You are on page 1of 13

Internet Privacy and Self-Regulation

Lessons from the Porn Wars


by Tom W. Bell

No. 65 August 9, 2001

The availability and adequacy of technical kind of speech—speech by commercial entities


remedies ought to play a crucial role in evaluating about Internet users—to political regulation.
the propriety of state action with regard to both With regard to privacy no less than pornography,
the inhibition of Internet pornography and the however, self-help offers Internet users a less-
promotion of Internet privacy. Legislation that restrictive means of preventing the alleged harms
would have restricted Internet speech considered of free speech than does state action. Indeed, a
indecent or harmful to minors has already faced review of privacy-protecting technologies shows
and failed that test. Several prominent organiza- them to work even more effectively than the fil-
tions dedicated to preserving civil liberties argued tering and blocking software used to combat
successfully that self-help technologies offered online smut. Digital self-help in defense of
less-restrictive means of achieving the purported Internet privacy makes regulation by state
ends of such legislation, rendering it unconstitu- authorities not only constitutionally suspect but,
tional. Surprisingly, those same organizations from the more general point of view of policy,
have of late joined the call for subjecting another functionally inferior.

Tom W. Bell is an associate professor at the Chapman University School of Law and an adjunct scholar
at the Cato Institute. For an earlier version of this paper, see “Pornography, Privacy, and Digital Self-
Help,” John Marshall Journal of Computer and Information Law (forthcoming).
The propriety of tions have elsewhere advanced arguments
legislation affect- Introduction that counsel against regulatory initiatives.
Indeed, the ACLU, EPIC, and CDT success-
ing either pornog- Pornography tends to generate social stig- fully fought legislative attempts to regulate
raphy or privacy ma. Privacy tends to alleviate it. That the two indecent or harmful-to-minors speech on the
frequently coexist reflects little more than Internet by arguing, in relevant part, that self-
should depend the phenomenon of shame. Pornography help offered a less-restrictive means of achiev-
crucially on the and privacy share a more subtle relationship ing the same ends. It turns out that self-help
availability of in Internet law and policy, however, because has an even greater edge over legislation when
the propriety of legislation affecting either it comes to Internet privacy. Internet users can
alternative self- pornography or privacy should depend cru- protect their privacy, and—following the argu-
help remedies. cially on the availability of alternative self- ments made by the ACLU, EPIC, and CDT—
help remedies, such as special software or the ready availability of self-help alternatives
communications services, that each individ- casts constitutional doubt on legislation that
ual can secure for him- or herself through would censor speech alleged to violate
technical rather than political means. Internet users’ privacy rights. Even apart from
Legislation that attempted to restrict such purely legal questions, the efficacy of self-
Internet speech considered indecent or help renders such legislation suspect from a
harmful to minors has already had to face policy point of view.
that exacting test. This paper argues that pro- Given the range of discussions taking place
posals to regulate Internet privacy merit sim- about Internet privacy, the relatively narrow
ilar scrutiny. scope of the present paper bears emphasis. It
The same points that have helped strike primarily concerns the legal impact that self-
down statutory limits on Internet speech help remedies ought to have on legislation
thought harmful to its readers (because it is that would restrict speech by commercial enti-
indecent or harmful to minors) argue against ties about Internet users. More generally, but
enacting new statutory limits on speech secondarily, it offers a policy-based critique of
thought harmful to its subjects (i.e., privacy legislative proposals to regulate commercial
legislation). In both cases, self-help offers activity that does not win First Amendment
Internet users a less-restrictive means of pre- protection and that affects the privacy of
venting the alleged harms caused by free Internet users, such as monitoring click
speech than does legislation. In both cases, streams or using persistent cookies. The rela-
the alternative offered by digital self-help tive merits of trying to protect Internet privacy
makes regulation by state authorities not through direct legislation, delegation of broad
only constitutionally suspect but, from the authority to an existing or new agency, or
more general points of view of policy and some other form of state action do not matter
effectiveness, functionally inferior. much for this analysis, which regards all such
Admittedly, that critique might strike actions as susceptible to similar criticism. The
some readers as distinctly unfashionable. discussion herein of the First Amendment, of
Many and diverse voices have of late called course, concerns the U.S. legal system, though
for using political means to regulate speech many of the observations about law and poli-
by commercial entities about Internet users cy might well apply to other systems. This
in the name of protecting privacy. That rising paper does not concern state action that
chorus includes the American Civil Liberties threatens privacy rights, issues raised by inter-
Union, the Electronic Privacy Information national variation in privacy regulations, or
Center, and the Center for Democracy and esoteric questions about the relationship
Technology. Far from advancing the case for between privacy and conceptions of self. It
protecting Internet privacy through new reg- does not discuss the prospect of censoring
ulations, however, those same three organiza- speech by noncommercial entities about

