">
|
PRB 00-05E
THE PRIVACY OF
PERSONAL INFORMATION AND
Prepared by: TABLE
OF CONTENTS PRINCIPLES OF FAIR INFORMATION PRACTICE INTERNATIONAL DEVELOPMENTS IN RELATION TO PRIVACY PROTECTION A. OECD -- Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
B. European Union -- Directive on
the Protection of Personal Data with Regard to the Processing
C. Council of Europe -- Guidelines
for the Protection of Individuals with Regard to the Collection D. OECD Ministers -- Declaration on the Protection of Privacy on Global Networks E. Privacy Initiatives in the United States F. Privacy Initiatives in Australia G. Privacy Initiatives in the United Kingdom H. Privacy Initiatives in Canada I. Canadian Standards Association -- Model Code for the Protection of Personal Information J. Uniform Law Conference of Canada FEDERAL LEGISLATION: BILL C-6 -- PERSONAL INFORMATION
A. Part 1 DEVELOPMENTS AT THE PROVINCIAL LEVEL A. Advantages and Disadvantages of Self-Regulation
B. Measures to Improve Private Sector
Privacy Codes and Policies THE
PRIVACY OF PERSONAL INFORMATION AND Electronic commerce is another name for doing business electronically. This form of commerce covers a diverse range of activities and can be defined broadly or narrowly. Broad definitions include transactions that use digital technology, including open networks such as the Internet and closed networks such as electronic data interchange and debit and credit cards. More narrowly focused definitions, however, limit electronic commerce to transactions using the Internet.(1) Three types of transactions make up electronic commerce: transactions between businesses, those between businesses and consumers, and government services. To date, most electronic commerce has involved business to business, or business to government transactions and has been conducted over closed systems rather than over the Internet. Indeed, some 80% of electronic commerce transactions are of the business-to-business variety.(2) It is expected that global business-to-business Internet commerce will reach US$2,960 billion by 2003.(3) Despite the dominant role of business-to-business transactions in the current electronic commerce landscape, it is anticipated that the rapid increase of electronic transactions between businesses and individuals will form the next stage in the development of global electronic commerce. As a result, governments around the world and the private sector are seeking to reduce or eliminate impediments to using the Internet for commercial transactions. Consumers fear and concern about the confidentiality of their personal information is widely acknowledged as a significant impediment to the development of electronic commerce. Surveys highlight a definite public preference for preserving the privacy of personal information on the Internet. A 1998 Angus Reid survey reported that over 80% of Canadians think personal data should be kept strictly confidential; 65% think it is "not at all acceptable" for companies to sell, trade or share detailed lists of personal information with other organizations; nine in ten Canadians strongly disapprove of companies trafficking in information about their private lives without their consent; and 94% of Canadians feel it is important to have safeguards to protect personal information on the Internet.(4) Although Internet-based electronic commerce is expected to grow significantly, consumer reluctance to conduct business on the Internet is likely to be a concern until issues of security, privacy and redress are satisfactorily resolved. Technological advances have facilitated the collection of personal information through the Internet. There are many ways to collect such information. First, a Web user can voluntarily supply the information. Second, a user can use software that directly interacts with a Web site; some sites, for example, before they can be used, require a user to download a particular kind of software, thereby revealing his or her identity. Third, individuals may unknowingly volunteer personal information by completing an online questionnaire or registration form in order to gain access to a particular site or to be included in an online directory. Fourth, "cookies" can be used to track and create profiles of Internet users interests and browsing activities. Cookies are small amounts of computer code placed on a hard drive to track the users activity on a Web site and use this information when the person next visits the site. The Web site can then tailor online advertising to match the interests of the particular Web user. Though a cookie does not reveal a persons name or e-mail address, it can profile buying habits and store the information in a database. Fifth, tracking software and statistical logs can maintain a record of every Web site and every page on a Web site that has been accessed. Such "clickstream data" (so called because each mouse click is recorded) are often gathered without the knowledge or consent of the consumer.(5) Personal information can be a valuable commodity. Indeed, the collection and use of personal data can be critical to the success of a Web site. Databases that record buying habits, preferences, and demographic particulars can be used to create customized solicitations or sold to other businesses.(6) Thus, the Internet thrives on information but also presents new opportunities to abuse information and invade personal privacy.(7) Over the past 20 years, governments in the United States, Canada, Australia and Europe have studied how personal information is collected, used and disclosed and the safeguards in place to provide adequate privacy protection. The result has been a series of reports, guidelines, model codes and laws that represent widely accepted principles of fair information practice. Although fair information practices and privacy initiatives are relevant to both the public and private sectors, this paper focuses on initiatives to protect the privacy of personal information in the private sector in the context of electronic commerce. Efforts by governments in Canada, the United States, United Kingdom and Australia, as well as industry self-regulatory initiatives, will be discussed. PRINCIPLES OF FAIR INFORMATION PRACTICE Many of the initiatives to protect the privacy of personal information are based on five key privacy protection principles. These are listed and explained below.
1. Notice/Awareness The principle of notice requires that consumers be given notice of an entitys information practices before any personal information is collected from them; in this way they can make an informed decision as to whether to disclose their personal information and to what extent. Such notice includes:
2. Choice/Consent Another principle of fair information practice is consumer choice or consent. This involves giving consumers options in relation to how their personal information is to be used. This is particularly relevant to secondary uses of the information that are over and above those necessary to complete the contemplated transaction.(10) There are typically two kinds of choice schemes -- opt-in and opt-out. Opt-in schemes require the individuals consent before the collection, use or disclosure of personal information can take place while opt-out schemes assume that the information can be collected, used or disclosed unless the individual takes steps to prevent this from happening. 3. Access/Participation The third essential principle -- access -- refers to a persons ability to have access to his or her own information and to ensure that the information is accurate and complete.(11) 4. Integrity/Security This principle requires that data be accurate and secure. This involves instituting both managerial and technical measures to protect against loss and the unauthorized access, destruction, use, or disclosure of the information. Managerial measures include internal organizational measures that limit access to the information and ensure that persons having such access do not use the information for unauthorized purposes. Technical security measures include encryption in the transmission and storage of data, limits on access through use of passwords, and the storage of data on secure servers or computers that are inaccessible by modem.(12) 5. Enforcement/Redress Effective enforcement mechanisms are essential to protect privacy. There are several approaches to enforcement including industry self-regulation, legislation creating private remedies for consumers, or some type of regulatory scheme enforceable through civil and criminal sanctions.(13) INTERNATIONAL DEVELOPMENTS IN RELATION TO PRIVACY PROTECTION
A. OECD -- Guidelines on the Protection
of Privacy and Transborder Flows One of the first multinational efforts to establish guidelines for the protection of personal information was undertaken by the Organisation for Economic Co-operation and Development (OECD). In 1980, the OECD adopted a number of privacy principles relating to personal information in the public or private sectors. Representing a consensus among OECD member countries, these principles were set out in Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.(14) The Guidelines contained the following eight privacy principles: Collection limitation principle: There should be limits to the collection of personal information, which should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Data quality principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. Purpose specification principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. Use limitation principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with [the purpose specification principle] except with the consent of the data subject or by the authority of law. Security safeguards principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data. Openness principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and the usual residence of the data controller. Individual participation principle: Individuals should have the right:
Accountability principle: A data controller should be accountable for complying with measures that give effect to the principles stated above. Although the OECD Guidelines are voluntary and have no force in law, they have served as the foundation of privacy protection schemes in a number of countries. They have not, however, produced the harmonization of data protection regimes that was hoped for.(15)
B. European Union -- Directive
on the Protection of Personal Data with Regard to the In 1995, the European Union Council of Ministers adopted the Directive on the Protection of Personal Data with Regard to the Processing of Personal Information and on the Free Movement of Such Data.(16) Members of the European Union were required to bring the Directive into effect in their States by 24 October 1998. The Directive has two purposes: to protect individuals in relation to the processing of their personal data and to provide for the free flow of personal data between Member States through the harmonization of national data protection laws. The EU Directive contains a number of data quality principles. Member States must ensure that personal data are:
