POLICY CIRCLE BRIEF

Data Privacy and Cybersecurity

The way processing systems function means personal data online is part of regular life, as are the dangers that come with it. What exactly are the dangers of unprotected data? What are the roles of citizens, businesses, and the government when it comes to technology and data? How can these stakeholders work together to promote safe cybersecurity practices and frameworks that protect data without infringing on individual rights and freedoms?

Introduction

Do you ever feel like your smart phone is listening to you? You’re not alone: 72% of Americans believe most of their online actions on their phones and computers are tracked by advertisers and tech firms; 69% believe companies are tracking most of their offline behavior as well, such as where they are; and 80% do not believe they have control over data collected about them. Americans scored 54/100 on a digital privacy quiz about the different types of data their devices track.

The rest of the world is concerned and confused about data privacy and tracking as well. A global report on data privacy by Ipsos and the World Economic Forum found only one-third of respondents “have a good idea of how much personal data companies hold about them…or what they do with it.”

WHY IT MATTERS

At the heart of the issue of data privacy and data protection is individual freedom. America is built on the principle that no one individual or group has the right to control another individual. Today’s computing power enables companies (and governments) to intercept, layer, and analyze seemingly disparate data to draw conclusions about individuals. All digital users should understand what data privacy and protection mean and know how much data is worth; being informed allows individuals to be in control of what is shared or not shared. Individual responsibility, control, and competition amongst platforms would ensure both privacy and protection.

Putting it in Context

KEY TERMS

  • Personal data: “Any information that relates to an individual who can be directly or indirectly identified.” includes names, email addresses, location information, ethnicity, gender, biometric data, religious beliefs, web cookies, and political opinions.
  • Data processing: “Any action performed on data,” which includes but is not limited to collection, recording, organizing, and storing.
  • Data subject: Whose data it is.
  • Data controller: Who decides why and how data will be processed (usually a company).
  • Data processor: Usually 3rd party cloud servers or service providers that process personal data on behalf of data controller.
  • Data protection: Keeping data safe from unauthorized access.
  • Data privacy: Empowering citizens to make their own decisions about who can process their data and for what purpose.

(Source:GDPR)

DATA PRIVACY VS. DATA PROTECTION

Although they are sometimes used interchangeably, data privacy and protection are not the same thing, nor do they ensure each other. Data privacyrefers to who has authorized access to data and “is about what people who have collected your data lawfully can and should do with it and what control you have over that retention and use of data.” Data protection, on the other hand, refers to the unauthorized access to and use of data, such as by hackers.

PRIVACY BACKGROUND

The U.S. Constitution protects individual privacy from government intrusion, but does little to protect that privacy from actors outside the government. This applies to data as well. Data laws provide “individuals with rights over their data, imposing rules on the way in which companies and governments use data, and establishing regulators to enforce the laws.” The first data laws were established in the 1960s, when experts started predicting computing and databases that had recently been made available to the public would facilitate invasion of privacy.

As the Internet expanded, digital market opportunities grew, but crossed a threshold in the 1990s when a product called Lotus MarketPlace: Households made headlines. Advertisements claimed it contained “names, income ranges, addresses, and other information about more than 120 million Americans.” Although it was canceled before release, the world realized how common the trade of personal information had become.

Google acquired DoubleClick in 2008, and in 2016 “revised its privacy policy to permit personally-identifiable web tracking,” meaning browsing data is no longer kept separate from personal information kept by services like Gmail. Both Google and Facebook are capable of targeting ads based on your personal information.

DID YOU KNOW?

Not long after, online advertisements that targeted people based on data became a normal occurrence, although the data could not be connected to specific people. In 1999, the digital ad company DoubleClick tried to de-anonymize ads, which would connect specific users and their data, resulting in an uproar. The FTC agreed with concerned citizens this would amount to unlawful tracking, and the outcry also prompted the creation of the Network Advertising Initiative, a “self-regulatory association dedicated to responsible data collection and its use for digital advertising.” Still, data brokers today can sell data they collect from sources like public records and credit applications. Businesses running background checks and even law enforcement can turn to this data online.

Businesses and services rely on analytics coming from data sharing, data tracking, and even artificial intelligence. The devices we carry with us and install in our homes all generate data. These new ways of using technology require new ways of thinking about and protecting data. A lack of data privacy and protection opens the door for dangerous actors to take advantage of digital vulnerabilities.

 

Data Dangers: Breaches

WHAT IS AT RISK?

Ransomware attacks and data breaches are proof that data and personal information are worth a lot. Data compromised in big breaches – such as those that affected 117 million LinkedIn accounts in 2012, 3 billion Yahoo accounts in 2013, and 500 million Marriott accounts in 2018 – can end up on the black market.

