Public–Private Interactions in Privacy Governance
Abstract
:1. Introduction: Informed Consent in a Datafied World
2. Privacy Paradigm in Flux: Calling for Innovative Approaches
2.1. In Defense of Big Data
2.2. Possible Roles of Private Actors
3. Typologies: Public–Private Interactions
3.1. Collaboration and Coordination
3.2. Substitution
4. Case Studies: The Public and Private Sectors in Privacy Governance
4.1. APEC/CBPR: Moving from Self-Regulation to “Collaboration”?
4.2. EU/GDPR: Moving from State Regulation to “Coordination”?
5. Conclusions: The Future of Public–Private Convergence
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Cashore, Benjamin, Jette Steen Knudsen, Jeremy Moon, and Hamish van der Ven. 2021. Private Authority and Public Policy Interactions in Global Context: Governance Spheres for Problem Solving. Regulation & Governance 15: 1166–82. [Google Scholar]
- Cunningham, McKay. 2014. Next Generation Privacy: The Internet of Things, Data Exhaust, and Reforming Regulation by Risk of Harm. Groningen Journal of International Law 2: 115–34. [Google Scholar]
- Hintze, Mike. 2017. In Defense of the Long Privacy Statement. Maryland Law Review 76: 1044. [Google Scholar]
- Kamara, Irene. 2017. Co-Regulation in EU Personal Data Protection: The Case of Technical Standards and the Privacy by Design Standardization “Mandate”. European Journal of Law and Technology 8: 6. [Google Scholar]
- Kamara, Irene. 2020. Misaligned Union Laws? A comparative Analysis of Certification in the Cybersecurity Act and the General Data Protection Regulation. In Privacy and Data Protection: Artificial Intelligence. Edited by Dara Hallinan, Ronald Leenes and Paul Hert. London: Hart Publishing. [Google Scholar]
- Kaminski, Margot E. 2019. Binary Governance: Lessons from the GDPR’s Approach to Algorithmic Accountability. Southern California Law Review 92: 1529–57. [Google Scholar] [CrossRef]
- Kanetake, Machiko, and André Nollkaemper. 2014. The Application of Informal International Instruments Before Domestic Courts. The George Washington International Law Review 46: 765. [Google Scholar] [CrossRef] [Green Version]
- Lachaud, Eric. 2020. What GDPR Tells about Certification. Computer Law and Security Review 38: 105457. [Google Scholar] [CrossRef]
- Mannino, Sergio. 2020. How Facial Recognition Will Change Retail, Forbes. May 8. Available online: https://www.forbes.com/sites/forbesbusinesscouncil/2020/05/08/how-facial-recognition-will-change-retail/?sh=13abb5563daa (accessed on 8 October 2022).
- Mitchell, Andrew D., and Neha Mishra. 2019. Regulating Cross-Border Data Flows in a Data-Driven World: How WTO Law Can Contribute. Journal of International Economic Law 22: 389–416. [Google Scholar] [CrossRef]
- Mundie, Craig. 2014. Privacy Pragmatism: Focus on Data Use, Not Data Collection. Foreign Affairs 93: 28. [Google Scholar]
- Reidenberg, Joel R., N. Cameron Russell, Vlad Herta, William Sierra-Rocafort, and Thomas B. Norton. 2019. Trustworthy Privacy Indicators: Grades, Labels, Certifications, and Dashboards. Washington University Law Review 96: 1409–14. [Google Scholar]
- Rothchild, John A. 2018. Against Notice and Choice: The Manifest Failure of the Proceduralist Paradigm to Protect Privacy Online (Or Anywhere Else). Cleveland State Law Review 66: 559. [Google Scholar]
- Rubinstein, Ira S. 2018. The Future of Self-Regulation Is Co-Regulation. In Consumer Privacy. Edited by Evan Selinger, Jules Polonetsky and Omer Tene. Cambridge: Cambridge University Press, p. 503. [Google Scholar]
- Solove, Daniel J. 2013. Privacy Self-Management and The Consent Dilemma. Harvard Law Review 126: 1879. [Google Scholar]
- Sullivan, Clare. 2019. EU GDPR or APEC CBPR? A Comparative Analysis of the Approach of The EU and APEC to Cross Border Data Transfers and Protection of Personal Data in the IoT Era. Computer Law & Security Review 35: 380–97. [Google Scholar]
- United States President’s Council of Advisors on Science and Technology (PCAST). 2014. Executive Office of the President, Report to the President, Big Data and Privacy: A Technological Perspective; Hereinafter “the PCAST Report”. Washington, DC: Executive Office of the U.S. President, May.