2
Internet users, solely because little risk of such information has dropped from 59 percent to
regulation looms. If that sort of legislation 46 percent.9 More recently, the Pew study put
surfaces, however, the arguments set forth that figure at a mere 27 percent.10
here should for the most part prove applicable Nonetheless, consistent with what they
and, indeed, apply with even more force than say when polled (rather than what they do
when restricted to the defense of commercial online) many Internet users demand
entities. stronger laws protecting online privacy. Fifty-
seven percent of respondents to the Harris
poll agreed, “The government should pass
The Demand for laws now for how personal information can
Internet Privacy be collected and used on the Internet.”1 1
Three-quarters of those surveyed by ABC
News said it should be illegal for companies
Judging by what they tell pollsters, to sell information about what consumers
Internet users worry a great deal about priva- buy on the Internet.1 2
cy. A Pew survey conducted from May 19 to Those results hardly reflect balanced
June 21, 2000, found 54 percent of American assessments of the costs and benefits of reg-
Internet users “very concerned” that personal ulating speech about Internet users, of What Internet
information about them or their families course. Many consumers would casually users actually do
would find its way to businesses or approve of abolishing credit reports, too, about privacy
strangers.1 Perhaps unsurprisingly, 86 per- without reckoning the resulting impact on
cent of those respondents favored an “opt- their access to credit cards or home mort- sends a distinctly
in” approach to Internet privacy, under gages. And the gap between words and deeds, different message
which no Internet company would use such not to mention the various other interpreta-
information unless expressly authorized to tion problems that plague polls,1 3 suggests
from what they
do so.2 Similarly, a Harris poll taken in March that no one should consume complaints say.
2000 found that 56 percent of respondents about Internet privacy without a side order of
claimed they would, if given the choice, salt. Nonetheless, surveys uncovering con-
always opt out of providing Web sites with cern about Internet privacy appear to have
personal information.3 Eighty-eight percent encouraged regulators, politicians, and
said that they would prefer every Web site to activists to take action.
ask for permission before sharing their per- Impressed by such polls and impatient
sonal information with other parties.4 with the slow pace of industry self-regula-
What Internet users actually do about pri- tion, in May 2000 the Federal Trade
vacy sends a distinctly different message Commission called for new legislation pro-
from what they say, however. The Pew survey tecting the privacy of Internet users.1 4
found that 64 percent of Internet users Congress has already taken under considera-
would provide personal information if neces- tion such bills as the Consumer Internet
sary to access a Web site5 and that only 24 Privacy Enhancement Act,15 the Consumer
percent of Internet users who know about Privacy Protection Act,1 6 and the Consumer
cookies6 have configured their Web browsers Internet Privacy Protection Act of 1999,1 7
to reject them.7 The Harris poll discovered although none has yet to pass. President
that only 19 percent of Internet users make a Bush would likely sign those kinds of protec-
habit of reading Web sites’ privacy notices.8 tions into law.18 He has signaled his support
Studying deeds rather than words, moreover, of legislation giving greater privacy protec-
reveals decreasing concern about Internet tion to Internet users. Regulators and politi-
privacy. Harris found that over two years the cians can count on influential activist orga-
percentage of Internet users who refuse to nizations to support the call for new laws
register at Web sites by offering personal protecting Internet privacy, including, most

3
notably for present purposes, the ACLU, disqualified such laws as the “least restrictive
EPIC, and CDT. The ACLU has called for leg- means” of regulating constitutionally pro-
islation to mandate, among other things, tected speech.2 2 Those organizations have
that personal information about Internet leveled the same claim against the Commun-
users never be collected or distributed with- ications Decency Act of 1996, the Child
out their knowledge and consent; that any Online Protection Act,2 3 and New Mexico’s2 4
organization collecting personally identifi- and New York’s25 COPA-like state laws. This
able information from Internet users inform part describes the application in those cases
them why it is doing so; that organizations of the argument that the availability of digi-
not reuse such information for any other tal self-help made legislative restrictions on
purpose without a user’s consent; and that Internet speech unnecessary, excessive, and,
every Internet user have the right to examine, thus, unconstitutional.
copy and correct personal information.1 9 Let us start with the Communications
EPIC has advocated regulations that would Decency Act.2 6 The ACLU and EPIC joined in
impose confidentiality obligations on arguing before the Supreme Court that the
Internet consumer data and limit the collec- CDA unconstitutionally limited indecent
tion of personal data to “necessary” purpos- speech on the Internet because private filter-
es.2 0 CDT’s staff counsel, Deirdre Mulligan, ing options offered an alternative to a state
has testified to Congress that “we must prohibition on indecent Internet speech.2 7
adopt legislation that incorporates into law Contrary to the government’s assertion that
Fair Information Practices—long-accepted there existed no equally effective alternative
principles specifying that individuals should to the CDA’s criminal ban on indecent
be able to ‘determine for themselves when, speech, the plaintiffs observed that the trial
how, and to what extent information about court had “found that the existing software
them is shared.’”2 1 affords parents a significant option for pro-
That the ACLU, EPIC, and CDT have tecting children” and that the government
good intentions about protecting the privacy itself had admitted to a growing and com-
of Internet users should surprise no one. petitive market for self-help tools.2 8 The
That they propose remedies that would regu- plaintiffs also cited protections available
late speech should perhaps raise eyebrows, through the major commercial online ser-
however. The arguments that the ACLU, vices and technical standards then under
That the ACLU, EPIC, and CDT once employed in defense of development that would facilitate user-based
EPIC, and CDT indecent or harmful-to-minors speech on the blocking of indecent Internet speech.2 9
Internet also apply to the restrictions that The CDT, in its capacity as a member of
have good inten- they would now impose on another type of the plaintiff Citizens’ Internet Empower-
tions about pro- speech: speech by commercial entities about ment Coalition, backed a similar analysis in
Internet users. its Supreme Court brief, which cited the
tecting the privacy
availability of blocking and filtering software
of Internet users as proof that the CDA was “unconstitutional
should surprise Digital Self-Help versus because there are less restrictive measures
no one. That they Regulation of Congress could have selected that would
have been much more effective in preventing
propose remedies Pornographic Speech minors from gaining access to indecent
that would regu- online material.”3 0 The self-help arguments
The ACLU, EPIC, and CDT successfully used by the ACLU, EPIC, and CDT apparent-
late speech should challenged the constitutionality of legisla- ly proved convincing; the Supreme Court
perhaps raise tion restricting Internet speech classified as struck down the CDA because it did not offer
indecent or harmful to minors by arguing the least-restrictive means of achieving the
eyebrows. that the availability of self-help alternatives government’s goals.3 1

