
f) the Computer
Fraud and Abuse Act, 18 U.S.C. § 1030.8
Civil remedies might include an action:
a) for the intentional and wrongful copying or control of trade secrets;
b) for Civil
RICO, 18 U.S.C. § 1964 (a); and
c) under theIntercepted
Wire & Electronic Communications Act, the Stored
Wire & Electronic Communications Act, and the Computer
Fraud and Abuse Act.9
Michael McChrystal, top, Marquette 1975, is
a professor of law at the Marquette University Law School.
William Gleisner, middle, Marquette 1974,
both a practicing attorney and computer consultant, maintains
a law firm-based litigation support service bureau in Milwaukee.
Michael Kuborn, bottom, Marquette 1998, is
with Olsen, Kloet, Gundersen & Conway, and is trained in
computer recovery and computer search and seizure techniques.
Products and services mentioned in this article should not be
construed as an endorsement.
|
As you can see, computer privacy can be thought of as involving two separate
spheres. The first sphere is the protection afforded to one's own computer,
programs, and data. The other sphere is the subject's protection from wrongful
transfer of private computer information by a possessor of that information,
usually a service provider.
It is clear that wrongful disclosure of private information may be actionable
by the subject of that information (for example, a client, a patient, or
in some cases, a customer). It is less clear that the subject of private
information has an action against one who wrongly acquires the information
from a third party. Suppose, for example, that a hacker unlawfully accesses
my file on my lawyer's computer system. If my lawyer failed to use reasonable
care to protect the information, I may have a claim against the lawyer.
But do I have rights against the hacker?
In Wisconsin, the right of privacy statute,10
which generally comports with the invasion of privacy torts recognized in
the Restatement (Second) of Torts,11 provides
the starting point for analysis. With respect to computer privacy, the statute
raises at least two important (and quite separate) questions:
1) Does an invasion of computer privacy involve intrusion "in a
place that a reasonable person would consider private" or "in
a manner which is actionable for trespass"? It is not a great stretch
to consider that computers are places that occupy physical space and so
a computer is a "place that a reasonable person would consider private."
It also seems plausible to conclude that unauthorized access to a computer
is a trespass in the nature of trespass to chattel. While these views may
not have formed part of the legislative intent behind the statute, the statute
directs that it is to be "interpreted in accordance with the developing
common law of privacy."12
2) Is dissemination of information by computer "publicity"
for purposes of the statute? It seems clear that private facts may be publicized
at a Web site that receives thousands of hits each day or even by an email
that goes out one message at a time. What is less clear is whether "publicizing"
a private fact to a small number of individuals gives rise to a cause of
action.
These questions, however, await dispositive treatment by Wisconsin courts.
Indeed, perhaps the answers will be forthcoming first from the United States
Congress.13
Conclusion
Just as many of the technical aspects of protecting (and violating) the
privacy of computer information rapidly change, the law is in a state of
constant development. Much of that development is taking the form of targeted
legislation addressing specific abuses. At the same time, the law continues
to provide a broader structure to analyze the rights and liabilities involved,
such as the Wisconsin computer and privacy statutes discussed above.
Endnotes
1Wisconsin
Statute section 943.70(2)(a)(2) provides:
"Offenses Against Computer Data and Programs: (a) Whoever willfully,
knowingly and without authorization does any of the following may be penalized
as provided in par. (b):
"1. Modifies data, computer programs, or supporting documentation.
"2. Destroys data, computer programs, or supporting documentation.
"3. Accesses data, computer programs, or supporting documentation.
"4. Takes possession of data, computer programs, or supporting
documentation.
"5. Copies data, computer programs, or supporting documentation.
"6. Discloses restricted access codes or other restricted access
information to unauthorized persons."
This statute establishes a form of privacy protection specific to the
medium of computers. "Data" is statutorily defined as "a
representation of information, knowledge, facts, concepts, or instructions
that has been prepared or is being prepared in a formalized manner and has
been processed, is being processed, or is intended to be processed in a
computer system or computer network. Data may be in any form including computer
printouts, magnetic storage media, punched cards and as stored in the memory
of the computer. Data is property." Wis.
Stat. § 943.70(1)(f) (1995-97).
2It may be that paper records receive loosely
analogous protection in that they are typically stored in locations from
which others can be effectively excluded.
3See, Restatement (Second) of Torts
§ 158 (liability for Intentional Intrusions on Land). See also,
Restatement (Second) of Torts § 217 (Ways of Committing Trespass to
Chattels).
4Chrysler Corp. v. Carey, 1998 U.S.
Dist. LEXIS 7878 (E.D. Mo. May 26, 1998).
5Mo. Rev. Stat. § 569.095.
6Mo. Rev. Stat. § 537.525(1).
7See, Ian C. Ballon, Alternative
Corporate Responses to Internet Data Theft, 471 PLI/P at 737 (1997).
8Id. at 746.
9Id. at 748.
10Wisconsin
Statute section 895.50 provides in part:
"(2) In this section, 'invasion of privacy' means any of the following:
"(a) Intrusion upon the privacy of another of a nature highly offensive
to a reasonable person, in a place that a reasonable person would consider
private or in a manner which is actionable for trespass."
"(c) Publicity given to a matter concerning the private life of
another, of a kind highly offensive to a reasonable person, if the defendant
has acted either unreasonably or recklessly as to whether there was legitimate
public interest in the matter involved, or with actual knowledge that none
existed. It is not an invasion of privacy to communicate any information
available to the public as a matter of public record."
11See Restatement (Second) of Torts
§ 652B-652D.
12Wis.
Stat. § 895.50(3) (1995-97).
13See, S. 1368, 105th Cong., 1st Sess.
(1997) (Medical
Information Privacy and Security Act); H.R. 1813, 105th Cong., 1st Sess.
(1997) (Personal
Information Privacy Act); S. 909, 105th Cong., 1st Sess. (1997) (Secure
Public Networks Act); S. 771, 105th Cong., 1st Sess. (1997) (Unsolicited
Commercial Electronic Mail Choice Act); H.R. 3785, 104th Cong., 2nd
Sess. (1996) (Background
Security Records Act); H.R. 1964, 105th Cong. 1st Sess. (1997) (Communications
Privacy and Consumer Empowerment Act); H.R. 1367, 105th Cong., 1st Sess.
(1997) (Federal
Internet Privacy Protection Act); H.R. 2372, 105th Cong., 1st Sess.
(1997) (Internet
Protection Act); H.R. 695, 105th Cong., 2nd Sess. (1998) (Security
and Freedom through Encryption Act).
|