HOME

TheInfoList



OR:

Chris Jay Hoofnagle is an American professor at the University of California, Berkeley who teaches information privacy law, computer crime law, regulation of online privacy, internet law, and seminars on new technology. Hoofnagle has contributed to the privacy literature by writing privacy law legal reviews and conducting research on the privacy preferences of Americans. Notably, his research demonstrates that most Americans prefer not to be targeted online for advertising and despite claims to the contrary, young people care about privacy and take actions to protect it. Hoofnagle has written scholarly articles regarding identity theft, consumer privacy, U.S. and European privacy laws, and privacy policy suggestions.


Career

Hoofnagle is a professor and attorney at Gunderson Dettmer LLP. He has served as an
advisor An adviser or advisor is normally a person with more and deeper knowledge in a specific area and usually also includes persons with cross-functional and multidisciplinary expertise. An adviser's role is that of a mentor or guide and differs categor ...
for several student projects at the
University of California, Berkeley School of Information The University of California, Berkeley, School of Information, also known as the UC Berkeley School of Information or the I School, is a graduate school and, created in 1994, the newest of the schools at the University of California, Berkele ...
. He advised
Ashkan Soltani Ashkan Soltani is the executive director of the California Privacy Protection Agency. He has previously been the Chief Technologist of the Federal Trade Commission and an independent privacy and security researcher based in Washington, DC. Ed ...
and his colleagues on their article "Flash Cookies and Privacy". Hoofnagle and Soltani published a follow-up on this work in 2011 documenting the use of "
HTTP ETag The ETag or entity tag is part of HTTP, the protocol for the World Wide Web. It is one of several mechanisms that HTTP provides for Web cache validation, which allows a client to make conditional requests. This mechanism allows caches to be more ...
s" to store persistent identifiers. This research was also published in the Harvard Policy Law Review as "Behavioral Advertising: The Offer You Cannot Refuse," and won the CPDP 2014 Multidisciplinary Privacy Research Award.


Privacy literature contributions


Identity theft

Today, most information regarding
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
incidents is gathered from the victims whose identities are being stolen. As a result, many aspects regarding identity theft are still unknown. This is because of missing data on synthetic identity theft (situations of identity theft where victims aren't aware of the crime), the fact that most victims don't report identity theft to criminal authorities, and the fact that the FBI may decline to investigate identity theft cases due to lack of resources. In fact, less than one in 32 victims of identity theft file an official complaint on the issue. Because of these issues, Hoofnagle argues that identity theft information should be gathered from financial institutions. Financial institutions are a central actor during identity theft crimes as they are the institution that imposters use to steal money, they undergo nonpayment after imposters steal money, and they recharge victims after nonpayment. Thus, financial institutions have the most interaction with the imposter, which makes them the best player to gather information about identity theft, according to Hoofnagle. Hoofnagle believes that financial institutions should be required to track the number of identity theft instances that taken place or been avoided, identify the targeted product of the thief, and report the loss suffered or avoided. He argues that these policies will garner more information regarding identity theft, helping institutions avoid the problem in the future. Hoofnagle's research also discovered that larger institutions that focused on credit card accounts had relatively higher rates of identity fraud than smaller institutions. He argues that this may contradict consumer expectations, as consumers may believe that larger institutions have the tools necessary to avoid identity fraud problems.


Consumer privacy


Social networking services

Although signing up for
social networking service A social networking service or SNS (sometimes called a social networking site) is an online platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, act ...
s (SNSs) like
Instagram Instagram is a photo and video sharing social networking service owned by American company Meta Platforms. The app allows users to upload media that can be edited with filters and organized by hashtags and geographical tagging. Posts can ...
and Facebook do not cost any money to access, Hoofnagle argues that there is a great price for this transaction: the collection of personal information. As consumers post more on SNSs, the SNSs gather more and more personal information on the consumer. Data can be collected directly by tracking the smartphone owner's posts or storing information from other phone applications on the device. It can also be collected indirectly from information that other people store about the smartphone owner on their own devices. Hoofnagle argues that this transaction represents a loss of privacy for consumers. By freely revealing personal information, consumers leave themselves more vulnerable to data collection, identity theft, fraud, and stalking. Additionally, consumers do not know how their information will be used in the future. It is almost impossible to delete information that has been posted on SNSs, and consumers do not know how that information will be dealt with.


Internet tracking

There are many methods of internet tracking, including Flash
cookies A cookie is a baked or cooked snack or dessert that is typically small, flat and sweet. It usually contains flour, sugar, egg, and some type of oil, fat, or butter. It may include other ingredients such as raisins, oats, chocolate chips, nuts ...
, ETags, HTML5 local storage,
Evercookie Evercookie (also known as supercookie) is a JavaScript application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. It was created by Samy Kamkar in 2010 to demonstrate the ...
s, and
browser fingerprinting A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinti ...
. In a study, Hoofnagle discovered that there was a dramatic increase in the use of standard cookies between 2009 and 2011. Additionally, most cookies were placed by third-party hosts, which is mainly made up of advertisers. Hoofnagle argues that modern privacy regulation would give consumers more choices in the marketplace. He denies that government intervention of this kind is paternalistic in nature.