4
The ACLU and EPIC again joined forces “least restrictive means” of correcting a prob- Lawmakers must
in challenging COPA, a statute that by tar- lem must consider effective self-help as an bear the burden
geting speech harmful to minors, rather than alternative to state action.
all types of indecent speech, aimed to avoid Perhaps the third circuit found it sugges- of justifying their
the overbreadth that had rendered the CDA tive that in ACLU v. Reno the Supreme Court, actions by proof
unconstitutional. As in their earlier attack on when listing possible alternatives to the
the CDA, the ACLU and EPIC argued that CDA, included only those involving state
of a salient and
the availability of self-help alternatives action.3 7 That supposed limitation would serious market
demonstrated the Child Online Protection hardly justify limiting inquiries under the failure.
Act’s unconstitutionality: “There are numer- “least restrictive means” test to government
ous less restrictive and more effective alterna- action, however, since context indicates that
tives to COPA, including user-based filtering the Supreme Court meant only to scold the
software, that parents may use if they wish to legislature for failing to pass a different “pro-
restrict what their children view.”3 2Again, the vision”—not to comment on the govern-
argument succeeded. The trial court granted ment’s failure to consider self-help reme-
a preliminary injunction on enforcement of dies.3 8 So far as reading judicial tea leaves
the statute, observing that “blocking or fil- goes, the Third Circuit should have pondered
tering technology may be at least as success- why the Supreme Court stated for the record:
ful as COPA would be in restricting minors’ “Systems have been developed to help par-
access to harmful material online without ents control the material that may be avail-
imposing the burden on constitutionally able on a home computer with Internet
protected speech that COPA imposes on access.”3 9 As if to answer that question, the
adult users or Web site operators.”3 3 Supreme Court had already explained ACLU
Although the third circuit affirmed the v. Reno in terms that cast sharp doubt on the
injunction on COPA’s enforcement on Third Circuit’s refusal to regard self-help as
appeal, it expressed reservations about the an alternative to state action: “The mere pos-
self-help argument. It opined that the block- sibility that user-based Internet screening
ing and filtering technologies cited by the software would ‘soon be widely available’ was
trial court “do not constitute government relevant to our rejection of an overbroad
action, and we do not consider this to be a restriction of indecent cyberspeech.”4 0
lesser restrictive means for the government to The ACLU has also used the self-help argu-
achieve its compelling interest.”3 4As explana- ment in challenging state laws similar to
tion, the appellate court offered no more COPA. As proof that a New Mexico statute4 1
than an unsupported claim that “the criminalizing the dissemination of Internet
parental hand should not be looked to as a speech harmful to minors failed to represent
substitute for a congressional mandate.”3 5 the least restrictive means of effectuating the
That seems an unjustifiably narrow interpre- government’s interest, the ACLU cited “many
tation of the “least restrictive means” test, alternative means that are more effective at
however. Congress can boast of no mandate assisting parents in limiting a minor’s access
to legislate in contravention of the First to certain material if desired.”4 2The trial court
Amendment, after all, and the Supreme granted a preliminary injunction on the
Court has made clear that the availability of statute’s effectiveness, noting the existence of
superior private alternatives can strip law- “a wide range of mechanisms that parents can
makers of legitimate power to restrict free use to prevent their children from accessing
speech.3 6 To put the matter more generally material online they do not want their chil-
and in economic terms, lawmakers must bear dren to view,”4 3 and the Tenth Circuit
the burden of justifying their actions by affirmed.4 4 The ACLU made the same argu-
proof of a salient and serious market failure. ment in its complaint45 against a New York
Under either analysis, a full inquiry into the law that criminalized Internet speech harmful

5
to minors.46 Here, though, the trial court to track your movements across the net.5 5
granted a preliminary injunction without Internet users who demand still more privacy
addressing such First Amendment claims, can buy Freedom56 software to browse the net
basing its decision solely on grounds that the under disguise of a pseudonym or subscribe to
act interfered with interstate commerce.4 7 Anonymizer.com’s5 7 or or SafeWeb.com’s ser-
vices5 8 to become completely invisible to
online merchants. In sum, then, Internet users
Self-Help versus Regulation already enjoy a variety of cheap and effective
of Commercial Speech tools for protecting privacy online.5 9 If con-
sumer demand reflects poll results, moreover,
entrepreneurs will have ample incentives to
Digital self-help makes unnecessary state create tools that protect Internet privacy even
action limiting speech that is indecent or more cheaply and effectively.6 0
harmful to minors. The same argument Such privacy-protecting services differ in
applies to state action that would limit one crucial regard from services that try to
speech by commercial entities about Internet filter out offensive speech: they work better.
users. Digital self-help offers more hope of Because meaning depends on context, filter-
Digital self-help protecting Internet users’ privacy than it does ing software has trouble distinguishing blue-
makes unneces- of effectively filtering out unwanted speech, footed and winged “boobies” from the
sary state action and the availability of such self-help casts human variety. More fundamentally, no one
doubt on the constitutionality of legislation has yet figured out how to encode in software
limiting speech restricting speech by commercial entities the difficult moral reasoning that responsi-
that is indecent or about Internet users. From the more general ble parents and teachers use to raise kids
point of view of policy, moreover, digital self- right. Privacy-protecting services tackle a
harmful to help offers a better approach to protecting comparatively simple technical problem.
minors. The same Internet privacy than does state action. That they will not solve it perfectly matters
argument applies little; they need only protect privacy better
The Efficacy of Self-Help in Protecting than political action can.6 1 On that count,
to state action Internet Privacy privacy-protecting services have a great edge
that would limit Digital self-help offers what may be the over filtering software. The same “least
only viable solution to protecting Internet pri- restrictive means” test that applies to other
speech by com-
vacy. Consider the many types of self-help types of constitutionally protected speech
mercial entities already available. Internet users who worry also applies to speech by commercial entities
about Internet about cookies can simply configure their about Internet consumers and ought to
browsers to reject them—a process that takes apply with even greater force.
users. about 15 seconds.48 Though that will cut off
access to sites that admit only registered users, The Constitutionality of Regulating
advanced self-help measures can both preserve Commercial Entities’ Speech about
access to such sites and bar offensive cookies. Internet Users
More cautious Internet users can download But should state action regulating speech
software like AdSubtract,49 IDcide Privacy by commercial entities about Internet con-
Companion,5 0 PC Magazine’s CookieCop,5 1 sumers have to pass the “least restrictive
Siemens’ WebWasher,52 Internet Junkbuster,5 3 means” test? Does such speech qualify, in
or Guidescope,54 all of which offer more pre- other words, for the same level of constitu-
cise control over cookies and all of which are tional protection afforded to indecent and
free of charge. Privacy Companion, to pick harmful-to-minors speech? In brief: maybe it
one, distinguishes between cookies that give does, but that probably does not matter.
you access to a particular site’s personalized Although an exhaustive answer would exceed
services and cookies that advertisers might use the bounds of the present paper 62 and would

