Advertisement

Engineering Privacy on the Scaffolds: An Existentialist Examination of Privacy by Design

  • Kristen Psaty
Chapter
Part of the Philosophy of Engineering and Technology book series (POET, volume 31)

Abstract

What is digital privacy and who in society should be responsible for protecting it? This paper considers the challenges in defining digital privacy as well as the newest movement in privacy law and regulation, the concept of “privacy by design,” which calls upon engineers to integrate privacy into technology throughout the construction process. This paper seeks to advance two objectives. First, it turns the focus of inquiry to the experience and decision-making process of the engineer. Through a combination of contemporary technological thought, an existential philosophical lens, and an informed legal perspective, this paper seeks to understand the relationship between the computer engineer, the user, and privacy. Second, this paper hopes to add to the philosophical debate surrounding the contours of privacy as it relates to the engineer’s role in forging it. This analysis seeks to reveal, in part, the nature of privacy and the necessary conditions for its implementation in technology.

Keywords

Engineering for people Privacy by design problems 

Notes

Acknowledgments

Thank you to the gamut of engineers interviewed in the process of writing this piece. Special thanks to George Jakobsche for sparking my love of technology law, to Greg Pemberton for stoking it, to Santa Clara University School of Law High Technology Law Institute for fostering it, and to my readers Karl Bozicevic, Kyle Psaty, Celine Purcell, Evan Selinger and Andrew Watts. Deep and humble thanks to Jill Gordon, Lydia Moland, Valiere Dionne, and the Colby College Philosophy Department.

References

  1. Carnegie Mellon University. (2017) Master of science in information technology in privacy engineering. http://privacy.cs.cmu.edu/. Accessed 1 Feb 2017.
  2. Cavoukian, A. (2010). Privacy by design resolution. Resource document. 32nd international conference of data protection and privacy comissioners. https://www.ipc.on.ca/site_documents/pbd-resolution.pdf. Accessed 15 Oct 2016.
  3. Clark, K. (2015). The EU safe harbor agreement is dead, here’s what to do about it. Resource document. Forbes. http://www.forbes.com/sites/riskmap/2015/10/27/the-eu-safe-harbor-agreement-is-dead-heres-what-to-do-about-it/#5401f2971719. Accessed 15 Oct 2016.
  4. Cook, T. (2016). A message to our customers. http://www.apple.com/customer-letter/. Accessed 15 Oct 2016.
  5. Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M., & Smith, R. (2013). Privacy considerations for internet protocols: RFC 6973. Resource document. Datatracker. https://datatracker.ietf.org/doc/rfc6973/?include_text=1. Accessed 15 Oct 2016.
  6. Federal Trade Commission. (2016). Tech company settles FTC charges it unfairly installed apps on android mobile devices without users’ permission. https://www.ftc.gov/news-events/press-releases/2016/02/tech-company-settles-ftc-charges-it-unfairly-installed-apps. Accessed 1 Feb 2017.
  7. Hustinx, P. (2010). Privacy by design: Delivering the promises. Resource document. Identity in the information society. https://www.ipc.on.ca/english/privacy/introduction-to-pbd/. Accessed 15 Oct 2016.
  8. IAB. (2016). Internet architecture board. https://www.iab.org/. Accessed 15 Oct 2016.
  9. Jefferson, T., & Tompkinson, H. (1816). Quotations on the Jefferson memorial. Resource document. Library of Congress. https://www.monticello.org/site/jefferson/quotations-jefferson-memorial. Accessed 15 Oct 2016.
  10. Lomas, N. (2017). Trump order strips privacy rights from non-U.S. Citizens, could Nix EU-US data flows. Tech Crunch. https://techcrunch.com/2017/01/26/trump-order-strips-privacy-rights-from-non-u-s-citizens-could-nix-eu-us-data-flows/. Accessed 1 Feb 2017.
  11. Perez-Pena, R., & Schmidt, M. S. (2015). F.B.I. treating San Bernadino attack as terrorism case. Resource document. New York Times. http://www.nytimes.com/2015/12/05/us/tashfeen-malik-islamic-state.html?_r=0. Accessed 15 Oct 2016.
  12. Rubin, J., Queally, J., & Paresh, D. (2017). FBI unlocks San Bernardino shooter’s iPhone and ends legal battle with Apple, for now. Los Angeles Times. http://www.latimes.com/local/lanow/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html. Accessed 1 Feb 2017.
  13. Sartre, J. P. (1992a). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 343.Google Scholar
  14. Sartre, J. P. (1992b). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 350–357.Google Scholar
  15. Sartre, J. P. (1992c). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 340.Google Scholar
  16. Sartre, J. P. (1992d). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 354.Google Scholar
  17. Sartre, J. P. (1992e). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 302.Google Scholar
  18. Sartre, J. P. (1992f). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 303.Google Scholar
  19. Sartre, J. P. (1992g). Being and nothingness: A phenomenological essay on ontology (Barnes, H. E., Trans.). New York: Washington Square Press, p. 347.Google Scholar
  20. Scott, M. (2015). Data transfer pact between U.S. and Europe is ruled invalid. Resource document. New York Times. http://www.nytimes.com/2015/10/07/technology/european-union-us-data-collection.html?_r=0. Accessed 15 Oct 2016.
  21. The International Trade Administration, U.S. Department of Commerce. (2016). Privacy shield framework, “Privacy shield overview”. https://www.privacyshield.gov/Program-Overview. Accessed 1 Feb 2017.
  22. The White House Office of the Press Secretary. (2017). Executive order: Enhancing public safety in the interior of the United States. https://www.whitehouse.gov/the-press-office/2017/01/25/presidential-executive-order-enhancing-public-safety-interior-united. Accessed 1 Feb 2017.
  23. U.S. Department of Health & Human Services. (2016). Fact sheet: Ransomware and HIPPA. https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf. Accessed 1 Feb 2017.

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Kristen Psaty
    • 1
  1. 1.Privacy and Public PolicyFacebookMenlo ParkUSA

Personalised recommendations