Commercial data brokers

Commercial data brokers (CDBs) are businesses that collect personal information on individuals and sell it. Hoofnagle argues that CDBs like
ChoicePoint LexisNexis Risk Solutions is a global data and analytics company that provides data and technology services, analytics, predictive insights and fraud prevention for a wide range of industries. It is headquartered in Alpharetta, Georgia (part of ...
perform law enforcement duties by allowing the police to download collections of information about individuals. He thinks that CDBs should be regulated by the
Privacy Act of 1974 The Privacy Act of 1974 (, ), a United States federal law, establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintaine ...
as a result. He argues that government access to CDBs gives law enforcement information that they would not be able to collect legally, presenting a significant legal issue. Hoofnagle presents three policy solutions to protect personal data from law enforcement. He believes that commercial and government collection of information shouldn't be distinct, public records should be compatible with modern technology, and the Privacy Act of 1974 should apply to CDBs.


Physical vs digital goods

In "What We Buy When We Buy Now," authors Aaron Perzanowski and Chris Hoofnagle explore a common misconception regarding consumer rights when buying digital goods; specifically, the misconception that the same regulations govern physical and digital media. The authors called their study The Mediashop Study. After conducting a web-based survey, they discovered that most consumers believe that digital goods and physical goods have the same rights to use and transfer. For example, just like an individual can easily transfer a physical book to someone, most consumers believe they have this same ability with digital books. This is not the case under current digital ownership rights. The study also revealed that consumers would be willing to pay more for the right to transfer digital goods and that adding a short notice that explains consumers’ digital rights would be effective in reducing consumer misperceptions.


Privacy policies

Hoofnagle argues that there are limitations to the FTC's privacy policy approach. The Federal Trade Commission (FTC) is the primary consumer protection agency in the United States. Despite the FTC's commitment to the self-regulation of privacy, Hoofnagle argues that consumers are very concerned about their private information being collected. In "The Federal Trade Commission and Consumer Privacy in the Coming Decade," Hoofnagle and the other authors explain how most Americans believe that a company's privacy policy explains how their information will remain private. However, in reality, privacy policies merely detail how website will use a consumer's private information. Based on their research, the authors conclude that privacy notices alone are insufficient for consumer privacy. To advance privacy, the authors suggest that the FTC make three provisions: police the term “privacy policy,” consult with experts in usability to create privacy-protecting mechanisms, and set benchmarks for self-regulation.


Privacy law


Europe

The
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been des ...
's
General Data Protection Regulation The General Data Protection Regulation (GDPR) is a European Union regulation on data protection and privacy in the EU and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and of human rights law, in partic ...
(GDPR) is the E.U.'s law on data protection. Hoofnagle argues that the GDPR is "the most consequential regulatory development in information policy in a generation." The GDPR applies to situations where "personal data" is "processed," so virtually all actions involving personal data are protected under the GDPR. The GDPR also places significant burden on data controllers (e.g. companies) to ensure the privacy of consumer information. For instance, they must keep records of all their data processing, adopt a data protection policy, and be transparent on their data usage. Exemptions to the regulations of the GDPR are data activity of personal use or national security. Consequences for breaking the rules of the GDPR include sanctions and fines, and Data Protection Authorities are the main enforcers of the GDPR's regulations.


The United States

The U.S.'s
Privacy Act of 1974 The Privacy Act of 1974 (, ), a United States federal law, establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintaine ...
and
Fair Credit Reporting Act The Fair Credit Reporting Act (FCRA), 15 U.S.C. § 1681 ''et seq'', is U.S. Federal Government legislation enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies. It ...
of 1970 (FCRA) are the framework for U.S. privacy law. Hoofnagle argues that these regulations don't adequately protect privacy, as many companies have found loopholes to them. He argues that the problem with the Privacy Act is that it only applies to the federal government and private companies that work for the government. It does not apply to other private companies or data brokers. Hoofnagle additionally criticizes the FCRA for solely applying to "consumer reporting agencies" that use "consumer reports." Consumer reports solely concern communication on a consumer relating to credit evaluation, employment screening, insurance underwriting, or licensing, and all other uses are not protected by the FCRA. Hoofnagle and
Daniel Solove Daniel J. Solove (; born 1972) is a professor of law at the George Washington University Law School. # Universal notice of when companies collect individuals’ private information # Meaningful consent of consumers when data is collected # Meaningful exercise of consumers’ rights, # Effective individual management of consumer reporting # Accessing personal information that companies store # Greater security of information # Disclosing security breaches # Limiting use of social security numbers # Regulating access to public records # Limiting use of background checks # Regulating private investigators # Limiting government access to business and financial records # Regulating government data mining # Updating the Privacy Act # Effectively enforcing privacy rights


