{"id":14903,"date":"2019-03-22T10:45:14","date_gmt":"2019-03-22T18:45:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/22\/news-8652\/"},"modified":"2019-03-22T10:45:14","modified_gmt":"2019-03-22T18:45:14","slug":"news-8652","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/22\/news-8652\/","title":{"rendered":"Utah Just Became a Leader in Digital Privacy"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c93dc54d4c40803eec4442f\/master\/pass\/Utah-Legislature-FA-977421882.jpg\"\/><\/p>\n<p><strong>Credit to Author: Molly Davis| Date: Fri, 22 Mar 2019 12:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">With so much <\/span>of our lives lived online, people have often assumed that the pictures, financial documents, and other sensitive information we store on our password-protected phones and computers are kept private. But every day, it seems there\u2019s a new <a href=\"https:\/\/www.wired.com\/story\/wired-guide-to-data-breaches\/\">data breach<\/a>, or another story about our information being passed around in ways we couldn\u2019t imagine.<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\"><a href=\"https:\/\/twitter.com\/_Molly_Davis_\" target=\"_blank\">Molly Davis<\/a> is a policy analyst at Libertas Institute, a policy think tank in Utah. She&#x27;s a writer for <a href=\"https:\/\/young-voices.com\/\" target=\"_blank\">Young Voices<\/a>, and her work has previously appeared in <em>The Hill, the Washington Examiner,<\/em> and the <em>Salt Lake Tribune<\/em>.<\/p>\n<p class=\"paywall\">As a result, there\u2019s been an emerging public distrust in the platforms that hold so much of this information, and increased interest by federal and state legislators on how to protect the public\u2019s privacy. So far, government <a href=\"https:\/\/www.washingtonpost.com\/business\/understanding-the-facebook-cambridge-analytica-story-quicktake\/2018\/04\/11\/071f8c84-3d97-11e8-955b-7d2e19b79966_story.html?utm_term=.3e4e4f148021\" target=\"_blank\">focus<\/a> has primarily been on protecting consumer information from intrusive collection by private companies. California passed sweeping <a href=\"https:\/\/www.wired.com\/story\/california-unanimously-passes-historic-privacy-bill\/\">legislation<\/a> in 2018 to protect consumer privacy. That same year, the Vermont legislature passed a law to regulate data brokers. Both <a href=\"http:\/\/sdc.wastateleg.org\/carlyle\/2019\/02\/14\/senate-committee-unanimously-approves-consumer-data-privacy-act\/\" target=\"_blank\">Washington<\/a> and <a href=\"https:\/\/malegislature.gov\/Bills\/191\/SD341\" target=\"_blank\">Massachusetts<\/a> are considering consumer data privacy bills.<\/p>\n<p class=\"paywall\">While these measures are certainly important, protecting private information from law enforcement invasion\u2014not just private industry\u2014also merits urgency. And with <a href=\"https:\/\/www.facebook.com\/libertasutah\/videos\/2019814998310810\/\" target=\"_blank\">pressure from<\/a> Libertas Institute and the ACLU of Utah, the Utah Legislature is taking steps toward that very thing. On March 12, Utah legislators voted unanimously to pass landmark legislation in support of a <a href=\"https:\/\/le.utah.gov\/~2019\/bills\/static\/HB0057.html\" target=\"_blank\">new privacy law<\/a> that will protect private electronic data stored with third parties like Google or Facebook from free-range government access. The bill stipulates that law enforcement will be required to obtain a warrant before accessing \u201ccertain electronic information or data.\u201d (Unlike consumer privacy laws, the bill does not give individuals the ability to see the information that companies collect on them, and doesn\u2019t regulate how personal data is used internally.) The bipartisan bill is expected to go to Governor Gary Herbert\u2019s desk for final approval next week. If he signs the bill, Utah will be the first state in the nation to lawfully protect the electronic information that individuals entrust to third parties.<\/p>\n<p class=\"paywall\">On the federal level, and in every state aside from Utah, law enforcement can access your information through third-party channels, with no real standard of <a href=\"https:\/\/www.justsecurity.org\/47460\/carpenter-supreme-court-ready-revise-party-doctrine\/\" target=\"_blank\">accountability.