In addition, subject to several exceptions, personal data can be processed only if the data subject has unambiguously consented to this. These exceptions include processing necessary for the performance of contractual obligations or certain legal obligations and the protection of vital or legitimate interests of either the data subject or the data controller.(18) Again, subject to certain exceptions, the processing of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs or trade-union membership is prohibited, as is the processing of data concerning an individuals health or sex life.(19) The EU Directive gives a number of rights to individuals about whom personal data are collected: the individual must be informed of the identity of the data controller, the purposes for which the data are collected, the recipients of the data and the right to access and correct the data.(20) Where the data have not been obtained directly from the data subject, the controller must provide him or her with the same information unless (and particularly in processing for statistical purposes or for historical or scientific research) this would prove impossible or would involve a disproportionate effort.(21) The EU Directive provides that a data subject has the right to object to the processing of personal data for direct marketing purposes.(22) The Directive also provides that individuals have the right to a judicial remedy for any breach of the rights and to compensation.(23) Each Member State must appoint an independent supervisory authority to monitor and enforce the application of the EU Directive. The supervisory authority is to have investigative powers, powers of intervention and the power to engage in legal proceedings for violations of national data protection legislation adopted pursuant to the EU Directive.(24) The EU Directive also provides for codes of conduct drawn up by trade associations and other bodies.(25) Article 25 of the EU Directive deals with the transfer of personal data from EU Member States to third countries. Such transfers are permitted only if the third country ensures "an adequate level of protection" for such data. What constitutes an "adequate level of protection" is an important issue for non-EU members. The Directive notes that the adequacy of the level of protection provided by a third country is to be assessed in light of all the circumstances surrounding a data transfer operation, with particular consideration given to the nature of the data; the purpose and duration of the proposed processing operation; the country of origin and the country of final destination; the rules of law, both general and sectoral, in force in the third country; and the professional rules and security measures that are complied with in that country.(26) Where the Commission finds that a third country does not ensure an adequate level of protection, Member States are to prevent the transfer of data to that country. The Directive does go on, however, to provide that the transfer of data to a third country without adequate protection may still take place on condition that:
Personal data can also be transferred to a third country that does not ensure an adequate level of protection where the data controller "adduces adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals as regards the exercise of corresponding rights; such safeguards may in particular result from appropriate contractual clauses."(28) On another front, the European Commission has proposed the creation of a "dot-EU" high-level Internet domain name with a privacy policy to which all sites would be required to adhere in order to register. It is hoped that a guarantee of strict privacy measures would increase consumers confidence in the use of the Internet and give companies registered on the site a marketing advantage over those with less rigorous privacy standards.
C. Council of Europe -- Guidelines
for the Protection of Individuals with Regard to the On 23 February 1999, the Committee of Ministers of the Member States of the Council of Europe adopted Guidelines for the Protection of Individuals with Regard to the Collection and Processing of Personal Data on Information Highways. These guidelines set out principles relating to fair privacy practice for Internet users and Internet service providers (ISPs). The Council suggests that these guidelines be incorporated into ISP codes of conduct. Internet service providers, for example, should:
D. OECD Ministers -- Declaration on the Protection of Privacy on Global Networks At their 1998 Ottawa Conference, "A Borderless World: Realising the Potential of Global Electronic Commerce," the OECD Ministers released a Declaration on the Protection of Privacy on Global Networks. In this, the Ministers confirmed their commitment to the protection of privacy on global networks and agreed to take the necessary steps to ensure that the OECD Privacy Guidelines are effectively implemented in relation to global networks, and in particular to:
E. Privacy Initiatives in the United States Unlike the European Union and Canada, the United States favours a non-legislative approach to protecting privacy on the Internet. As a result, the Administration has consistently promoted private sector self-regulatory initiatives, although it has indicated that it would reevaluate its preference for self-regulation if effective privacy protection could not be achieved that way. This strategy was set out in the July 1997 White House document A Framework for Global Electronic Commerce (the "Framework"), which established the following principles to facilitate the growth of electronic commerce in the U.S.:
The Framework sets out nine areas where international agreements would be needed to "preserve the Internet as a non-regulatory medium." These areas were grouped into three main categories: financial issues, legal issues, and market access issues. The legal issues included a Uniform Commercial Code for electronic commerce, intellectual property protection, privacy and security.(32) The Presidential Directive on Electronic Commerce (1 July 1997) was designed to implement the strategy set out in the Framework. The Directive gave 13 specific tasks to various Cabinet agencies. One of these was for the Secretary of Commerce and the Director of the Office of Management and Budget to "encourage private industry and privacy advocacy groups to develop and adopt within the next 12 months effective codes of conduct, industry developed rules, and technological solutions to protect privacy on the Internet..."(33) On the privacy front then, the goal was to promote self-regulation and thereby avoid the need for regulatory or legislative initiatives. Following upon this, in June 1998 the U.S. Federal Trade Commission released a report to Congress on the results of its examination of the privacy practices of over 1,400 commercial Web sites; these had been assessed for their conformity with core principles of fair information practices. The survey revealed that adherence to privacy protection principles by many Web sites fell short of acceptable standards. While nearly 85% of the Web sites surveyed collected information from consumers, only 14% provided notice of their information practices and only 2% had a comprehensive privacy policy. Of Web sites aimed at children, the Commission found that 89% collected personal information from children but only 23% of those sites told children to obtain parental permission before providing it and even fewer allowed for parental control over the collection and use of information obtained from children.(34) The FTC expressed its continuing commitment to self-regulatory measures to protect the privacy of personal information on the Internet but noted that, despite its urgings and privacy initiatives, effective self-regulatory regimes had not yet been implemented. The Commission called for more incentives to spur self-regulation and ensure the widespread implementation of basic privacy principles.
The Commission recommended, however, that Congress develop legislation placing parents in control of the online collection and use of personal information from their children and setting out basic standards of practice governing this. All commercial Web sites directed to children would be required to comply with these standards.(36) Following the recommendations of the FTC, in 1998, the Childrens Online Privacy Protection Act of 1998 (COPPA) was signed into law. In the fall of 1999, the FTC issued its final rule implementing the COPPA, which will come into effect on 21 April 2000. The COPPA and the FTC rule apply to commercial Web sites directed to children under 13, limiting the information collected to what is necessary for a childs participation in an activity. The Act requires the operator of the Web site to post a clear and prominent privacy policy and to obtain verifiable parental consent prior to collecting, using or disclosing personal information from a child. The statute also includes a "safe harbor" program for industry groups or others who wish to create self-regulatory programs to govern participants compliance. Under the law, the FTC is authorized to bring enforcement actions and impose civil penalties for violations of the rule.(37) A more recent government report paints a rosier picture of the state of self-regulatory privacy initiatives. The 1999 report of the U.S. Government Working Group on Electronic Commerce, Towards Digital eQuality, noted that privacy policies have become more common on private sector Web sites and self-regulatory efforts widespread and enforceable.(38) According to the report, the private sector claims that nearly two-thirds of commercial Web sites now post privacy policies or information practice statements, an increase from 14% the year before.(39) The report reiterated the U.S. governments commitment to self-regulation and went on to note that the government will continue to monitor the progress of self-regulation to establish whether such programs actually protect the privacy of Internet users. This will include an online survey by the FTC in 2000 to reassess the progress in implementing fair information practices. Another report was issued in December 1999 by the Electronic Privacy Information Center (EPIC), a U.S. civil liberties group that focuses on internet privacy, encryption, information access and other related issues. This was less sanguine about privacy practices on the Internet.(40) EPIC reviewed the privacy practices and policies of the 100 most popular shopping Web sites to see if they were in compliance with "Fair Information Practices" principles, and whether they used profile-based advertising and cookies. EPIC found that all 100 sites collected personally identifiable information but none required users to disclose personal information when entering or browsing. While 51 sites provided a link to their privacy policies on their homepage, 18 sites had no privacy policy. EPIC also noted that 20 sites belonged to an industry self-regulation program, such as TRUSTe or the Better Business Bureau Online.(41) EPIC noted a wide variation in the privacy policies of the 100 sites. More sites were posting privacy policies and new associations had been formed to promote the development of such policies and to encourage industry awareness of privacy issues; however, most policies typically "lacked the necessary elements of Fair Information Practices and were unlikely to provide meaningful privacy protection for consumers."(42) Another study issued a few months prior to the EPIC review examined the extent to which commercial Web sites have posted privacy disclosures based on fair information practices.(43) The Georgetown Internet Privacy Policy Survey sampled 361 .com Web sites visited by consumers at home that were drawn from the top 7500 URLs ranked by audience during January 1999. The study addressed the following three questions:
In response to the first question, the survey revealed that 92.8% of the sites in the sample collected at least one type of personal identifying information (e.g., name, e-mail address, and postal address). At least one type of demographic information (e.g., gender, preferences, Zip code) was collected by 56.8%; 56.2% of the sites collected both personal identifying and demographic information and 6.6% of the sites collected neither type of personal information.(44) The study found that 65.3% (236) of the 361 sites had posted at least one type of privacy disclosure (a privacy policy notice or an information practice statement); 36% (131 sites) had posted both types of disclosures while 34.1% (123 sites) had not posted either type of privacy disclosure.(45) To determine whether these disclosures reflect fair information practices, the content of all privacy disclosures were analyzed for four elements of fair information (notice, choice, access and security) and whether they posted information on where to ask questions or make complaints about privacy issues. Of the 236 Web sites that collected personal information and posted a privacy disclosure, 89.8% included at least one survey item for notice, 61.9% contained at least one survey item for choice, 40.3% contained at least one survey item for access, 45.8% contained at least one survey item for security, and 48.7% contained at least one survey item for contact information.(46) The report did not draw any conclusions or make any policy recommendations about the effectiveness of self-regulation as a means of protecting privacy on the Internet. Based in part on the results of the Georgetown Internet Privacy Study, a majority of the U.S. Federal Trade Commission recommended in the 1999 report to Congress, Self-Regulation and Privacy Online,(47) that self-regulation be given more time to develop. At the same time, the report called for industry to do more to implement fair information practice principles. In February and March 2000, the FTC once again surveyed the information practices of commercial Web sites. The 2000 online survey results set out in the May 2000 report to Congress Privacy Online: Fair Information Practices in the Electronic Marketplace(48) reviewed the nature and substance of privacy disclosure on U.S. commercial Web sites and assessed the effectiveness of self-regulation as a means of protecting consumer privacy online. While the FTC applauded the development of industry self-regulatory initiatives, the majority of the Commission took the position that industry efforts alone had not been sufficient and could not ensure that the online marketplace as a whole would follow the standards adopted by industry leaders.(49) The Commission noted that only 20% of the busiest Web sites had to any extent implemented all four fair information practices in their privacy disclosures and that fewer than half of the sites surveyed (41%) met the relevant standards with respect to Notice and Choice. In addition, only 8% of the busiest Web sites displayed a seal from one of the self-regulatory seal programs.(50) In a change of direction from its previous reports, a majority of the FTC went on to recommend that Congress enact legislation to ensure adequate protection of consumer privacy online. The majority recognized, however, that industry self-regulation would still play an important role in a legislative structure.(51) The self-regulatory approach to protecting privacy on the Internet has important ramifications for trade relations between the European Union and the United States. While the European Union has established a legislative/regulatory framework, the United States, except in the areas of online privacy relating to children, has promoted self-regulation over legislation. The European Union Directive on Data Protection prohibits the exchange of personal data with countries that do not meet adequate privacy standards. Because the U.S. has not enacted comprehensive data protection legislation governing the private sector, there is considerable uncertainty about whether non-legislative solutions to privacy protection are adequate for the purposes of the Data Protection Directive of the EU. In an effort to reduce this uncertainty, the U.S. Department of Commerce has developed "International Safe Harbor Privacy Principles." These principles, which are intended for use by U.S. organizations receiving personal data from the European Union, aim to satisfy the adequacy requirements of Article 25 of the EU Directive. Decisions by U.S. organizations to qualify for the safe harbour are voluntary. Organizations that decide to adhere to the principles, however, must comply with them in order to obtain the benefits of the safe harbour. The Safe Harbor Privacy Principles continue to be the subject of negotiation with the EU. A preliminary agreement that would allow for the uninterrupted flow of information between Europe and the U.S. is reported to have been reached in late February 2000; it is anticipated that an agreement will finalized by the end of March 2000.(52) F. Privacy Initiatives in Australia After extensive consultation with business and consumers, in February 1998 the Australian Privacy Commissioner issued the National Principles for the Fair Handling of Personal Information (National Principles). These were designed to provide a framework within which business could develop practices to protect the privacy of individuals. Following additional consultation, the National Principles were revised in January 1999. In December 1998, the Australian federal government announced that it would develop "light touch" legislation to support and strengthen self-regulatory privacy protection initiatives in the private sector.(53) At the present time, there is no general legislation in Australia that regulates the handling of personal information in the private sector, although credit providers and credit reporting agencies are regulated in relation to reporting information with respect to personal credit. In 1999, the government released draft key provisions of its proposed privacy scheme for the private sector. The draft provisions would recognize self-regulatory privacy codes that would be backed by a default legislative scheme and complaint-handling regime that would apply where no privacy codes were in place. This scheme would appear to be a middle ground between the legislative/regulatory approach of the European Union and the self-regulatory approach adopted in the United States. The proposed legislation would contain National Privacy Principles (NPPs) applying to the acts and practices of an organization, which could be an incorporated body, a partnership, an unincorporated body, a charitable organization, a community organization or an individual if he or she were a sole proprietor.(54) Not all personal information held by the private sector, however, would be subject to the legislation. Exemptions would be given to:
The proposals would exempt a small business organization (a business with an annual turnover of $1,000,000 or less) where there was a low privacy risk. A small business organization would be defined as an organization that carried on a small business, did not hold any sensitive information and did not transfer personal information about an individual to another person for a benefit, service or advantage.(56) The proposed draft provisions would set out NPPs for the private sector and allow a privacy code to include its own Code Privacy Principles (CPPs) which would replace or incorporate all the NPPs, and provide at least the same level of protection. The CPPs would apply to private sector organizations that agreed to be bound by a particular approved code.(57) The NPPs cover the following: Collection: Among other things, this principle provides that only information that is necessary for the operations of an organization should be collected. Collection should lawful and fair. At the time the information is collected, the intended uses of the information should be made clear. Use and Disclosure: This principle limits use and disclosure of information to the primary purpose for which it has been collected. Use or disclosure for a secondary purpose is permitted in specified circumstances, including where the individual consents, and where the secondary purpose is related and is within the reasonable expectation of the individual. Data Quality: This principle requires organizations to ensure that the information collected is accurate, complete and up-to-date. Data Security: This requires organizations to ensure that any personal information they hold is kept secure. Openness: Organizations must be open about the kinds of personal information they hold and what they do with it. Access and Correction: Wherever possible, organizations should allow individuals to see the personal information that is held about them and to correct any inaccuracies. Identifiers: This principle would discourage private sector organizations from using as their own identifier for an individual, the same identifier assigned to that individual by a government agency. Anonymity: Individuals, in many circumstances, should be able to remain anonymous when dealing with private sector organizations. Transborder Data Flows: This principle would establish the conditions under which an organization would be able to transfer personal information to someone in a foreign country. For example, the foreign recipient of the information must be subject to a law, binding scheme or contract that protects the privacy of such information or the individual must consent to the transfer. Sensitive Information: This principle would limit the collection of sensitive information about individuals, such as information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, or details of health or sex life.(58) The proposed draft goes into considerable detail about the development of private sector privacy codes. An approved code would apply to the activities of an organization and thereby override the default legislative NPPs; if the code provided for complaint handling, the legislative complaint mechanisms would also be overridden. The Privacy Commissioner would have responsibility for approving privacy codes as well as variations to approved codes. The Commissioner would also be able to revoke approval of a privacy code. Before a code could receive approval, among other things it would have to:
The Australian Government intends to introduce its privacy bill in 2000. It is expected that the legislation will become fully effective on 1 July 2001.(59) G. Privacy Initiatives in the United Kingdom As a member of the European Union, the United Kingdom was required to implement the 1995 EU Data Protection Directive. The Data Protection Act 1998(60) (the "Act") gives effect in UK law to the Directive. The Act, which amends the Data Protection Act 1984, received Royal Assent on 16th July 1998 and came into force on 1 March 2000. The Act applies to data controllers who are established in the United Kingdom or who use equipment in the UK for processing data. It follows a notification system for data protection whereby persons wishing to process data must notify the Data Protection Commissioner. The Act also gives legal rights to individuals (data subjects) in respect of personal data held about them by others. The Act contains a number of definitions of important terms. Among these are: "personal data," "sensitive personal data," "data subject," "data controller" and "processing." The term "personal data" means:
The Act also introduces a new category of "sensitive personal data" that is subject to additional safeguards. Sensitive personal data includes information on
For the purposes of the Act, a "data subject" is an individual who is the subject of personal data, while a "data controller" is a person who determines the purposes for which and the manner in which any personal data are, or are to be, processed. The term "processing" is broadly defined; it refers to obtaining, recording, holding, adapting, using, disclosing, destroying or blocking information or data.(63) The Act also sets out eight Data Protection Principles that cover how personal data must be processed:
Unless an exemption exists, at least one of the following conditions must be met for the processing of personal data:
Sensitive personal data must not be processed unless at least one of the above listed conditions and at least one of the conditions set out in Schedule 3 to the Act have been satisfied. The explicit consent of the individual will usually be required before sensitive personal data can be processed unless the data controller can demonstrate that the processing is necessary because of one of the other criteria set out in Schedule 3.(66) The Act also gives rights to individuals in respect of their personal data. These include: the right to have access to the data (sections 7 to 9);
Subject to certain exceptions, data controllers are required to notify the Commissioner before they begin processing personal data. The Act establishes broad categories of information about which notification must be given, including the name and address of the data controller, a description of the personal data to be processed, as well as the categories of data subject to which they relate, a description of the persons to whom the data controller intends to disclose the data, countries outside the EU to which the data will be transferred and a description of the purposes for which the data are being processed.(67) The Act contains a number of exemptions, which are found in the various provisions of Part IV (sections 28-38) and Schedule 7. Exemptions exist for national security purposes(68) and for the prevention or detection of crime, the apprehension or prosecution of offenders, or the assessment or collection taxes.(69) In addition, under section 30 of the Act, the Secretary of State may also exempt personal data relating to an individuals physical or mental health or condition as well as other kinds of data. The Act contains exemptions for journalistic, artistic and literary purposes, provided certain conditions are met,(70) and in respect of the processing of personal data for research purposes (including statistical or historical purposes). Exemptions also exist for data that a data controller is required by law to make available to the public.(71) Exemptions from the non-disclosure provisions of the Act exist where the disclosure is required by law or by court order or in connection with obtaining legal advice or engaging in legal proceedings.(72) An exemption for domestic purposes is available where an individual processes personal data in relation to his or her personal, family or household affairs.(73) The Act establishes the office of The Data Protection Commissioner, an independent officer reporting directly to Parliament. The duties of the Commissioner include:
The Act also confers enforcement powers on the Commissioner. Through enforcement notices, the Commissioner can require a data controller to take, or refrain from taking, specified steps or to refrain from processing any personal data altogether. Failure to comply with an enforcement notice is an offence unless the person charged is able to show that he or she exercised due diligence to comply with the notice. There is a right of appeal to the Data Protection Tribunal against an enforcement notice. Among other things, the Act enables the Commissioner to provide assistance in appropriate cases to individuals who are a party to proceedings relating to specified provisions of the Act. Although the Commissioner has considerable discretion in this regard, assistance may be given only where the Commissioner believes that the case involves a "matter of substantial public importance."(76) The Act confers powers of entry and inspection on the Commissioner. If there are reasonable grounds for suspecting that an offence has been or is being committed under the Act or that any of the Data Protection Principles have been or are being contravened, the Commissioner may apply for a warrant to enter and search a premises. There are a number of offences set out in the Act, including:
The Act imposes personal liability for any of the offences on directors or other officers of a corporation that has committed an offence. Where a company commits the offence with the consent or connivance of, or due to any neglect on the part of, the director or officer concerned, that person will be guilty of the offence.(78) H. Privacy Initiatives in Canada The development of standards to protect the confidentiality of information in the private sector in Canada largely began when the federal government affirmed its commitment to the OECD Guidelines in 1984. At that time the federal government sought to encourage the private sector to develop and adopt voluntary privacy protection codes.(79) By the end of the 1980s, however, the federal Privacy Commissioner was concerned about the lack of progress in this regard and called for federal legislation requiring federally regulated corporations to develop such codes.(80) Recognizing the potential of electronic commerce, in the latter half of the 1990s the government began developing strategies and policies to deal with the various business, legal, technological and social issues arising from it. In 1996, Industry Canadas report Building the Information Society stated that the right to privacy must be recognized in law, especially in situations where personal information about individuals is collected in electronic databases.(81) In that same year, the federal Ministers of Industry and Justice announced that the federal government would legislate to protect privacy. In January 1998, Industry Canada and the Department of Justice released a discussion paper, The Protection of Personal Information, in which it was noted that ensuring consumer confidence was essential to the growth of the information economy. The Paper observed that "legislation that establishes a set of common rules for the protection of personal information will help to build consumer confidence and create a level playing field [so that] the misuse of personal information cannot result in a competitive advantage."(82) Federal privacy legislation, the Paper noted, would have to address the following four key elements:
A proposal was put forward for developing a legislative regime drawing on legislation in other countries and building on the Canadian Standards Association Model Code. According to the proposal, the Canadian legislation should:
I. Canadian Standards
Association -- Model Code for the Protection As the federal government was formulating its policy on privacy protection, the Canadian Standards Association (CSA) had established a multi-stakeholder committee of representatives of business, government and consumer groups to develop a model code on the protection of personal information. This process produced the 1996 CSA Model Code for the Protection of Personal Information.(85) This sets out 10 principles on privacy and an individuals right of access to information. Founded on the OECD Guidelines, these principles include: Accountability: An organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organizations compliance with certain principles. Identifying Purposes: The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected. Consent: The knowledge and consent of the individual are required for the collection, use or disclosure of personal information, except where inappropriate. Limiting Collection: The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means. Limiting Use, Disclosure and Retention: Personal information shall not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law. Personal information shall be retained only as long as necessary for the fulfillment of those purposes. Accuracy: Personal information shall be as accurate, complete and up-to-date as necessary for the purposes for which it is used. Safeguards: Personal information shall be protected by security safeguards appropriate to the sensitivity of the information. Openness: An organization shall make readily available to individuals specific information about its policies and practices relating to the management of information. Individual Access: Upon request, an individual shall be informed of the existence, use and disclosure of his or her personal information and shall be given access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it amended as appropriate. Challenging Compliance: An individual shall be able to address a challenge concerning compliance with the above principles to the designated individual or individuals accountable for the organizations compliance. The CSA Model Code was designed to serve as a model that could be adopted by businesses and modified to suit their particular circumstances. It has been included as part of Bill C-6, the Personal Information Protection and Electronic Documents Act. J. Uniform Law Conference of Canada In 1996, the Uniform Law Conference of Canada (ULCC), an independent body that promotes the uniformity of legislation across Canada, recommended the development of a uniform data protection law that would regulate how personal information in the private sector would be protected. The ULCC began work on a draft Uniform Data Protection Act that would:
The ULCCs work on a uniform privacy law was suspended in 1998, however, after the introduction of federal legislation to protect privacy in the private sector. FEDERAL LEGISLATION: BILL C-6 -- PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT On 1 October 1998, the federal Minister of Industry introduced Bill C-54, the Personal Information Protection and Electronic Documents Act, in the House of Commons. The bill was referred to the House of Commons Standing Committee on Industry for review and subsequently reported back to the House of Commons with several amendments. Bill C-54 died on the Order Paper with the prorogation of Parliament, however, and was reintroduced as Bill C-6 on 15 October 1999.(87) Bill C-6 is scheduled to come into effect in 2001. Bill C-6 contains measures to protect personal information in the private sector, creates an electronic alternative for doing business with the federal government, and clarifies how the courts assess the reliability of electronic records used as evidence. The bill is divided into six parts. Part 1, entitled "Protection of Personal Information in the Private Sector," along with Schedule 1, which contains the CSA Model Code, creates rules for the collection, use and disclosure of, as well as access to, personal information in the private sector. Part 2, entitled "Electronic Documents," provides for the use of electronic alternatives where federal laws now provide for the use of paper to record or communicate information. The other parts would amend other federal statutes to facilitate the use and legal recognition of electronic documents. Part I is described in some detail and Part 2 is briefly considered below. Part 1 of Bill C-6 (sections 2 to 30) sets out definitions, the purpose of the Part, its scope of application, a "purposes limitation" requirement, and exemptions that would allow an organization to collect, use and disclose personal information without the knowledge or consent of the individual concerned. Part 1 also contains provisions pertaining to an individuals access to his or her personal information, and the Privacy Commissioners powers of investigation and audit. Section 2 of the bill contains a number of definitions, the most notable of which are "commercial activity," "organization" and "personal information." "Commercial activity" is defined as "any particular transaction, act or conduct or any regular course of conduct that is of a commercial character, including the selling, bartering or leasing of donor, membership or other fundraising lists." "Organization" includes an association, a partnership, a person and a trade union." "Personal information" is defined as "information about an identifiable individual but does not include the name, title or business address or telephone number of an employee of an organization." The purpose of Part 1 is to establish rules to govern the collection, use and disclosure of personal information that would recognize both the right of privacy of individuals with respect to their personal information and the need of organizations to collect, use and disclose information for purposes that a reasonable person would consider appropriate. The goal is to balance an individuals right to privacy against the reasonable needs of organizations to collect, use and disclose information for economic purposes. Subject to certain exceptions, Part 1 of the bill would apply to every organization that collects, uses or discloses personal information in the course of commercial activities. It would also apply to the collection, use and disclosure of personal information pertaining to the employees of federally regulated organizations. Part 1 would not apply, however,
The health sector, however, will have one year from the date that Part 1 comes into force to meet the requirements of the law. This does not exempt the health sector from the legislation but rather gives it additional time in which to prepare for implementing the law. Section 30(1) sets out an important exclusion with respect to the application of the bill. It provides that Part 1 will not apply to "any organization in respect of personal information that it collects, uses or discloses within a province whose legislature has the power to regulate the collection, use or disclosure of the information, unless the organization does it in connection with the operation of a federal work, undertaking or business or the organization discloses the information outside the province for consideration." Section 30(2) states that the exclusion of the application of Part 1 within a province will cease to have effect three years after section 30 comes into force. Thus, after Part I comes into force, it will apply to the federally regulated private sector (telecommunications, broadcasting, banking, interprovincial transportation, and airline industries). Part 1 will also apply to organizations that collect, use or disclose personal information within a province if the organizations disclose that information interprovincially or internationally for commercial purposes. Three years after Part 1 comes into force, however, it will apply more broadly, to organizations that are located entirely within a province, even if they collect, use or disclose personal information only within that province. A province can enact its own legislation to protect the privacy of personal information that is collected, used or disclosed within its boundaries. Under section 26(2)(b), the Governor in Council can exempt an organization, class of organizations, activity or class of activities from the application of Part 1, if a province has adopted legislation that is "substantially similar" to Part 1. This exemption is limited, however, to the collection, use or disclosure of personal information that takes place within a province. Interprovincial or international trade in personal information will still be subject to Bill C-6. At the present time, Quebec is the only province that has enacted legislation governing the collection, use and disclosure of personal information in the private sector. Section 5 requires organizations to comply with the obligations set out in the CSA Model Code (included in the bill as Schedule 1) unless the exceptions contained in sections 6 to 9 apply. But it also provides that the use of the word "should" in Schedule 1 indicates a recommendation and does not impose an obligation. Section 5 goes on to set out a "purposes" test by stating that the purposes for which an organization can collect, use or disclose personal information are to be limited to those that "a reasonable person would consider are appropriate in the circumstances." Section 7, which sets out the exemptions under which an organization can collect, use or disclose personal information without the knowledge or consent of the individual concerned, is critical to the operation of the bills privacy regime. Section 7(1) provides that an organization can collect personal information without an individuals knowledge or consent only where:
Section 7(2) provides an exemption to the knowledge or consent requirement with respect to the use of personal information where:
Under section 7(3), an organization can disclose personal information without an individuals knowledge or consent if the disclosure is:
As noted above, the exemption for the use of personal information for "statistical, or scholarly study or research purposes" is subject to certain conditions. It can be invoked only if the purposes cannot be achieved without using the information, the confidentiality of the information is ensured, it is impracticable to obtain consent; and the organization informs the Privacy Commissioner of the use. Similarly, the exemption for disclosure for statistical, or scholarly study or research purposes is allowed if all of these conditions except an assurance of confidentiality are met. 3. Access to Personal Information Bill C-6 provides individuals with a right to have access to their personal information and to have it corrected, if necessary. An organization must respond to a request for access within 30 days, but can extend this time limit under certain conditions.(89) It can refuse to give an individual access to his or her personal information where this would reveal personal information about a third party and the third-party information cannot be severed from the record. If the third party consents, however, or if the individual needs the information because his or her life, health or security is threatened, the third-party prohibition will not apply. Furthermore, an organization can refuse to give access to personal information where:
Access is permitted, however, if the individual needs the information because his or her life, health or security is threatened. The bill gives individuals the right to complain to the federal Privacy Commissioner about an organizations compliance with the legislation or the CSA Code and authorizes the Commissioner to investigate and try to resolve the complaint. Section 11 provides that a complaint can be initiated either by an individual or by the Commissioner. An individual can file a complaint against an organization for contravening provisions of the bill relating to collection, use, disclosure of or access to personal information or for not following a recommendation set out in the Model Code. The Commissioner, however, can initiate a complaint only if satisfied that there are reasonable grounds to investigate a matter under Part 1 of the bill. 4. Powers of the Privacy Commissioner The bill confers broad powers on the Privacy Commissioner. These include the authority to:
Section 12 gives the Commissioner broad powers for the purpose of investigating complaints. These include the power to:
The bill also provides for a court hearing before the Federal Court-Trial Division. A complainant can request a hearing within 45 days after receiving the Commissioners report. Among other things, the Court has the power to order an organization to correct its practices if they do not comply with the law; publish notices of any action taken to correct its practices; and order remedies including damages for humiliation suffered by a complainant.(91) The bill creates offences for obstructing the Commissioner in an investigation, destroying records before all recourse is exhausted, or dismissing, suspending, or demoting an employee who discloses a violation of the Act by his or her employer. The bill provides for a maximum fine of $100,000.(92) Under section 27.1, employees who disclose a contravention of the Act on the part of their employers or others are protected against dismissal, suspension, demotion, discipline or harassment. Part 2 of Bill C-6 provides for the use of electronic alternatives to paper in communicating with the federal government and introduces the concept of a "secure electronic signature" in such transactions. Pursuant to the legislation, the government will prescribe technologies or processes for defining "secure electronic signature" based on the following criteria:(93)
The bill also deals with electronic documents used as evidence in legal proceedings. In a typical court proceeding, original documents are usually required to satisfy a court that the terms and conditions of an agreement have not been changed since it was signed. This requirement is difficult to satisfy where electronic documents are involved because the original cannot be distinguished from an amended document and because the document is not authenticated by hand-written signatures. The bill, therefore, requires the use of secure electronic signatures for electronic documents whenever the law provides for original documents or statements of truth. DEVELOPMENTS AT THE PROVINCIAL LEVEL The first jurisdiction in North America to enact legislation pertaining to the collection, use, disclosure and retention of personal information in the private sector was Quebec.(94) To date, it is still the only province with such legislation. The Quebec Act respecting the protection of personal information in the private sector (Bill 68) came into force on 1 January 1994.(95) The Act deals with the collection of "personal information," which it defines as information about an individual and from which the individual can be identified. Except as otherwise provided in the Act, the consent of the individual concerned is required for the collection, use and transfer of his or her personal information. The Quebec statute requires that consent must be manifest, free and enlightened and must be given for specific purposes. In addition, consent is valid only for the length of time needed to achieve the purposes for which it was requested. A business may collect information from a third person without the consent of the person concerned, if the law otherwise permits or if other conditions set out in the Act are present. At the time it collects the information, a business is required to inform the individual of the use that will be made of it. The Act also sets out rules respecting the holding of personal information, whereby individuals may have deleted from their files any information that is obsolete or not justified for the purposes of the files. Personal information must be current and accurate when it is used to make a decision affecting an individual. A business must inform individuals of the existence and object of files that are held about them as well as their right to have access to these. Generally, businesses are proscribed from disclosing, transferring or using personal information for purposes that are "not relevant" to the object of the individuals file. Other uses, disclosures or transfers are permitted where the individuals consent has been obtained or where an exception in the Act applies. The Act also prohibits Quebec businesses from transferring personal information to parties outside the province unless the transferor has taken "all reasonable steps to ensure that the information will not be used for purposes not relevant to the object of the file." Special provisions apply to "nominative lists," -- lists of individuals names, addresses, and phone numbers. When a business wants to use its own nominative list for commercial or philanthropic canvassing, the individuals named on the list must be given the opportunity to have their names removed from the list. The Act also provides for access to and correction of personal information at the individuals request. A business must confirm the existence of a file containing personal information and respond to an access request within 30 days. However, there are exemptions and limits to the access provisions. The Act provides for recourse to the Quebec Commission daccès à linformation where there is a disagreement between an individual and a business about the application of the law. Commission decisions are binding on the parties, though they may be appealed. A business that collects, holds or communicates information in a manner contrary to the statute is liable to fines of $1,000 to $10,000 for a first offence and $10,000 to $20,000 for a second or later offence. Directors or administrators of businesses may be found personally liable where they authorized, ordered or consented to the offending act. The Quebec law does not provide for privacy codes for various business sectors. In May 1998, the New Brunswick Department of Justice released a discussion paper in which it examined the extension of privacy legislation to the private sector.(96) The purpose of the paper was to establish whether there was a need for a greater level of privacy protection than the law currently provides and, if so, by what means it should be provided. The Paper consists of "Propositions" for discussion and is to be referred to the Law Amendments Committee of the New Brunswick legislature for review and public discussion. Suggesting that the Canadian Standards Association Model Code for the Protection of Personal Information should be the starting point for privacy protection legislation, the Paper points out that the scope and content of legislation based on the CSA Code would likely be broad and that the key elements of the CSA Code for legislative purposes would be the Codes ten principles. The Discussion Paper examines whether the CSA Principles should apply equally to small and large organizations. It asks whether private sector data protection legislation should be as broad as the CSA Code aims to be, or whether a more focused approach would be more appropriate. The Paper notes that data protection legislation must be careful not to impose on small organizations levels of obligation that they cannot reasonably be expected to achieve. The Paper also looks at the enforcement of possible data protection legislation based on the CSA Code. It discusses whether penal remedies, civil remedies or administrative remedies might be appropriate. In 1997, the Manitoba Information Highway Advisory Council stated that it was in Manitobas interest to take a leadership role in striking a "balance between protecting the privacy of personal and confidential information and ensuring access to information for legitimate social and economic purposes."(97) Among other things, it recommended that the Manitoba government should "strongly encourage the private sector to consider adopting guidelines, such as those published by the Canadian Standards Association, regarding information access and privacy protection."(98) In 1997, Manitoba enacted the Personal Health Information Act, which regulates the collection, use and disclosure of personal health information. The Act applies to personal health information that is recorded about individuals who can be identified, but not to statistical information or data used in such a way as to maintain the confidentiality of individuals.(99) The Act gives individuals the right to see their personal health information, copy it and request a correction. The Act protects the privacy and confidentiality of information through a number of provisions, such as:
Offences under the Act include:
The provincial Ombudsman has responsibility for overseeing compliance with the Act and handling complaints from individuals with respect to their rights of access and the collection, use and disclosure of personal health information. In March 1999, the Manitoba Minister of Consumer and Corporate Affairs released the discussion paper The Protection of Personal Information in the Private Sector, in order to elicit the views of Manitobans on privacy protection. The Paper sets out 12 specific questions on which the government was seeking public input. Among other things, the Paper describes the vital role that information plays in the economy and the operation of government, the growing concern about how personal information is gathered, privacy protection approaches and initiatives in the United States, the European Union and Canada through the CSA Model Code, Bill C-54 (now Bill C-6) and developments in Manitoba, including the report of the Manitoba Information Highway Advisory Council. The Paper observes that protecting the privacy of personal information is not a simple issue and suggests that Manitoba must carefully consider the impact of federal privacy legislation on Manitoba consumers and private-sector organizations.(100) In July 1999, the British Columbia government appointed an all-party Special Committee to review and make recommendations on the protection of personal information in private sector transactions and the impact of electronic documents on privacy and freedom of information for residents of British Columbia. Following upon this, in October 1999, the British Columbia Information, Science and Technology Agency released a discussion paper, Protecting Personal Privacy in the Private Sector.(101) The Discussion Paper observes that "British Columbians should have an effective regulatory framework to protect personal information, and be informed as to their rights." It goes on to suggest that "an effective response will depend on a blend of solutions, including consumer education, privacy-enhancing technologies, codes of practice and standards, and/or legislation with some form of oversight provision."(102) The Paper states that there is a need to protect individuals from improper collection, use and disclosure of their personal information especially in areas that will not be covered by Bill C-6.