6
lack the guide of controlling case law,6 3 this of existing self-help protections probably
section offers a quick explanation of that already qualifies them as less restrictive than
conclusion. any of the various current proposals to regu-
Speech by commercial entities about late speech by commercial entities about
Internet consumers might well qualify for Internet users.
protection under the “least restrictive means”
test, which courts apply when strictly scruti- Self-Help and Public Policy in Protecting
nizing restrictions on ordinary speech—or for Internet Privacy
that matter, speech that is indecent or harm- Even apart from such constitutional ques-
ful to minors.6 4 At a minimum, though, such tions, the availability of so many efficacious
speech would almost certainly qualify as means of protecting Internet privacy
commercial speech,65 which is generally pro- through self-help suggests that legislation
tected from any regulation that is “more toward the same end could not tout curing
extensive than is necessary” to serve the gov- market failure as a justification.6 9 Whether a
ernment’s alleged interest.66 If a regulation great many Internet users avail themselves of
on commercial speech constitutes a blanket such self-help measures has little bearing on
ban on truthful statements, however—a that point, of course.7 0Notwithstanding talk
description that might well apply to extreme to the contrary, actions may reveal Internet
restrictions on speech by commercial entities users quite willing to trade personal privacy
about Internet consumers—the “least restric- for access to Web sites.71 As no one has a vest-
tive means” test would come back into play.6 7 ed right to access another’s private Web site,
State action restricting speech within or that quid pro quo should raise no outcry. It
by commercial entities about Internet users matters most that Internet users have a real-
looks constitutionally suspect even under the istic choice between preserving and sacrific-
more lax test generally applicable to com- ing their privacy.7 2 Judging by what they tell
mercial speech. By way of distinguishing it pollsters, moreover, an overwhelming major-
from the more demanding “least restrictive ity of Americans think that Internet users—
means” test, the Tenth Circuit recently not government or industry—should bear the
explained that in applying the “more exten- primary responsibility for exercising that
sive than is necessary” test: choice.7 3
Legislation protecting Internet privacy
We do not require the government to offers little benefit. Moreover, the potential
consider every conceivable means costs of such legislation are high. The
that may restrict less speech and Children’s Online Privacy Protection Act of An overwhelming
strike down regulations when any 19987 4 does not give much encouragement
less restrictive means would suffi- on that count, as it has increased legal uncer- majority of
ciently serve the state interest. We tainty, 75 raised the expense of providing Americans think
merely recognize the reality that the online services,76 and even forced some com-
existence of an obvious and substan- panies out of the market for young Internet
that Internet
tially less restrictive means for users.7 7A more comprehensive statute, cover- users—not gov-
advancing the desired government ing not just the privacy of children but also ernment or
objective indicates a lack of narrow that of adults, might well generate more
tailoring.68 comprehensive problems. industry—should
The prospect of having government agen- bear the primary
The large and growing number of self-help cies enforce such a statute should not engen- responsibility for
alternatives for protecting Internet privacy der much optimism. Notwithstanding feder-
certainly qualifies them as obvious. al law7 8 and a specific White House edict to exercising choice.
Furthermore, although the ultimate determi- the contrary,7 9 federal agencies have largely
nation must turn on the facts, the efficiency failed to implement privacy protections on

7
State and federal their own Web sites.8 0 A privacy audit by the This paper began by noting that pornog-
Web sites routine- General Accounting Office found that the raphy and privacy share bonds based in
privacy policies of only 46 of the 70 federal shame: what the former heightens, the latter
ly fall short of the agencies it surveyed fulfilled applicable lessens. It has argued that Internet law and
same privacy-pro- requirements. 81 More generally, a recent policy should take account of a more signifi-
study showed that state and federal Web sites cant relationship between pornography and
tection standards routinely fall short of the same privacy-pro- privacy, one based in the common role that
that activists tection standards that activists would have digital self-help should play in evaluating
would have gov- government impose on private actors.8 2 state action directed toward either of them.
Though one might argue that government Even under that analysis, however, one might
ernment impose agents quite naturally enforce privacy laws well conclude that shame still bonds Internet
on private actors. less vigorously against themselves than pornography and Internet privacy. For it
against other citizens,8 3somehow that excuse would indeed prove a shame, with regard to
does not give much comfort. either, if lawmakers ignored the alternatives
As a matter of public policy as well as con- offered by digital self-help and instead enact-
stitutional law, politicians should invoke ed unconstitutional, unnecessary, and unjus-
state power only to correct manifest failures tified regulations.
of market and other nonpolitical mecha-
nisms to alleviate serious national problems.
Even then, lawmakers should do so only if Notes
the all-too-likely risks of government failure
do not threaten to cancel out the putative 1. Susannah Fox, Trust and Privacy Online: Why
Americans Want to Rewrite the Rules, Pew Internet &
gains of state action.8 4 The benefits, in brief, American Life Project, 2000, http://www.pewinternet.
must outweigh the costs. Proposals to pass org/reports/toc.asp?Report=19.
laws protecting Internet users’ privacy merit
skepticism.8 5 2. Ibid.