Hackers use personal information from data to create and sell fake documents such as IDs and passports. Criminals can also assemble “comprehensive victim files” called “FULLZ,” which can include date of birth, Social Security number, telephone number, driver’s license number, and banking information.

The chart from The Wall Street Journal breaks down the prices for a single record or piece of information on the black market.

HEALTHCARE

The healthcare industry suffered more cybersecurity breaches than any other industry in 2018 and 2019. There were 510 healthcare data breaches of 500 or more records in 2019; in total, it is estimated that healthcare records of over 12% of the U.S. population were breached. In the first six months of 2020, there were 224 healthcare data breaches of 500 or more records. Then, over 9 million records were exposed in September 2020 alone as a result of a May 2020 ransomware attack on cloud software company Blackbaud that affected at least 80 healthcare organizations. As of November 2021, there were 564 breaches reported for the year.

These breaches come with a big price tag, beyond the black market. When breaches expose sensitive healthcare information, “HIPAA privacy rules are violated – and health systems have to pay up.” In total, the Department of Health and Human Services’ Office for Civil Rights issued over $28 million in HIPAA penalties in 2018, a new record. In 2019, there were 10 financial penalties resulting in over $12 million in penalties, and in 2020 the Office for Civil Rights settled 19 HIPAA violation cases and issued over $13.5 million in penalties.

See all reported breaches being investigated by the U.S. Department of Health and Human Services Office for Civil Rights here.

FINANCIAL INFORMATION

Financial sector breaches include attacks on financial institutions such as banks, credit unions, credit card companies, investment firms, and pension funds, all of which have seen increases in cyberattacks in recent years. Despite having spent an average of 10% of their annual IT budgets on cybersecurity in 2019, financial service companies are the second-most affected sector, behind healthcare.

From January to August of 2018, 103 financial sector breaches were reported (amounting to almost $17 billion), compared to 37 breaches in 2016. The Capital One data breach in July 2019 exposed the data of over 100 million people in the United States and Canada, including 140,000 social security numbers, 1 million social insurance numbers (the Canadian equivalent of social security) and 80,000 bank account numbers.

In the first half of 2020, possibly due to expanded online presence as a consequence of the coronavirus pandemic, there was a 238% increase in cyberattacks targeting financial institutions. For 2021, the estimated cost of a data breach in the financial sector was $5.72 million.

One of the most common types of attacks is a Distributed Denial of Service (DDoS), in which a financial service server or network is attacked, resulting in a crash or shut down of the system that denies service to users. Between lost revenue and costs to get systems running again, these attacks can cost a financial institution an average of $1.8 million. Hackers often blackmail financial institutions, forcing them to pay high ransoms to avoid having their servers attacked.

SMALL BUSINESSES

Although larger companies are targeted more often due to their financials, cyberattacks are becoming more common among small businesses who “accelerated their adoption of new technologies” during the pandemic for remote work and sales. This has created new vulnerabilities: small businesses were attacked at twice the rate of larger organizations during 2020 and 2021, with data breaches at small businesses globally jumping 152% compared to 2019.

Labor shortages and inflation are top concerns for small business owners, which means cybersecurity is less of a priority. Others do not realize their insurance policies do not include cyberattacks. A 2021 survey from the Wall Street Journal found 52% of small businesses (defined as those with less than $50 million in annual revenue) have insurance coverage for cyber risks, compared to 75% of large businesses. As the frequency of attacks has increased, small businesses are not facing increasing prices for cyber insurance.

GOVERNMENT INSTITUTIONS

Government institutions are no exception to cyberattacks. The U.S. Office of Personnel Management was hacked multiple times in 2014, and cyberattacks on cities are making headlines. These are mostly DDoS attacks, “waged by criminals who deploy ransomware and lock people out of systems and data used for public services.”

In March 2018, Atlanta’s computer networks were attacked and affected the Department of Public Safety, the state and local court systems, a major hospital, the county government, and a police department. In May 2019, hackers targeting Baltimore left the city with over $18 million in lost revenue and expenditures to get the network up and running again. In August 2019, hackers infiltrated computer systems and encrypted the data of 22 cities in Texas (NY Times).

In December 2020, a massive data breach linked to the Texas-based software company SolarWinds was reported. Hackers – believed to be Russia’s foreign intelligence service – attached malware to a SolarWinds software update, which affected 18,000 of SolarWinds’ customers in the government and private sector worldwide between March and June 2020. Hackers spent months inside U.S. government networks; affected federal agencies included the Commerce Department, the Department of Homeland Security, the Pentagon, the Treasury Department, the U.S. Postal Service, and the National Institutes of Health. As of early 2022, there has been no news from the task force formed in response, the Cyber Unified Coordination Group(UCG).

The Homeland Security Cybersecurity and Infrastructure Security Agency addresses cybersecurity concerns. In late 2021, it released a directiveordering “all federal agencies to create a process to systematically update software and hardware and begin patching known flaws,” because the vast majority of hacks rely on software flaws that can be prevented with system updates.