(103) The Paper poses 10 questions as a catalyst for discussion. A number of businesses, industry groups and private sector organizations have sought to implement fair information practices by developing and adopting voluntary guidelines and codes of practice. Some of the better known codes are those of the Canadian Bankers Association, the Canadian Marketing Association, the Canadian Life and Health Insurance Association and the Insurance Bureau of Canada. Generally, such codes can be broken down into five different categories. Individual Company Codes: codes that have been developed by companies in the absence of, or in anticipation of wider sectoral instruments. Sectoral Codes of Practice: codes that have been developed by an industry group recognizing the need for consistency of policy and practice while establishing a set of rules tailored to the needs of the industry and pre-existing regulatory framework for the sector. Functional Codes: codes that have been defined by the practice in which an organization is engaged. Technological Codes: codes that address specific invasive practices involving information and communication technology. Professional Codes: codes that have been developed for use by professional associations and societies.(104) Voluntary codes of practice have been an important component of privacy protection initiatives in North America where legislation to protect the privacy of personal information in the private sector has been less developed. Indeed, the self-regulatory approach has been promoted by the U.S. federal administration as the system that will foster growth of electronic commerce. A. Advantages and Disadvantages of Self-Regulation There are both advantages and disadvantages to self-regulation. A number of these were discussed in the 1996 paper Privacy Protection Models for the Private Sector and are outlined below. One of the most important advantages of self-regulation is flexibility. Advocates of self-regulation argue that a regulatory approach is too rigid, tends to lag behind advances in technology and uses of personal information, and is difficult to change. Self-regulation, on the other hand, allows businesses to quickly develop and implement policies and codes of conduct in response to new developments and issues, and to tailor codes of practice to the needs of a particular sector.(105) Voluntary codes also allow businesses to balance privacy with other possibly competing interests and the everyday practicalities of data processing and use.(106) Consumers can benefit from a voluntary approach. Because voluntary codes tend to be specific to particular industries or issues, they are often more detailed and relevant than government legislation, which by its very nature must be broader in scope. Moreover, since codes tend to be administered closer to the level where disputes actually arise, a voluntary code may offer consumers more ready access to redress mechanisms.(107) Another benefit of self-regulation is the absence of bureaucracy and government intervention. Proponents of self-regulation argue that regulation is costly and burdensome for industry, consumers and taxpayers alike. A self-regulatory approach avoids the creation of bureaucratic structures and the expenditure of government funds.(108) Voluntary codes, however, have limitations. These include:
Research has pointed out weaknesses in the privacy codes adopted by Canadian organizations. A study of 12 voluntary codes adopted by Canadian organizations, conducted by the Public Interest Advocacy Centre and referred to in the paper Privacy Protection Models for the Private Sector, found weaknesses in a number of codes of practice and concluded that the codes did not adequately protect privacy. Among the problems found were:
B. Measures to Improve Private Sector Privacy Codes and Policies Developing a privacy policy or code of practice and posting it on a Web site is often not enough to provide adequate protection for personal information. To improve the level of privacy protection and to provide online consumers with a measure of certainty that the privacy of their personal information will be protected, voluntary programs have been developed by non-governmental organizations in which Web sites can participate and in this way assure users that their privacy policies comply with certain privacy principles. Three of the most recognizable voluntary programs are TRUSTe, CAWebTrust and BBBOnline. Web sites that comply with TRUSTes established privacy principles and agree to comply with its oversight and consumer dispute resolution process can display the TRUSTe logo or seal. The displayed mark signifies to users that the Web site will state "what personal information is being gathered, how it will be used, with whom it will be shared, who is gathering the information, what options the user has, what security procedures are in place to prevent misuse or loss and how users can correct information to control its dissemination."(111) Businesses that are part of the TRUSTe program undergo periodic assessments to ensure that they are in compliance with privacy principles. CAWebTrust is a program jointly developed by the American Institute of Public Accountants and the Canadian Institute of Chartered Accountants. A Web site that has met the WebTrust principles can display the WebTrust seal and thereby ensure consumers that the site meets WebTrust principles and criteria relating to the disclosure of business practices, transaction integrity and information protection. To maintain the WebTrust certification, a site must be evaluated at least every three months.(112) In the United States, the Council of Better Business Bureaus (CBBB) has developed a self-regulatory online privacy program through a subsidiary BBBOnLine. Like TRUSTe and CAWebTrust, the BBBOnline program allows organizations to display the BBBOnline seal on their Web sites after demonstrating that they have adopted and implemented privacy policies that meet BBBOnLine Privacy Program requirements. Among other things, BBBOnline program participants must agree to:(113)
Some 1,000 Web sites carry privacy seals from at least one of these third-party enforcement services. Another organization, the Online Privacy Alliance, was formed in the United States in 1998 to promote the self-regulation of consumer privacy online. Today, the Alliance has a membership of about 90 global companies and associations. Members of the Alliance commit themselves to implement online privacy policies consistent with the Alliances guidelines and to participate in effective self-regulatory enforcement mechanisms. Upon joining the Online Privacy Alliance, each member organization agrees that its policies for protecting individually identifiable information in an online or electronic commerce environment will address, at a minimum, the following elements:
The U.S. Administration credits organizations such as the Online Privacy Alliance, TRUSTe, BBBOnline, and CA WebTrust with much of the progress in the development of private sector privacy codes in the U.S.(115) Over the last two decades, protecting the privacy of personal information has become an important public policy issue. The initial concerns about the collection and use of such information were with respect to the vast amounts of data held by governments. As a result, many jurisdictions moved to enact privacy legislation to govern the collection and use of information by the public sector. Since then, the focus has turned to the collection and use of personal information by the private sector. Businesses collect large amounts of information generated from a diverse array of sources, including consumer purchases, information voluntarily given by consumers and technology that tracks activity on the Internet. Rapid advances in technology have increased the ability of businesses to collect, use and disseminate information about individuals in ways that were not possible only a few years ago. These advances have spawned fear that personal information will be used in ways that a person might not anticipate or without a persons knowledge or consent. With the growth and development of electronic commerce has come a concomitant increase in the level of concern about maintaining privacy when doing business online. Surveys indicate that the protection of personal privacy is a key concern of many people in relation to electronic commerce and until such concerns are satisfactorily addressed the full potential of online commerce will likely remain untapped. Privacy concerns are not, however, the only factor fuelling the demand for increased levels of privacy protection in the private sector. International trade patterns are also prompting the introduction of privacy protection measures. Now more than ever, businesses are operating in a global environment. Businesses that collect, retain, use or disclose personal information must be increasingly cognizant that privacy protection has become important to international trade. The European Union Directive on Data Protection, for example, restricts the transfer of personal information from EU member countries to other countries that do not have adequate levels of privacy protection. Businesses have also come to recognize that privacy protection is good for them. Indeed, countries and business that can ensure consumers that that they have adopted measures to protect the privacy of personal information may have a competitive advantage over those who do not. While it is generally acknowledged that measures must be adopted to protect the privacy of personal information, particularly in an online environment, and that such measures will be important to the future of electronic commerce, there has been considerable debate about whether government regulation or industry self-regulation is the best approach to providing such protection. Thus far, a variety of privacy protection models have been developed. The EU Directive on Data Protection requires the adoption of a legislative model. In implementing the Directive, the U.K. Data Protection Act 1998, sets out a detailed legislative scheme for protecting personal information in the private sector. While the Act contemplates the use privacy codes adopted by trade associations or other bodies, such codes do not have statutory recognition. Even so, they are likely to play an important role in the interpretation and the enforcement of the Act. In Canada, federal legislation to protect the privacy of personal information in the private sector has been passed and is scheduled to come into force in 2001. Like the U.K data protection law, the Canadian Personal Information Protection and Electronic Documents Act contemplates the use of private sector privacy codes but does confer any kind of legal status on them. Proposed privacy legislation in Australia, however, would go a step further by giving the force of law to codes that had been approved by the Privacy Commissioner. Upon approval, a code would replace the privacy principles to be set out in the legislation. The United States has consistently refused to introduce private sector privacy legislation except in the area of childrens online privacy. Strongly supporting industry self-regulation, the U.S. Administration has encouraged the development of industry codes of practice and privacy protection. To date, self-regulatory measures have received