Jump to content

Information Technology and Ethics/Privacy in the News

From Wikibooks, open books for an open world

Apple

[edit | edit source]

Apple Inc. has been in the headlines multiple time for privacy issues dealing with both government actions and a class action lawsuit. Due to the nature of their products Apple has made an effort to ensure that their customers’ data is protected beyond the industry standard, which includes a level of data protection that has frustrated federal attempts to retrieve data pertinent to investigations. Additionally, in the many class action lawsuits brought against Apple, two in particular pertain specifically to privacy, and set a fairly prominent precedent in the industry.

Class Action Suits

[edit | edit source]

In 2010 two class action lawsuits, later consolidated into one case by the courts, were filed against Apple and several other parties [1]. These suits claimed that the app makers whose apps were collecting data about the users, were passing the information to third parties without permission from the users [1]. This data included among other things geolocation data, which is considered to be incredibly valuable [2]. Because of this value the plaintiffs sued not only for the defendants to change their activities, but also for monetary compensation [1]. In 2011 Apple filed a motion to dismiss for lack of Article III standing, which was granted by the court (https://scholar.google.com/scholar_case?case=11552215207215157219).

Stengart v. Loving Care Agency, Inc. The plaintiff Marina Stengart (former employee now) was having her emails exchanged with her attorney via her personal web-based email account. The communication was being done on her employer-given computer which, as a result, contains a monitoring system that saves every web page visited on the computer. After Stengart had left the company, she then filed a suit against the company for invading employee privacy. The company had retrieved the emails between Stengart and the attorney that were being used in the litigation. Stengart argued that the company cannot reveal the emails during the litigation because the emails between her and the attorney were private.The court found that the policy disclosure failed to inform employees that the company could have visibility over personal web-based email accounts. The policy also did not state that the company would be monitoring content of email communication made through employee’s personal email while being done on company-given computers. While the court was in favor to Stengart, it suggested that if employers wished to look over a computer that contained emails in personal email accounts, then the employers will need to inform employees with a clear and specific message that such a policy exists.

Robert G. Ozer v. Borquez The employee was a homosexual in which he had let his employer know that his partner was diagnosed with Acquired Immune Deficiency Syndrome (AIDS). The employer had disclosed the confidential information to other employees and one week later, the employee was fired. The employee filed a suit against the employer stating that the employer had wrongfully discharged him and invaded his privacy. These actions made by the employer violated Colorado lawful activities making it unfair and employee’s lawful incidents outside the workplace. The employer revealed private information about the employee which he requested to be kept confidential. The jury held in favor of the employee for violation of right to privacy.

Via v. Taylor A former employee of the Delaware Department of Correction states that the employer had wrongfully terminated the employee as a result of her off-duty relationship with a paroled former inmate. The Department of Corrections has a policy that does not allow employees to have any sort of interactions with offenders outside of work. The plaintiff requested a Motion for Reinstatement along without any loss of salary or rank since her unlawful termination from the defendant. The defendant in response said that the plaintiff is not allowed to be reinstated because she was let go due to “insubordination” and if reinstated could have the plaintiff be in a dangerous precedent, and the position has been already filled. The court finds that they are in favor of plaintiff since the defendant failed to show any evidence of aversion between the plaintiff and those she worked with, so the plaintiff is entitled to full reinstatement.


Then again in 2014 Chen Ma, represented by the Law Offices of Adam Wang, filed a class action lawsuit against Apple on behalf of over 100 million users [3]. Ma claimed that the Terms of Service did not allow for Apple to be able to collect the length of time which users spent at various locations [4]. The case was voluntarily dropped by Ma and Wang in 2015 [5].

Government Action

[edit | edit source]

In 2016 the federal courts attempted to use the All Writs Act to compel Apple to create a program which could override the security measures in iOS devices in an effort to retrieve evidence from the phone of a member of a terrorist attack [6]. In a response to this demand Apple CEO Tim Cook issued an open letter to the public explaining the situation, and explaining why he would insist on not complying with the request [7]. The debate over the issue extended beyond simply unlocking one phone, and entailed whether or not this would give the government master-key access to every iOS device in circulation [8]. In March of 2016 the federal courts released a statement revealing that they had acquired access to the information on the device without Apple’s assistance, but instead that of Cellbrite, an Israeli tech firm [9]. On April 14th 2016 Apple received the vulnerability report from the FBI according to the Vulnerabilities Equities Process [10].

