Follow Us Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Privacy Technology Media and Telecom

Can You Hear Me Now? — Privacy of Discussions

This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.


Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Reading about the law and information technology these days, you come across a remarkable number of stories describing and discussing IT and privacy. What is fascinating about many of the articles is what information or actions are considered to be “private.” Many judicial opinions, for example, concern law enforcement obtaining cell site location information (CSLI) from cell providers and other sources in order to track the movements of a subject of investigation (CSLI is discussed in greater detail and these opinions infra) and the privacy interests that prevent law enforcement from simply getting the data from providers or creating the data through its own tracking or interception of cell tower information. Other opinions and legal discussions concern what privacy interest a creator or recipient of a digital file (e.g., an email, a Word document) has in that file if it is stored by a third party, as is increasingly the case with cloud storage, particularly as it has come to be relied upon in the age of the pandemic. Still other legal discussions concern the privacy rights of persons whose movements (not spoken words) are captured by surveillance cameras: the single camera outside a building and controlled by the building’s resident or director; cameras in many, or every, room in the building; cameras installed and controlled by law enforcement that survey public streets and other public areas. There are many other contexts in which privacy interests in information accessed by, transmitted by or stored in IT are discussed.

To continue reading,
become a free ALM digital reader

Benefits include:

*May exclude premium content

Read These Next