mixed reviews. One study found that the privacy protection policies of several Web sites did not reflect the necessary elements of Fair Information Practices and were unlikely to provide meaningful privacy protection. Other studies report better results. The creation of third-party privacy monitoring and dispute resolution services, however, is seen as important to the development of adequate self-regulatory privacy protection initiatives. The adoption of an industry self-regulatory approach by the U.S. has been a trade irritant between the U.S. and the European Union and is the subject of ongoing negotiations for reaching an agreement as to whether self-regulation will meet the EUs "adequacy" standard for the transfer of personal data from EU to non-EU countries. It is too early to state definitively whether the regulatory approach will win out over self-regulation. The most likely scenario is some combination of the two. Even where legislation exists and privacy codes have no legal status, it will be important for various industries to develop codes to reflect and put into operation the basic principles set out in the legislation and tailor the legislation to the circumstances of their particular industries. Where privacy codes are to be the mainstay of privacy protection, however, legislation may have to be developed to establish a baseline level; this would appear to be the approach adopted in Australia. The U.S. self-regulatory approach will likely work if the vast majority of enterprises doing business over the Internet adopt privacy protection measures that adhere to the principles of fair information practices and demonstrate through membership in third-party monitoring and dispute resolution services that they are providing an adequate level of privacy protection. If too few businesses participate or privacy protection measures prove inadequate, it may be necessary for the U.S. to change its position and consider legislative measures. (1) Canada, The Canadian Electronic Commerce Strategy, 1998, p. 1, http://e-com.ic.gc.ca (2) Ibid., p. 4. (3) Canada, Task Force on Electronic Commerce, Canadian Internet Commerce Statistics Summary Sheet, 26 August 1999. (4) Industry Canada, Office of Consumer Affairs, Consumer Quarterly, Vol. 4, No.1, March 1999, p. 2, http://strategis.ic.gc.ca/SSG/ca01129e.html (5) Dale A. J. Dietrich, Legal Issues Affecting Canadian Based Electronic Commerce Undertakings, Paper Presented to IT Industry Series on Intellectual Property, Centre for Property Studies, University of New Brunswick, May 1998, p. 41. (6) Ann Cavoukian, Information and Privacy Commissioner/Ontario, Privacy: The Key to Electronic Commerce, April 1998, p. 4. (7) Dietrich, Legal Issues Affecting Canadian Based Electronic Commerce Undertakings, 1998, p. 40. (8) United States, Federal Trade Commission, Privacy Online: A Report to Congress, June 1998, p. 10, http://www.ftc.gov/reports/privacy3/fairinfo.htm (9) Ibid., p. 7. (10) Ibid., p. 8. (11) Ibid. (12) Ibid., p. 9. (13) Ibid., p. 10-11. (14) Organisation for Economic Co-operation and Development, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 1980. (15) Tom Wright, Privacy Protection Models for the Private Sector, Information and Privacy Commissioner of Ontario, 1996, p. 4. (16) European Union, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Official Journal L 281, 23/11/1995, p. 0031-0050. (17) EU Directive, Article 6. (18) Ibid., Article 7. (19) Ibid., Article 8. (20) Ibid., Article 10. (21) Ibid., Article 11. (22) Ibid., Article 14. (23) Ibid., Articles 22 and 23. (24) Ibid., Article 28. (25) Ibid., Article 27. (26) Ibid., Article 25(2). (27) Ibid., Article 26(1). (28) Ibid., Article 26(2). (29) Council of Europe, Committee of Ministers, Guidelines for the Protection of Individuals with Regard to the Collection and Processing of Personal Data on Information Highways, Rec. No. R(99)5, 23 February 1999, p. 4, http://www.coe.fr/cm/ta/rec/1999/99r5.htm (30) Organisation for Economic Co-operation and Development, Declaration on the Protection of Privacy on Global Networks, SG/EC(98)14/Final, October 1998, p. 2. (31) United States, Executive Office of the President, A Framework for Global Electronic Commerce, 1 July 1997, p. 2-3. (32) Ibid., p. 3-4. (33) United States, U.S. Government Working Group on Electronic Commerce, First Annual Report, November 1998, p. 15-16. (34) United States Federal Trade Commission, Privacy Online: A Report to Congress, 1998, p. 2. (35) Ibid., p. 24-25. (36) Ibid., p. 25. (37) United States Federal Trade Commission, Press Release, New Rule Will Protect Privacy Online, 20 October 1999, http://www.ftc.gov/opa/1999/9910/childfinal.htm (38) U.S. Government Working Group on Electronic Commerce, Towards Digital eQuality, 2nd Annual Report, 1999, p. 35. (39) Ibid., p. 35-36. (40) Electronic Privacy Information Center, Surfer Beware III: Privacy Policies without Privacy Protection, December 1999, http://www.epic.org/reports/surfer-beware3.html (41) Ibid., p. 3-4. (42) Ibid., p. 6. (43) Georgetown Internet Privacy Policy Survey: Final
Report, June 1999. This study was initiated by the private sector and
funded by contributions from 17 companies and organizations, (44) Ibid., p. 1. (45) Ibid. (46) Ibid. The contents of privacy disclosures were analyzed to determine if they included notice, choice, access or security. These four elements of fair information practices were operationalized as follows:
The privacy disclosures were further analyzed to see if they provided information a consumer could use to contact the company to ask a question about the sites information practices or to complain to the company or another organization about invasion of privacy. (47) United States Federal Trade Commission, Self-Regulation and Privacy Online, July 1999. (48) United States Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace, May 2000. (49) Ibid., p. 35. (50) Ibid. (51) Ibid., p. 36-37. (52) John Burgess, "Accord Near on Data Privacy," Washington Post, 24 February 2000, p. A12. (53) Australia, Attorney Generals Department, Information
Paper, The governments proposed legislation for the protection of
privacy in the private sector, September 1999, p. 3. (54) Ibid., p. 11. (55) Ibid., p. 11-12. (56) Australia, Attorney Generals Department, "Overview
of Key Provisions of Privacy Amendment (Private Sector) Bill," 20
December 1999, p. 3-4, (57) Australia, "Proposed Legislation for the Protection of Privacy in the Private Sector," September 1999, p. 13. (58) Ibid., p. 13-14. (59) Ibid., p. 10. (60) Data Protection Act 1998, U. K. Statutes 1998
Chapter 29, (61) Ibid., section 1(1). (62) Ibid., section 2. (63) Ibid. (64) Ibid., Schedule I, Part I. (65) Ibid., Schedule 2. (66) Schedule 3 provides as follows:
(67) Ibid., section 16. (68) Ibid., section 28. (69) Ibid., section 29. (70) Ibid., section 32. (71) Ibid., section 34. (72) Ibid., section 35. (73) Ibid., section 36. (74) Ibid., section 51. (75) Ibid., section 52. (76) Ibid., section 53. (77) Ibid., section 55. (78) Ibid., section 61. (79) Privacy Commissioner of Canada, Annual Report 1984-85, Ottawa, Supply and Services Canada, 1985. (80) Privacy Commissioner of Canada, Annual Report 1988-89, Ottawa, Supply and Services Canada 1989; Annual Report 1989-90, Ottawa, Supply and Services Canada, 1990. (81) Canada, Department of Industry, Building the Information Society: Moving Canada into the 21st Century, Ottawa, 1996, p. 25. (82) Canada, Task Force on Electronic Commerce, Industry Canada, Justice Canada, The Protection of Personal Information: Building Canadas Information Economy and Society, Ottawa, January 1998, p. 6. (83) Ibid., p. 11. (84) Ibid. (85) Canadian Standards Association, Model Code for the Protection of Personal Information: A National Standard of Canada, CAN/CSA-Q830-96, 1996. (86) Uniform Law Conference of Canada, Data Protection in the Private Sector: Options for a Uniform Statute, 1996, p. 1. (87) Bill C-6 An Act to support and promote electronic commerce by protecting personal information that is collected, used or disclosed in certain circumstances, by providing for the use of electronic means to communicate or record information or transactions and by amending the Canada Evidence Act, the Statutory Instruments Act and the Statute Revision Act, 2nd Session, 36th Parliament, 48 Elizabeth II, 1999. (88) Ibid., subsection 4(1). (89) Ibid., section 8. (90) Ibid., section 9. (91) Ibid., section 16. (92) Ibid., section 28. (93) For the purposes of Bill C-6, "electronic signature" means a signature that consists of one or more letters, characters, numbers or other symbols in digital form incorporated in, attached to or associated with an electronic document; a "secure electronic signature" is an electronic signature that results from the application of a technology or process prescribed by regulations under section 48 (1) of the bill. (94) This section relies heavily on the description of the Quebec privacy legislation found in Richard C. Owens, Privacy and Financial Services in Canada, Research Paper Prepared for the Task Force on the Future of the Canadian Financial Services Sector, September 1998, p. 65-68. (95) R. S.Q. c. P. 39.1. (96) New Brunswick, Department of Justice, Privacy Discussion Paper #2, May 1998. (97) The Report of the Manitoba Information Highway Advisory Council, 1997, p. 44. (98) Ibid., p. 49. (99) Much of the information about the contents of the Personal Health Information Act comes from the press release of the Manitoba Minister of Health, "Personal Health Information Act Proclaimed," 17 December 1997, http://www.gov.mb.ca/chc/press/top/1997/12/1997-12-17-02.html (100) Manitoba, Department of Consumer and Corporate Affairs, The Protection of Personal Information in the Private Sector, March 1999, http://www.gov.mb.ca/cca/papereng.pdf (101) British Columbia, Information, Science
and Technology Agency, Protecting Personal Privacy in the Private Sector,
October 1999, (102) Ibid., p. 7. (103) Ibid. The Paper notes that the federal legislation will not protect the records of employees of provincially regulated private sector businesses or personal information collected in non-commercial activities such as private hospitals, private schools and charities. (104) Ann Cavoukian, Privacy as a Fundamental Human Right vs. Economic Right: An Attempt at Reconciliation, Information and Privacy Commissioner/Ontario, September 1999, p. 6. (105) Tom Wright, Privacy Protection Models for the Private Sector, December 1996, p. 10. (106) Ibid. (107) Ibid. (108) Ibid. (109) Ibid., p. 10-11. (110) Ibid., p. 11. (111) TRUSTe, Frequently Asked Questions, (112) WebTrust, http://www.cica.ca/cica/cicawebsite.nsf/public/SPWTe_generalfaqs (113) BBBOnline, http://www.bbbonline.org/businesses/privacy/eligibility.html (114) Online Privacy Alliance, http://www.privacyalliance.org/ (115) Towards Digital eQuality, 1999, p. 36. |