3. “Harris Poll: A Growing Threat,” Business Week


Online, March 20, 2000, http://www.businessweek.
Conclusion com/2000/00_12/b3673010.htm. The story reports
results of a Harris Interactive telephone survey of
1,014 adults—presumably from the United States—
The availability of speech-filtering pro- between March 2 and March 6, 2000. The story does
grams has already powerfully affected not specify the poll’s margin of error.
responses to Internet pornography. The
advent of tools such as cookie-control soft- 4. Ibid.
ware and anonymizing networks now pre- 5. Fox, p. 6.
sents a similar challenge to the law and policy
on Internet privacy. In each case, the availabil- 6. A cookie is a “message given to a Web browser
ity of self-help alternatives renders state by a Web server. The browser stores the message
in a text file called cookie.txt. The message is then
action suspect on constitutional and policy sent back to the server each time the browser
grounds. The same activist organizations that requests a page from the server.” Webopedia,
argue against legislation restricting Internet http://webopedia.internet.com/TERM/c/cookie.
speech that is indecent or harmful to minors html.
should reconsider their demands for privacy 7. Fox, p. 8.
legislation that would restrict speech by com-
mercial entities about Internet users. 8. “Harris Poll,” p. 2. This figure comes from mul-
Politicians and regulators should likewise tiplying the 55 percent of respondents who said
they had “seen a privacy notice or other explana-
question the wisdom of trying to mandate tion of how personal information collected by
privacy protections that Internet users can that site will be used” by the 35 percent who
easily obtain on their own. responded “always” to the question, “If you have

8
seen a privacy notice, how often do you read the with regard to personally identifiable information to
information contained in the privacy notice?” obtain the subject’s consent before transferring the
information to a third party and giving subjects the
9. Ibid., p. 9. right to review and correct such information).

10. Fox, p. 9. This figure comes from multiplying 18. Lisa M. Bowman, “ZDNN Q&A with George
the 45 percent of Internet users who have not pro- W. Bush,” ZDNet News, June 21, 2000, http://
vided real personal information to a site by the 61 www.zdnet.com/zdnn/stories/bursts/0,7407,259
percent of that group who report that they cate- 1588,00.html. ZD: “Should the government legis-
gorically refuse to offer that information. late online privacy?” GWB: “I think there ought to
be laws here that say a company cannot use my
11. “Harris Poll,” p. 16. information without my permission to do so.”

12. Daniel Merkle, “Internet Invasion,” ABCNews. 19. American Civil Liberties Union, Comments to
com, February 3, 2000, http://www.abcnews.go. Office of International Affairs, National Telecom-
com/onair/DailyNews/poll000203.html. The sur- munications and Information Administration,
vey was conducted by telephone from January 21 Re: Elements of Effective Self-Regulation for the
to January 26, 2000, among a random national Protection of Privacy and Questions Related to
sample of 1,006 adults, by International Online Privacy, 2000, §4, http://www.aclu.org/
Communications Research of Media, and had a congress/l00698a.html.
three-point margin of error.
20. Electronic Privacy Information Center, “Need for
13. Consider how poor questions give poor Enforceable Privacy Codes,” in Comments of
results. Pew pollsters predictably discovered that Electronic Privacy Information Center before the
only 15 percent of Americans described them- FTC in re Public Workshop on Consumer Infor-
selves as “not too” or “not at all” concerned about mation Privacy Incorporating: Data Base Study,
businesses or strangers obtaining personal infor- April 15, 1997, http://www.epic.org/privacy/internet/
mation about them or their families. Fox, p. 22. ftc/epic_comments_497.html. See also Comments of
An ABC News poll taken last January pressed Andrew Shen on behalf of EPIC in re Online
respondents to give an objective description of Profiling Project, P994809/Docket No. 990811219-
their everyday concerns, however, and found that 9219, http://www.ftc.gov/bcp/profiling/comments/
57 percent of respondents admitted that they shen.htm (calling for regulation of online profiling).
“don’t spend much time worrying that comput-
ers and other types of technology are being used 21. Deirdre Mulligan, Prepared statement before
to invade their privacy.” See also Merkle. the Subcommittee on Courts and Intellectual
Property of the House Committee on the Judici-
14. Federal Trade Commission, “Privacy Online: ary, Oversight Hearing on Privacy and Electronic
Fair Information Practices in the Electronic Communications, May 18, 2000, http://www.cdt.
Marketplace: A Federal Trade Commission Report org/testimony/000518mulligan.shtml.
to Congress,” May 2000, pp. 36–38, http://www.
ftc.gov/reports/privacy2000/privacy2000.pdf. The 22. Sable Communications, Inc., v. FCC, 492 U.S. 115,
majority report did not discuss consumer self-help, 126 (1989) (explaining that government must
though Commissioner Orson Swindle, dissenting, also show that it has a compelling interest to reg-
did (p. 65). ulate such speech).

15. S. Res. 2928, 106th Cong. §2(a) (2000) (requir- 23. 47 U.S.C.S. § 231 (Lexis Supp. 2000).
ing commercial Web sites to give notice before
collecting personally identifiable information 24. N.M. Stat. Ann. § 30-37-3.2(A) (2000) (crimi-
and allowing the subjects of that information to nalizing the dissemination by computer of mate-
forbid its use for marketing purposes or its distri- rial harmful to minors).
bution to third parties).
25. N.Y. Penal § 235.21(3) (Consol.1999).
16. S. Res. 2606, 106th Cong. §102 (2000) (requir-
ing service providers and commercial Web sites to 26. 47 U.S.C.S. § 223 (Lexis Supp. 2000).
give notice and obtain consent before collecting,
using, or disclosing personally identifiable infor- 27. Brief for appellees at II.B.2, American Civil
mation and giving the subjects of that informa- Liberties Union v. Reno, 521 U.S. 844 (1997). Both
tion the right to review and correct it). the ACLU and EPIC were named parties to the lit-
igation and signed the brief.
17. H.R. Res. 313, 106th Cong. §2(a)(1) (1999)
(imposing on interactive service providers a duty 28. Ibid.