- Weber, Rolf H. 2021. Global Law in Face of Datafication and Artificial Intelligence. In Artificial Intelligence and International Economic Law. Edited by Shin-yi Peng, Ching-Fu Lin and Thomas Steinz. Cambridge: Cambridge University Press. [Google Scholar]
- Zuboff, Shoshana. 2019. The Age of Surveillance Capitalism: The Fight for A Human Future at the New Frontier of Power. New York: PublicAffairs. [Google Scholar]
1 | |
2 | See e.g., Reidenberg et al. (2019). See also United States President’s Council of Advisors on Science and Technology (PCAST) (2014). Cf., Hintze (2017). |
3 | Hintze, ibid, p. 1045. |
4 | |
5 | |
6 | Cunningham (2014). |
7 | |
8 | |
9 | Reidenberg et al., supra footnote 2, p. 1412. |
10 | Twitter Privacy Policy, available online: https://cdn.cms-twdigitalassets.com/content/dam/legal-twitter/site-assets/privacy-aug-19th-2021/Twitter_Privacy_Policy_EN.pdf (accessed on 8 October 2022). |
11 | Cunningham, supra footnote 6. |
12 | See, e.g., the WhatsApp Privacy Policy, which states “[…] As part of the Facebook Companies, WhatsApp receives information from, and shares information with, the other Facebook Companies. We may use the information we receive from them, and they may use the information we share with them, to help operate, provide, improve, understand, customize, support, and market our Services and their offerings […]”, available online: https://www.whatsapp.com/legal/privacy-policy/?lang=en (accessed on 8 October 2022). |
13 | Solove, supra footnote 1, p. 1881. |
14 | Ibid. |
15 | Ibid., p. 1889. |
16 | Ibid., p. 1895. |
17 | Ibid. |
18 | Reidenberg et al., supra note 2, p. 1413. |
19 | Ibid., p. 1412. |
20 | The PCAST Report, supra note 2, p. 38. |
21 | Ibid. |
22 | Ibid. |
23 | |
24 | Ibid., p. 4. |
25 | The PCAST Report, supra footnote 2, p. 38. |
26 | See, e.g., Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, available online: https://www.hhs.gov/hipaa/for-professionals/privacy/special-topics/de-identification/index.html (accessed on 8 October 2022). |
27 | Recital 26: Not Applicable to Anonymous Data, available online: https://gdpr-info.eu/recitals/no-26/ (accessed on 8 October 2022). |
28 | Ibid. |
29 | |
30 | |
31 | See Cashore et al. (2021). |
32 | Ibid. First, under the category of complement, Benjamin Cashore et al. further divide the group into “collaboration”, “coordination”, and “isomorphism”. Second, under the category of competition, they further distinguish the types into “substitution” and “cooptation”. Third, they introduce a third main conceptualization, “coexistence”, which contains two sub-types: “layered institutions” and “chaos”. |
33 | Ibid., p. 1172. |
34 | Ibid. |
35 | National Institute of Standards and Technology, U.S. Department of Commerce, NIST Cybersecurity for IoT Program, available online: https://www.nist.gov/itl/applied-cybersecurity/nist-cybersecurity-iot-program (accessed on 8 October 2022). |
36 | Kaminski, supra footnote 30, at 1561–1563. |
37 | Ibid., at 1563, 1596. |
38 | Ibid., at 1562–1564. |
39 | Benjamin Cashore et al., supra footnote 31, at 1172. |
40 | Ibid. |
41 | The list of exemplary legitimate objectives in TBT Article 2.2 is non-exhaustive. |
42 | See, e.g., Appellate Body Report, European Communities—Measures Prohibiting the Importation and Marketing of Seal Products (EC – Seal Products), WT/DS400/AB/R, WT/DS401/AB/R, 18 June 2014, paras. 5.260–5.264. |
43 | On 25 March 2022, the US and the EU jointly announced an “agreement in principle” to new Trans-Atlantic Data Privacy Framework. Similar to its predecessors, the Privacy Shield and Safe Harbor provisions, the new Framework requires companies to self-certify their adherence to the Principles through the U.S. Department of Commerce. See the Trans-Atlantic Data Privacy Framework, available online: https://ec.europa.eu/commission/presscorner/detail/en/FS_22_2100 (accessed on 8 October 2022). |
44 | See Mitchell and Mishra (2019). |
