17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

188<br />

Solutions<br />

tend <strong>the</strong>m <strong>to</strong> be <strong>the</strong>re only for our own use—<strong>it</strong> is important <strong>to</strong> export <strong>the</strong> values<br />

<strong>of</strong> privacy against government intrusion along w<strong>it</strong>h <strong>the</strong>m. For remotely<br />

s<strong>to</strong>red data, this suggests lim<strong>it</strong>ing <strong>the</strong> holdings like that <strong>of</strong> SEC v. Jerry T.<br />

O’Brien, Inc. <strong>to</strong> financial records held by brokers similar <strong>to</strong> <strong>the</strong> ones in that case,<br />

ra<strong>the</strong>r than extending <strong>the</strong> relaxation <strong>of</strong> Fourth Amendment protections <strong>to</strong> all<br />

cases <strong>of</strong> third-party cus<strong>to</strong>dy <strong>of</strong> personal information. The balance <strong>of</strong> accessibil<strong>it</strong>y<br />

for financial transactions need not be <strong>the</strong> same as that for our most personal<br />

communications and data. This is a reasonable lim<strong>it</strong> <strong>to</strong> draw when <strong>the</strong> physical<br />

borders <strong>of</strong> one’s home no longer correlate well w<strong>it</strong>h <strong>the</strong> dig<strong>it</strong>al borders <strong>of</strong> one’s<br />

private life. Indeed, <strong>it</strong> is simply extending <strong>the</strong> protections we already enjoy <strong>to</strong><br />

f<strong>it</strong> a new technological configuration. That is <strong>the</strong> spir<strong>it</strong> <strong>of</strong> Chapman v. Un<strong>it</strong>ed<br />

States, 59 in which a police search <strong>of</strong> a rented house for a whiskey still was found<br />

<strong>to</strong> be a violation <strong>of</strong> <strong>the</strong> Fourth Amendment rights <strong>of</strong> <strong>the</strong> tenant, desp<strong>it</strong>e <strong>the</strong> fact<br />

that <strong>the</strong> landlord had consented <strong>to</strong> <strong>the</strong> search. 60 The Court properly refused <strong>to</strong><br />

find that <strong>the</strong> right against intrusion was held only by <strong>the</strong> absentee owner <strong>of</strong> <strong>the</strong><br />

place intruded—ra<strong>the</strong>r, <strong>it</strong> was held by <strong>the</strong> person who actually lived and kept<br />

his effects <strong>the</strong>re. Similarly, <strong>the</strong> data we s<strong>to</strong>re for ourselves in servers that o<strong>the</strong>rs<br />

own ought <strong>to</strong> be thought <strong>of</strong> as our own papers and effects in which we have a<br />

right <strong>to</strong> be secure.<br />

There is some suggestion that <strong>the</strong> courts may be starting <strong>to</strong> move in this direction.<br />

In <strong>the</strong> 2007 case Warshak v. Un<strong>it</strong>ed States, <strong>the</strong> U.S. Court <strong>of</strong> Appeals<br />

for <strong>the</strong> Sixth Circu<strong>it</strong> held that <strong>the</strong> government’s warrantless attempt <strong>to</strong> seize<br />

e-mail records through an ISP w<strong>it</strong>hout notice <strong>to</strong> <strong>the</strong> account holder violated<br />

Fourth Amendment privacy rights. 61 At <strong>the</strong> time <strong>of</strong> wr<strong>it</strong>ing, <strong>the</strong> ruling stands,<br />

though <strong>it</strong> faces fur<strong>the</strong>r review. 62<br />

The abil<strong>it</strong>y <strong>to</strong> s<strong>to</strong>re nearly all one’s data remotely is an important and helpful<br />

technological advance, all <strong>the</strong> more so because <strong>it</strong> can still be made <strong>to</strong> appear <strong>to</strong><br />

<strong>the</strong> user as if <strong>the</strong> data were s<strong>it</strong>ting on his or her own personal computer. But this<br />

suggests that <strong>the</strong> happenstance <strong>of</strong> where data are actually s<strong>to</strong>red should not<br />

alone control <strong>the</strong> const<strong>it</strong>utional assessment <strong>of</strong> which standard <strong>the</strong> government<br />

must meet.<br />

BALANCING GENERATIVE AND NON-GENERATIVE SYSTEMS<br />

Code thickets<br />

A number <strong>of</strong> scholars have wr<strong>it</strong>ten about <strong>the</strong> drawbacks <strong>to</strong> proprietary rights<br />

thickets: overlapping claims <strong>to</strong> intellectual property can make <strong>it</strong> difficult for

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!