WikiLeaks

[edit | edit source]

In recent years, Wikileaks is one of the biggest mainstream breaches of cyber privacy around the world. Wikileaks is similar to other privacy breaches in recent news, notably the Edward Snowden controversy, in that they mostly focus on government misconduct. Wikileaks is a website founded by an Australian man named Julian Assange. Assange states that the website is dedicated to publishing and commenting on leaked documents alleging government and corporate misconduct and to this day has over 90,000 published documents ranging from both U.S and British action during the Afghanistan War to operating procedures of Guantanamo bay to classified military documents. The website first got mainstream attention in 2006 when it was created as a platform for whistleblowers to post sensitive information while remaining anonymous and has evolved into what it is today. The first major controversy that included Wikileaks occurred in 2008 when they exposed Swiss banker, Julius Baer, for money laundering and provided documentation to confirm their claim[11]. Then, in 2010, Wikileaks had published a video of U.S. military helicopter strike on Baghdad which resulted in the arrest of the American soldier, Bradley Manning. Throughout these years and continuing to 2012, Wikileaks reported on the Afghanistan War and published a large amount of classified documents including diplomatic cables involving the United States[12] and written accounts from soldiers in the war claiming that the U.S. had ignored potential cases of torture by Iraqi authorities on civilians. The founder of Wikileaks, Julian Assange, also went on to write a book titled, “When Google Met Wikileaks,” in which he recounts an interview he had with Google. In this, he reveals why he founded wikileaks stating, “I looked at something that I had seen going on with the world, which is that I thought there were too many unjust acts. And I wanted there to be more just acts, and fewer unjust acts,” and he thought that the best way to change that would be to give the people a small amount of information in the hopes to change the behavior of people that now have this information[13]. [14] [15] [16]



Robert G. Ozer v. Borquez


References

[edit | edit source]
  1. a b c MUKHERJEE, SUPANTHA, and SAQIB IQBAL AHMED. "Apple Sued over Apps Privacy Issues; Google May Be next." Reuters. Thomson Reuters, 28 Dec. 2010. Web. http://www.reuters.com/article/us-apple-lawsuit-idUSTRE6BR1Y820101228.
  2. "Apple Slammed over IPhone, IPad Location Tracking." Washington Times. The Washington Times, 21 Apr. 2011. Web. http://www.washingtontimes.com/news/2011/apr/21/apple-slammed-over-iphone-ipad-location-tracking/.
  3. "Apple Hit with IPhone Tracking Class Action Lawsuit." Top Class Actions. N.p., 25 July 2014. Web. https://topclassactions.com/lawsuit-settlements/lawsuit-news/35271-woman-files-iphone-tracking-class-action-lawsuit/.
  4. "Apple Hit with IPhone Tracking Class Action Lawsuit." Top Class Actions. N.p., 25 July 2014. Web. https://topclassactions.com/lawsuit-settlements/lawsuit-news/35271-woman-files-iphone-tracking-class-action-lawsuit/.
  5. Kearn, Rebekah. "Friday, January 09, 2015Last Update: 7:32 AM PT." Courthouse News Service. Courthouse News Service, 9 Jan. 2015. Web. 27 Apr. 2016. http://www.courthousenews.com/2015/01/09/class-drops-snooping-lawsuit-against-apple.htm.
  6. Order Compelling Apple Inc. to Assist Agents in Search (Central District of California February 16, 2016).
  7. Cook, T. (2016, February 16). Customer Letter - Apple. Retrieved February 18, 2016, from http://www.apple.com/customer-letter/).
  8. Opsahl, K. (2016, February 17). EFF to Support Apple in Encryption Battle. Retrieved February 18, 2016, from https://www.eff.org/deeplinks/2016/02/eff-support-apple-encryption-battle
  9. Tibken, Shara. "Feds Get Data off Terrorist's IPhone without Apple's Help." CNET. CNet, 28 Mar. 2016. Web. <http://www.cnet.com/news/feds-unlock-iphone-5c-used-by-san-bernardino-terrorist-dont-need-apple/>.
  10. Menn, Joseph. "Apple Says FBI Gave It First Vulnerability Tip on April 14." Reuters. Thomson Reuters, 26 Apr. 2016. Web. 28 Apr. 2016. http://www.reuters.com/article/us-apple-encryption-fbi-disclosure-idUSKCN0XO00T
  11. Julian Assange & Wikileaks: Timeline of Events. (2012, August 16). Retrieved February 16, 2016, from http://www.euronews.com/2012/08/16/julian-assange-and-wikileaks-timeline-of-events/
  12. Shane, S., & Lehren, A. W. (2010, November 28). Leaked Cables Offer Raw Look at U.S. Diplomacy. Retrieved February 17, 2016, from http://www.nytimes.com/2010/11/29/world/29cables.html?pagewanted=all
  13. Assange, J. (2014, December 24). JULIAN ASSANGE: WHY I FOUNDED WIKILEAKS. Retrieved February 16, 2016, from http://www.newsweek.com/julian-assange-why-i-founded-wikileaks-294283
  14. Stengart v. Loving Care Agency, 990 A.2d 650 (N.J. 2010)
  15. Robert C. Ozer, P.C. v. Borquez,. 940 P.2d 371 .
  16. Via v. Taylor, Dist. Court, D. Delaware 2004. (2004). Retrieved from https://scholar.google.com/scholar_case?case=15239067682641805119&hl=en&as_sdt=6&as_v is=1&oi=scholarr