9
29. Ibid. movies on grounds that passers-by must bear the
burden of looking away); Cohen v. California, 403
30. Brief for appellee, CEIC at III.C., American Civil U.S. 15, 21 (1971) (reversing as unconstitutional a
Liberties Union v. Reno, 521 U.S. 844. conviction based on public display of “Fuck the
Draft” on grounds that offended parties “could
31. American Civil Liberties Union v. Reno, 521 U.S. effectively avoid further bombardment of their
844. sensibilities simply by averting their eyes”). The
Court has extended similar protection even to
32. Brief of plaintiffs-appellees, ACLU, EPIC, et al. commercial speech. See Bolger v. Youngs Drug
at Summary of Argument, American Civil Liberties Products Corporation, 463 U.S. 60, 73–74 (1983)
Union v. Reno , Case No. 99-1324 (3rd Cir. 1999), (holding ban on offensive mail unconstitutional
http://www.aclu.org/court/acluvrenoii_motion.h on grounds that parents could effectively limit
tml. See also ibid., § V.C. (citations omitted): children’s access to it).

COPA is not the least restrictive means of 37. Reno v. American Civil Liberties Union, 521 U.S.
achieving defendant’s asserted interest. The 844, 879 (stating that less restrictive alternatives
record showed that many alternative means included “requiring that indecent material be
are more effective at assisting parents in ‘tagged’ in a way that facilitates parental control
limiting minors’ access to certain material if of material coming into their homes, making
desired. Commercial online services like exceptions for messages with artistic or educa-
America Online and Prodigy Internet pro- tional value, providing some tolerance for
vide features to prevent children from parental choice, and regulating some portions of
accessing chat rooms and to block access to the Internet—such as commercial Web sites—dif-
Web sites and discussion groups based on ferently than others, such as chat rooms”). But see
keywords, subject matter, or specific discus- Malla A. Pollack, “Opt-in Government: Using the
sion groups. Online users can also purchase Internet to Empower Choice—Privacy Applica-
special software applications, known as tion,” Catholic University Law Review 52 (forthcom-
user-based blocking programs, that block ing)(proposing that were the Supreme Court to
access to certain resources, prevent children revisit that list, it might now add Professor
from giving personal information to Pollack’s suggestion: “The Federal government
strangers by e-mail or in chat rooms, and should set up a private zone on the Internet by
keep a log of all online activity that occurs setting up a search engine which will link only to
on the home computer. User-based block- sites providing the highest level of privacy”).
ing programs are not perfect, both because
they fail to screen all inappropriate materi- 38. Reno, 521 U.S., p. 879.
al and because they block valuable Web
sites. However, a voluntary decision by con- 39. Ibid., pp. 854–55.
cerned parents to use these products for
their children constitutes a far less restric- 40. U.S. v. Playboy Entertainment Group, 529 U.S.
tive alternative than COPA’s imposition of 803, 120 S. Ct. 1887, quoting Reno, 521 U.S.,
criminal penalties for protected speech pp. 876–77.
among adults.
41. N.M. Stat. Ann.
33. American Civil Liberties Union v. Reno, 31 F.
Supp.2d, pp. 473, 497 (E.D. Pa. 1999), affirmed, 42. Complaint for Declaratory and Injunctive
217 F.3d 162 (3rd Cir. 2000). Relief, ¶ 91; see also ACLU v. Johnson, 4 F. Supp. 2d
1024 (D.N.M. 1998)(2000), http://www.aclu.
34. American Civil Liberties Union v. Reno, 217 F.3d, org/court/acluvjohnson_complaint.html.
p. 171 (3rd Cir. 2000).
43. Ibid., p. 1033.
35. Ibid., p. 181.
44. Ibid.
36. See Consolidated Edison Co. of New York v. Public
Service Commission of New York, 447 U.S. 530, 542 45. Complaint for Declaratory and Injunctive
(1980) (holding unconstitutional a ban on utility Relief, American Library Ass’n v. Pataki, 969 F.
bill inserts on grounds that customers “may Supp. 160, 183 (S.D.N.Y. 1997), http://www.aclu.
escape exposure to objectionable material simply org/court/nycdacomplaint.html (arguing, inter
by transferring the bill insert from envelope to alia, that software filters provide a less restrictive
wastebasket.”); Erznoznik v. Jacksonville, 422 U.S. alternative to New York statute forbidding
205, 210–11 (1975) (striking down as unconstitu- Internet speech harmful to children). The ACLU
tional an ordinance prohibiting indecent drive-in was a plaintiff in the case.

10
46. N.Y. Penal Laws § 235.21(3) (Consol. 1999). that are sent to external sites. The medium priva-
cy protection mode prevents the external cookies
47. Pataki, pp, 183–84. from being set while allowing the site you are vis-
iting to set cookies.
48. See “Stopping Cookies in IE3 + Netscape,”
http://www.cookiecentral.com/stopcm.htm 56. Freedom Internet Privacy and Security
(describing how to configure a variety of browsers so Software, “How Freedom Works,” http://www.
as to reject cookies); see also David Whalen, “The freedom.net/info/how.html (describes how Free-
Unofficial Cookie FAQ,” http://www.cookiecentral. dom software uses encryption and a private net-
com/faq; and “How Web Servers’ Cookies work to allow users to browse the Web using
Threaten Your Privacy,” http://www.junkbusters. untraceable online pseudonyms). Freedom soft-
com/ht/en/cookies.html. ware costs $49.95.