<\/a> This is because of the &quot;third party doctrine&quot; which is a <a href=\"https:\/\/ualr.edu\/socialchange\/2018\/04\/04\/mixed-signals-analysis-third-party-doctrine-applied-warrantless-collection-historical-cell-site-location-information\/\" target=\"_blank\">legal theory<\/a> created when the Supreme Court held that individuals have no reasonable expectation of privacy when they share their data with a third party. This means the government can access anything from innocent photographs to important medical or financial documents one might store on an app. They can access a person\u2019s information so long as the company is willing to share\u2014a loose practice that could easily be abused.<\/p>\n<p class=\"paywall\">In the courts, third-party data protections have made some progress. Last summer, the Supreme Court narrowly ruled in <a href=\"https:\/\/www.supremecourt.gov\/opinions\/17pdf\/16-402_h315.pdf\" target=\"_blank\"><em>Carpenter v United States<\/em><\/a> to uphold third-party data privacy. The five-to-four decision said that law enforcement could no longer access a person\u2019s cell phone location data from a third-party phone provider like Verizon or AT&amp;T without first obtaining a warrant. This ruling was significant, but it didn\u2019t do much beyond protecting location data. Banking information, texts, emails, and all other phone data is still up for grabs. That\u2019s why Chief Justice John Roberts, who authored the <a href=\"https:\/\/www.supremecourt.gov\/opinions\/17pdf\/16-402_h315.pdf\" target=\"_blank\">majority opinion<\/a>, encouraged state legislatures to pass their own legal protections. In his words, \u201clegislation is much preferable to the development of an entirely new body of Fourth Amendment case law.\u201d Utah took his advice and did just that.<\/p>\n<p class=\"paywall\">And they did it right, too.<\/p>\n<p class=\"paywall\">Rather than wait for court action, Utah legislators passed this latest privacy law, which requires law enforcement to obtain a warrant with probable cause in order to access any electronic data held by a third party, at least in most cases. There are legal exceptions to the warrant requirement in the bill\u2014emergency situations or data which appear to be involved with committing a felony or a misdemeanors involving physical violence, sexual abuse, or dishonesty. Even with these potentially problematic exceptions, the bill is certainly better than no protections at all.<\/p>\n<p class=\"paywall\">Prosecutors and law enforcement may argue they need the power of data collection to protect the public from potential criminals. But individual liberty protections are far more important than perceived safety risks. If there is a legitimate safety concern requiring access to a person&#x27;s data, law enforcement will still be able to obtain a warrant. Without that warrant requirement in place, private data is left vulnerable to fishing expeditions that are rife for abuse.<\/p>\n<p class=\"paywall\">Unfortunately, the rest of America is lagging behind Utah\u2019s progress. Without specific laws to address new technology, courts are left to make loose constitutional interpretations. But as Chief Justice Roberts implied in <em>Carpenter<\/em>, we can\u2019t wait for the courts to decide the fate of our rights. Because privacy laws pertaining to third-party data don\u2019t yet exist outside of Utah, this new legislation should encourage other states to take action, and stop government from prying into the private lives of their people.<\/p>\n<p class=\"paywall\">WIRED Opinion <em>publishes pieces written by outside contributors and represents a wide range of viewpoints. Read more opinions <a href=\"https:\/\/www.wired.com\/opinion\">here<\/a>. Submit an op-ed at\u00a0opinion@wired.com<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">Agent Topple reveals a few tricks of the pre-digital trade when Winters attempts to explain to him how computers work. Agent Topple is Not Impressed.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/utah-digital-privacy-legislation\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c93dc54d4c40803eec4442f\/master\/pass\/Utah-Legislature-FA-977421882.jpg\"\/><\/p>\n<p><strong>Credit to Author: Molly Davis| Date: Fri, 22 Mar 2019 12:00:00 +0000<\/strong><\/p>\n<p>Opinion: Utah legislators recently voted to pass landmark legislation in support of a new privacy law. Statehouses across the country should take notes. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[234,714],"class_list":["post-14903","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-opinion","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14903"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14903\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14903"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}