45 | APEC, APEC Privacy Framework, available online: https://www.apec.org/publications/2017/08/apec-privacy-framework-(2015) (accessed on 8 October 2022). See also APEC Cross-Border Privacy Rules System, available online: https://www.apec.org/publications/2020/02/apec-cross-border-privacy-rules-system-fostering-accountability-agent-participation (accessed on 8 October 2022). |
46 | USMCA, Article 19.8: Personal Information Protection: “6. Recognizing that the Parties may take different legal approaches to protecting personal information, each Party should encourage the development of mechanisms to promote compatibility between these different regimes. The Parties shall endeavor to exchange information on the mechanisms applied in their jurisdictions and explore ways to extend these or other suitable arrangements to promote compatibility between them. The Parties recognize that the APEC Cross-Border Privacy Rules system is a valid mechanism to facilitate cross-border information transfers while protecting personal information”. |
47 | Australia, Canada, Chinese Taipei, Japan, Republic of Korea, Mexico, the Philippines, Singapore and the United States. |
48 | APEC, What is the Cross-Border Privacy Rules System, available online: http://www.cbprs.org/ (accessed on 8 October 2022). |
49 | APEC CBPR, available online: http://cbprs.org/business/ (accessed on 8 October 2022). |
50 | Ibid. |
51 | Schellman and Company, APEC Cross Border Privacy Rules (CBPR) Certification Process and Minimum Requirements, available online: https://www.schellman.com/apec/cbpr-process (accessed on 8 October 2022). |
52 | Ibid. |
53 | The Internet and Security Agency (KSIA), available online: https://www.kisa.or.kr/eng/main.jsp (accessed on 8 October 2022). |
54 | The Japan Institute for Promotion of Digital Economy and Community (JIPDEC), available online: https://english.jipdec.or.jp/ (accessed on 8 October 2022). |
55 | The Infocomm Media Development Authority (IMDA), available online: https://www.imda.gov.sg/regulations-and-licensing-listing/ict-standards-and-quality-of-service/IT-Standards-and-Frameworks/Compliance-and-Certification (accessed on 8 October 2022). |
56 | The Institute for Information Industry (III), available online: https://www.tpipas.org.tw/ (accessed on 8 October 2022). |
57 | To date, the FTC has brought four actions to enforce companies’ promises under APEC CBPR. See FTC Report to Congress on Privacy and Security (13 September 2021), available online: https://www.ftc.gov/system/files/documents/reports/ftc-report-congress-privacy-security/report_to_congress_on_privacy_and_data_security_2021.pdf (accessed on 8 October 2022). |
58 | “Good news” for the APEC Cross-Border Privacy Rules: FTC settles with Vipvape on CBPR privacy policy deception. Data Protection Law and Policy (June 2016) https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/good_news_for_the_apec_cross-border_privacy_rules_dplp_-_june_2016.pdf (accessed on 8 October 2022). |
59 | Kaminski, supra footnote 30, pp. 1568–80. See generally Rubinstein (2018). |
60 | Kaminski, id., p. 1611. |
61 | |
62 | GDPR Recital 98. |
63 | GDPR Article 40 |
64 | GDPR Recital 99. |
65 | GDPR Article 41. |
66 | GDPR Article 57. |
67 | GDPR Article 41. |
68 | GDPR Article 24. |
69 | GDPR Article 83. |
70 | GDPR Recital 100. |
71 | GDPR Article 42. |
72 | GDPR Article 43. |
73 | GDPR Article 42. |
74 | GDPR Article 58. |
75 | GDPR Article 83. |
76 | Lachaud, supra note 61. |
77 | GDPR Article 83. |
78 | |
79 | Cf, Lachaud, supra footnote 61, p. 7. |
80 | See also Kanetake and Nollkaemper (2014). |
81 | Kaminski, supra footnote 30, pp. 1599–601. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Peng, S.-y. Public–Private Interactions in Privacy Governance. Laws 2022, 11, 80. https://doi.org/10.3390/laws11060080
Peng S-y. Public–Private Interactions in Privacy Governance. Laws. 2022; 11(6):80. https://doi.org/10.3390/laws11060080
Chicago/Turabian StylePeng, Shin-yi. 2022. "Public–Private Interactions in Privacy Governance" Laws 11, no. 6: 80. https://doi.org/10.3390/laws11060080
APA StylePeng, S. -y. (2022). Public–Private Interactions in Privacy Governance. Laws, 11(6), 80. https://doi.org/10.3390/laws11060080