49. AdSubtract, “We Subtract the Ads!” http:// 57. Anonymizer.com, “Online Privacy Services,”
www.adsubtract.com. Individual consumers can http://www.anonymizer.com/services/paidSurf.h
download and use AdSubtract SE free of charge tml (explains that the Anonymizer service pro-
or pay $29.95 for AdSubtract Pro. Both versions vides anonymous surfing and “safe cookies” to
block ads and cookies. protect user’s privacy). Anonymizer allows unlim-
ited free use of its service, albeit of a less function-
50. “Get the Idcide Privacy Companion,” http:// al version than the premium service enjoyed by
www.idcide.com/html/Support/faq.htm. Privacy customers paying $5 per month.
Companion blocks persistent cookies, in particu-
lar those that go to external sites, and costs noth- 58 SafeWeb, http://www.safeweb.com (explains
ing to download and use. that the SafeWeb service provides anonymous
surfing and protection from “profiling” cookies).
51. Mark Sweeny, “Accept Cookies by Site,” PC SafeWeb allows unlimited free use of its service.
Magazine, February 1, 2000, http://www.zdnet.
com/pcmag/stories/solutions/0,8224,2430351,00. 59. U.S. Senate Judiciary Committee, “Know the
htm. CookieCop version 1.2 filters cookies by site Rules Use the Tools—Privacy in the Digital Age: A
and can be downloaded and used free of charge. Resource for Internet Users,” 2000, pp. 10–21,
http://judiciary.senate.gov/privacy.htm (catalogs
52. WebWasher, “Welcome to WebWasher,” various self-help technologies for protecting pri-
http://www.webwasher.com. WebWasher is avail- vacy); see also Fox p. 10 (reporting survey results
able for home and educational use free of charge. on Internet privacy). Although the present survey
It filters both cookies and ads—including, in par- has emphasized digital tools, those tools do not
ticular, Web bugs. exhaust the range of self-help methods for pro-
tecting Internet privacy. People sorely worried
53. Junkbusters, “Bust the Junk out of Your Web about their privacy on the Internet could of
Browsing,” http://www.junkbusters.com/ht/en/ course simply stop using it. Less drastically, and
ijb.html (offering free download of Internet probably more commonly, they might lie about
Junkbuster and claiming that the software stops personal information when asked by a Web site to
unauthorized cookies and prevents the disclosure register. Pew pollsters found that 24 percent of
of other information about browsing behavior). Internet users reported having given false person-
al information to a Web site. See Randy Cohen,
54. Guidescope, “Take Control of the Web: Surf “The Ethicist,” New York Times Magazine, June 4,
Faster, Safer and Easier” http://www.guidescope. 2000 (gives amusing advice on how to ameliorate
com/home. Guidescope blocks ads, Web bugs, the apparent immorality of that self-help method
and referrer information, thereby protecting its by typing in your protest: “‘This question is intru-
users against distribution of certain types of sive.’ You’ll gain access to the site, and the propri-
information about their browsing activities. etor will understand your objection and have a
Individual consumers can download and use chance to change his ways”). See Plaintiff’s
Guidescope free of charge. Second Amended Verified Original Petition and
Application for Temporary Restraining Order
55. Idcide, “Get the Idcide,” http://www.idcide. and Temporary Injunction, Universal Image Inc. v.
com/html/Support/faq.htm. In its “medium pri- Yahoo, Inc., No. 99-13839-A18, 20 (County Ct.,
vacy” mode, Privacy Companion allows you to Dallas County, Tex., filed Jan. 18, 2000), http://
receive personalized services from the site you are legal.web.aol.com/decisions/dlpriv/univtro2. pdf.
visiting while blocking tracking by external sites. To judge from one somewhat extraordinary com-
IDcide’s patent-pending technology is designed plaint, Internet users aggravated that Web sites
to distinguish between persistent cookies sent to use cookies could even bring suit for trespass,
the site you are visiting and persistent cookies theft, and criminal stalking.

11
60. But see Ann Bartow, “Our Data, Ourselves: 68. U.S. West, p. 1238. But see Trans Union Corp. v. FTC,
Privacy, Propertization, and Gender,” University of 2001 U.S. App. LEXIS 6241, *22-*23 (D.C. Cir. 2001)
San Francisco Law Review 34 (2000): 679 (states (No. 00-1141) (denying petition to review FTC deter-
that average Web users might be able to imple- mination that Fair Credit Reporting Act barred sale of
ment some types of self-help but worries that Web names and addresses for target marketing purposes).
sites will condition access on receipt of private Trans Union stands on shaky ground. The court
information); Prepared Remarks of Debra A. stretched Dun & Bradstreet, Inc. v. Greenmoss Builders,
Valentine, general counsel of the FTC, Computer Inc., 472 U.S. 749 (1985)—a case concerning injurious
and High Technology Law Journal 16 (2000): 417 falsehoods—to find that the target marketing lists in
(complains that such “self-help requires consider- question warranted “reduced constitutional protec-
able consumer education and sophistication and tion.” Trans Union, 2001 LEXIS at *23, quoting Dun &
may well fail to protect consumers against sur- Bradstreet, p. 762, n. 8. Notably, only three justices
reptitious privacy invasions or identity theft”). signed on to that portion of Dun & Bradstreet, and even
they emphasized that they did not intend to “leave all
61. See Playboy, p. 1892. (“It is no response that credit reporting subject to reduced First Amendment
voluntary blocking requires a consumer to take protection.”
action, or may be inconvenient, or may not go
perfectly every time”). 69. Fred H. Cate, “Privacy and Telecommuni-
cations,” Wake Forest Law Review 33 (1998): 47
62. See generally, Eugene Volokh, “Freedom of (“The most effective protection for information
Speech and Information Privacy: The Troubling privacy is individual responsibility and action.”).
Implications of a Right to Stop People from
Speaking about You,” Stanford Law Review 52 70. But see Froomkin, pp. 1502–06 (arguing that
(2000): 1049 (provides a more complete applica- because consumers suffer from privacy myopia, they
tion of First Amendment principles to proposed sell their data too often and too cheaply). Citing a
information privacy); see also Julie A. Cohen, dearth of empirical data, Froomkin admits to assum-
“Examined Lives: Information Privacy and the ing a consumer’s aggravation over others’ profiles of
Subject as Object,” Stanford Law Review 52 (2000): him will outweigh the aggregate value of the goods
1409–23 (discussing First Amendment as it relates and services won by his various small sacrifices of per-
to data privacy); and Solveig Singleton, “Privacy as sonal information. Here, as with other markets, how-
Censorship: A Skeptical View of Proposals to ever, why would their revealed preferences not tell us all
Regulate Privacy in the Private Sector,” Cato we need to know about what consumers, as a class,
Institute Policy Analysis no. 295, January 22, 1998, really want?
http://www.cato.org/pubs/pas/pa-295.html.
71. John Schwartz, “‘Opting-in’: A Privacy
63. A. Michael Froomkin, “The Death of Privacy?” Paradox,” Washington Post, September 3, 2000, p. H1
Stanford Law Review 52 (2000): 1521 (states that (describing LifeMinders Inc., a service that has per-
government’s ability to regulate privately generat- suaded 18 million Internet users to offer it person-
ed speech relating to commerce is surprisingly al information such as the birth dates of their fam-
unlitigated). ily and friends, the vehicles they drive, and the
names of their pets, which information it openly
64. Volokh, pp. 1080–84 (discussing the commer- resells to third parties, all in return for receiving
cial speech doctrine). But see Cohen, p. 1418 (stat- reminders of upcoming events, pet care tips, tar-
ing that the “accumulation, use, and market geted advertising, and so forth).
exchange of personally identifiable data . . . aren’t
really ‘speech’ at all”). Cohen admits, however, 72. Cohen, pp. 1393–96 (critiquing the legitimacy
that extant case law has treated such acts as com- of choice in nonpolitical contexts about personal
mercial speech (p. 1410). privacy).