For an understanding of scope, see this list of significant cyber incidents compiled by the Center for Strategic and International Studies.

 

The Role of the Private Sector and Government

THE PRIVATE SECTOR: BIG TECH

With the increase in cyberattacks affecting citizens’ personal information, some states have enacted laws to address data privacy measures.

Big tech companies such as Amazon, Apple, Facebook, Google, and Microsoft (which together make up half of the top 10 most valuable companies on the American stock market) are central to issues of data privacy at the state level due to their size and scope.

In April 2021, Apple released a software update feature called App Tracking Transparency, which will ask users via a pop-up if they want an app tracking their data. If users opt out, companies would not be able to use targeted advertising, and would therefor lose a major source of data and revenue. An investigation by The Financial Times, released in October 2021, found that Snapchat, Facebook, Twitter, and YouTube lost almost $10 billion in revenue following Apple’s privacy change.

The market for global data protection as a service is expected to increase from $2 billion in 2022 to $3.9 billion by 2026. The market for big data, data analytics, and cloud services in general was measured at just under $5 billion in 2018 and is expected to reach $61.42 billion by 2026.

HEALTHCARE

Digitizing patient data has created a market for tech giants, whose technologies can store and analyze data. In 2018, Google partnered with the second-largest health system in the country, St. Louis-based Ascension, to improve patient care and create a faster, more manageable system of electronic record keeping. Through the partnership, called Project Nightingale, Google received access to data of over 50 million patients. In November 2019, however, Ascension and Google faced pushback when patients and doctors learned about the data sharing, of which they had not been aware.

Even DNA tests, such as those popular on 23andMe and Ancestry, are part of the questions surrounding data privacy and protection. DNA samples have been used to solve crimes, but many individuals are concerned with what else their DNA could be used for when accessed by third-parties (even law enforcement).

DID YOU KNOW?

Despite this, big tech’s footprint in the healthcare marketplace has only grown, particularly in the face of the coronavirus pandemic. Google and Mayo Clinic launched an artificial intelligence initiative in October 2020 to store the hospital system’s genetic, medical, and financial records. Google also launched another AI tool that would help healthcare providers search through medical documents. Microsoft and Amazon have all also been granted access to detailed, identifiable patient information in deals to develop apps and algorithms that assist with hospital operations. The Microsoft Cloud for Healthcare “allows providers to connect with patients via telehealth, optimize insights and collaborate with other healthcare organizations.” Amazon Web Services made its COVID-19 data available to support hospital systems, researchers, and public health officials.

Hospitals are playing a crucial role “as brokers to technology companies racing into the $3 trillion health-care sector.” The technology companies in the healthcare sector can offer innovations and benefits to hospitals and medical professionals. Hospitals generate massive amounts of data, and there is currently no single place where physicians can go to find patient data – most hospitals still fax paperwork! Technology companies can facilitate interoperability, or the ability for “health information systems to work together within and across organizational boundaries,” which would allow healthcare providers to coordinate patient care regardless of geographic location.

The WSJ explains more reasons why big tech wants to access your medical records (6 min):

NATIONAL SECURITY AND DEFENSE

Data privacy concerns apply not only to individuals and businesses, but also to the government. For example, a significant challenge for the U.S. armed forces is “how to protect service members, intelligence officers and security personnel in an age where highly revealing commercial data being generated by mobile phones and other digital services is bought and sold in bulk,” according to one WSJ report.

What does national security mean in the digital age for federal agencies like the National Security Agency (NSA) and the Department of Defense (DOD) that oversee the protection of our country? Admiral Mike Rogers, former director of the NSA and former commander of the U.S. Cyber Command, discusses the role of these agencies and data privacy in terms of individual, private sector, and government control with Cyndi Gula of Tenable Network Security at The Policy Circle 2019 Summit (32 min):

When the DOD wanted to implement a plan for its Joint Enterprise Defense Infrastructure (JEDI), the Pentagon’s effort to modernize its systems, it looked to Amazon (which previously built cloud services for the CIA) and Microsoft because “the U.S. military’s unique demands required companies of unique scale.” Microsoft received the $10 billion, 10 year contract in 2019, but the deal was scrapped in July 2021. Litigation from Amazon claiming the contract was unfairly awarded prevented the contract from moving forward, and the DOD claims the JEDI contract no longer meets its needs and must be reevaluated.

The rebranded project (Joint Warfighter Cloud Capability) will “allow the Pentagon to consolidate its current patchwork of data systems, give defense personnel better access to real-time information and put the Defense Department on a stronger footing to develop artificial-intelligence capabilities that are seen as vital in the future.” The major difference is that instead of a winner-takes-all contract (which garnered much criticism), the DOD will pursue contracts with multiple companies including Amazon, Microsoft, Google, Oracle, and IBM.