Europe and U.S. compared

One key divergence between the United States and Europe with regard to privacy is how privacy is discussed legally. In the U.S., conceptions of privacy are broadly categorized as "privacy" or "
information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
" issues. On the other hand, European law distinguishes between information privacy and
data protection Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
. While data protection ensures the due process of data, privacy refers to the right to a private life (e.g. private family life and private home). Additionally, while the GDPR places the burden of the privacy of consumer information on data controllers, U.S. privacy law places this burden on data subjects. This means that in the U.S., consumers are responsible for reading privacy notices and determining for themselves whether they feel like their private information will be protected.


New transaction systems

In 2013, Hoofnagle conducted an experiment along with Jennifer Urban and Su Li regarding American opinion towards privacy in new transaction systems (e.g. mobile payment systems). An advantage of mobile payment systems is that they serve as a digital wallet, allowing consumers the convenience of making transactions online. They also have the potential for better payment security. However, a privacy concern that Hoofnagle and the authors identify is that this new technology allows merchants to collect personally-identifiable contact information regarding consumers, a feature that is not provided in a typical credit card transactions. The authors' research suggested that Americans are opposed to systems that track them when they browse stores and share their information after purchases (e.g. sharing their phone number).


Cybercrime

In "Deterring Cybercrime: Focus on Intermediaries,” authors Aniket Kesari, Chris Hoofnagle, and Damon McCoy prove how intermediaries can limit
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
. According to the authors, cybercriminals rely on many intermediaries to commit illegal acts. These include methods of acquiring new customers, web hosting, collecting payments, and the delivery of products. While most of the legal scholarship on cybercrime grants intermediaries’ general immunity from the illegal acts of users, the authors argue that intermediaries should be required to take action against criminal activities of users. The authors list examples of current methods to force intermediaries to take action. An example of a government-led intervention includes domain name seizures. This is authorized by the
PRO-IP Act The Prioritizing Resources and Organization for Intellectual Property Act of 2008 (PRO-IP Act of 2008, , , ) is a United States law that increases both civil and criminal penalties for trademark, patent and copyright infringement. The law also estab ...
, giving the federal government the authority to seize a website accused of illegal activity. An example of private companies limiting the harm of cybercriminals includes the eBay Verified Rights Online (VeRO) Program. This program prevents sellers from illegally marketing and selling items.


The tethered economy

Tethering Tethering, or phone-as-modem (PAM) is the sharing of a mobile device's Internet connection with other connected computers. Connection of a mobile device with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth or by physical conne ...
typically refers to linking mobile devices together. However, in "The Tethered Economy" by Chris Hoofnagle, Aniket Kesari, and Aaron Perzanowski, the authors refer to tethering as the connection and dependence of goods on sellers for their operation. Examples of tethered devices include Google Home, Amazon Alexa, smart kitchen appliances, and other
Internet of things The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other comm ...
devices. All of these items depend on consumers for their functionality. The benefits of tethering are that tethered products increase trade generativity, may be safer to use, and have the potential for new and personalized functions over time. One harm of tethering includes the fact that manufacturers decide the durability of products through bricking, feature reduction, altering the terms of the bargain. Tethering also presents information risks, since devices are constantly collecting information on consumer behavior. Lastly, tethering reduces choice and competition in the market, raising switching costs that may lock consumers into particular devices or platforms. For example, it may be hard to switch to Microsoft devices once a consumer already owns many Apple devices. The authors present legal interventions that can change the relationship between sellers and buyers and address the tethering of the economy.
Contract A contract is a legally enforceable agreement between two or more parties that creates, defines, and governs mutual rights and obligations between them. A contract typically involves the transfer of goods, services, money, or a promise to tran ...
s,
tort law A tort is a civil wrong that causes a claimant to suffer loss or harm, resulting in legal liability for the person who commits the tortious act. Tort law can be contrasted with criminal law, which deals with criminal wrongs that are punishable ...
, and antitrust and consumer protection laws are all suggested reforms to address consumer problems that arise from tethering; however, the authors argue that no single approach will solve all of the problems discussed in the article.


See also

*
Information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
*
Identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was co ...
*
Identity fraud Identity fraud is the use by one person of another person's personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person. Most identity fraud is committed in the context of financial ad ...
*
Privacy law Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be Personally identifiable information ...
*
Privacy law in the United States Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
*
Consumer privacy Consumer privacy is information privacy as it relates to the consumers of products and services. A variety of social, legal and political issues arise from the interaction of the public's potential expectation of privacy and the collection and di ...


References


External links

*
Official site
{{DEFAULTSORT:Hoofnagle, Chris Living people Educators from California Year of birth missing (living people)