65. See generally, U.S. West, Inc. v. FCC, 182 F.3d 73. Fox, p. 28. When Pew pollsters asked, “Who
1224 (10th Cir. 1999), cert den sub nom; and should have the MOST say over how Internet com-
Competition Policy Inst. v. U S West, Inc., 120 S. Ct. panies track people’s activities online and use per-
2215 (2000) (treating speech within or by com- sonal information?” 68 percent of respondents
mercial entities and about telephone users as replied “People who use Web sites.” Only 19 per-
commercial speech). cent of respondents chose the federal government
and only 6 percent chose Internet companies.
66. Central Hudson Gas & Electric Corp. v. Public Service
Commission of New York, 447 U.S. 557, 566 (1980). 74. 15 U.S.C.A. §6502 (West 2000).

67. 44 Liquormart, Inc. v. Rhode Island, 517 U.S. 484, 75. Lynne Burke, “Contending with COPPA
507–08 (1996). Confusion,” Wired News, August 23, 2000, http://

12
www.wired.com/news/politics/0,1283,38332,00. www.wired.com/news/politics/0,1283,37314,00.
html (quoting Alex Bentacur, vice president of html (reporting dozens of federal Web sites contin-
girl’s clothing site 100percentgirls.com, “The law, ued to violate the White House’s privacy directive
which we support completely, is so unclear”). by continuing to use “cookies” on their Web sites).

76. Carolyn Duffy Marsan, “Net Privacy Law Costs a 81. U.S. General Accounting Office, “Internet
Bundle,” CNN.com, May 16, 2000, http://www.cnn. Privacy: Agencies’ Efforts to Implement OMB’s
com/2000/TECH/computing/05/16/privacy.bill. Privacy Policy,” 11 (GAO/GGD-00-191) September
idg/index.htm (relating high costs of complying with 2000, http://www.gao.gov/new.items/gg00191.pdf
COPPA and effects on market). (assessing conformity with Office of Management
and Budget requirements). It has also been reported
77. Tamara Loomis, “Lawyers Wrestle with Online that nearly half of federal Web sites collecting per-
Privacy,” New York Law Journal, July 13, 2000, http:// sonal information failed to post privacy policies,
www.nylj.com/stories/00/07/071300a4.htm (relating thereby arguably violating OMB requirements. .
that some companies have left the market rather than
incur costs of complying with COPPA). 82. See Darrell West, “Assessing E-Government: The
Internet, Democracy, and Service Delivery by State and
78. 5 U.S.C.A. § 552a (West 2000) (specifying lim- Federal Governments,” September 2000, http://
its on power of federal agencies to collect and use www.brown.edu/Departments/Taubman_Center/
information about individuals); see also Marc polreports/egovtreport00.html (reporting that of
Rotenberg, “Letter to Congressional Leaders Out- 1,716 state government sites, 36 federal sites, and 61
lines Risks of Web Tracking Technologies,” June federal court sites, only 5 percent had a security policy
22, 2000, http://www.epic.org/privacy/internet/ and only 7 percent a privacy policy).
cookiegate_pr.html (suggesting that use of cook-
ies by federal agencies violates Privacy Act). 83. McCullagh (quoting Erick Gustafson, direc-
tor of technology policy at Citizens for a Sound
79. Jacob J. Lew, Memorandum for the Heads of Economy, on failure of federal agencies to follow
Executive Departments and Agencies, Re: Privacy White House directives and Privacy Act of 1974).
Policies and Data Collection on Federal Web Sites (“It’s typical. Governments think the rules don’t
, June 22, 2000, http://www.whitehouse.gov/ apply to them. They’re historically the worst
omb/memoranda/m00-13.html (forbidding use offenders of privacy and the rights of citizens.”)
of cookies by federal Web sites absent clear and
conspicuous notice, compelling need to gather 84. Pollack (describing the inefficiencies inherent
data, appropriate and publicly disclosed privacy in government regulation).
safeguards for handling collected information,
and personal approval by agency head). 85. Fred H. Cate, “Principles of Internet Privacy,”
Connecticut Law Review 32 (2000): 889–91 (enunci-
80. Declan McCullagh, “Feds’ Hands Caught in ating reasons for preferring private, market-based
Cookie Jar,” Wired News, June 30, 2000, http:// solutions to Internet privacy).

Published by the Cato Institute, Cato Briefing Papers is a regular series evaluating government policies and
offering proposals for reform. Nothing in Cato Briefing Papers should be construed as necessarily reflecting
the views of the Cato Institute or as an attempt to aid or hinder the passage of any bill before Congress.
Additional copies of Cato Briefing Papers are $2.00 each ($1.00 in bulk). To order, or for a complete listing of
available studies, write the Cato Institute, 1000 Massachusetts Avenue, N.W., Washington, D.C. 20001, call
(202) 842-0200 or fax (202) 842-3490. Contact the Cato Institute for reprint permission.

13

You might also like