Amazon owns about a third of the cloud market, and Microsoft owns just under 20%. The WSJ explains how cloud computing can change the way businesses and companies operate, and what its purpose for the DOD is (4 min):

INTELLIGENCE AND LAW ENFORCEMENT

Given their market share of data storage and management, another debate regarding big tech companies is their ability to track users across the internet. This is an argument as to why tech companies have too much power, but it also puts them in a unique position to assist intelligence agencies with identifying potential threats – if they choose to do so.

In October 2019, Facebook announced end-to-end encrypted messaging in Whatsapp and Messenger, meaning only the sender and recipient can read the messages. This denies access to hackers and criminals, but also government and law enforcement. The heads of Whatsapp and Messenger explained that “any ‘backdoor’ access into Facebook’s products created for law enforcement could be used by bad actors,” meaning data in even private messages could be vulnerable. The Justice Department immediately took issue with the privacy announcement, arguing, “Companies should not deliberately design their systems to preclude any form of access to content even for preventing or investigating the most serious crimes.”

COMPETITION

These tech companies are making their presences known in the healthcare, national security, and intelligence sectors, but in order to get ahead of one another, they must keep innovating. This means new technologies and advancements that can make our lives easier and safer, but it can also mean looking into how deeply the roots of each company run – that is, how many acquisitions these tech leaders have made to become as big as they currently are. Innovation requires data, but smaller businesses have trouble keeping up with these larger companies, which often simply acquire startups with market potential. And even if they don’t buy out smaller companies, the tech giants tend to set the ceiling of expansion by creating platforms startups have to use. For example, any new app needs to be available on either Google or Apple app store, which means Google or Apple takes a share of the app’s profit. Even Netflix operates on Amazon’s cloud-storage services.

See this infographic for more on How Tech Giants Make Their Billions.

GOVERNMENT

SPENDING

Federal government agencies including the Department of Homeland Security (which houses the Transportation Security Administration) are actively engaged in cybersecurity measures. The following chart breaks down allotments for cybersecurity and information technology (IT) spending among civilian agencies (meaning it excludes the Department of Defense). For FY2023, the President’s Budget requested over $65 billion for IT spending among these agencies.

This increased attention at the federal level has not been emulated at the state level, despite mounting numbers of cyberattacks over the past few years. According to the 2020 National Survey of Local Government Cybersecurity Programs from the Public Technology Institute, fewer than one-quarter of IT executive say their elected officials are actively engaged in their government’s cyber efforts, and two-thirds say they do not believe their cybersecurity budget is adequate. While 87% of local governments provide cybersecurity training for employees, only 56% of those provide ongoing training and 33% provide training only once a year.

In May 2020, a group of government-focused organizations including the National Governors Association, the National League of Cities, and the National Conference of State Legislatures sent a letter to Congress asking it to authorize and fund a cybersecurity program to meet the need of state and local governments. Legislation that would do so has yet to pass.

CONGRESSIONAL LEGISLATION

Congressional committees responsible for cybersecurity and data privacy include:

There is no single law that regulates consumer protection in data collection. For the time being, the U.S. government approaches “privacy and security by regulating only certain sectors and types of sensitive information…creating overlapping and contradictory protections.” Currently, the most all-encompassing privacy and security law protecting data in the U.S. is HIPAA, but it is specific to the healthcare industry, applies only to certain entities, and “leaves most Americans with no grasp of when their health info is protected and when it is not.”

The Federal Trade Commission (FTC) considers itself the top enforcer of data security, given its power to prohibit “unfair and deceptive trade practices” under Section 5 of the FTC Act. However, the FTC has limited jurisdiction when it comes to nonprofit entities and financial institutions. Other companies also frequently push back against the FTC’s legal authority to police data security, making a central watchdog difficult to maintain. The chart breaks down which agencies are in charge of investigating which crimes.

CASE STUDY ON PATCHWORK LEGISLATION: BIOMETRICS

Among the states, different privacy laws dictate proper security requirements and protocols. Laws concerning biometrics provide a closer look at what these differences entail. Biometrics “measure and analyze people’s unique physical and behavioral characteristics,” including “DNA, fingerprints, eyeballs/irises/retinas, voiceprints, handprints, and facial geometry,” among others. Airports, hospitals, banks, and stores are turning to biometrics for security purposes, but biometrics also make workforce management, tax calculations, and reporting easier. According to one 2018 survey, over 60% of companies already were using biometric authentication for verification and access.

Critics of these technologies focus on the potential abuse of information. States including Illinois, Texas, and Washington already have laws governing storage and use of biometrics, and San Francisco banned facial recognition technologyaltogether in May 2019. Oregon, Massachusetts, and Maine authorized their own bans in 2020. Businesses need to understand the laws in their states and “make sure they have policies for how consent is gathered, how data is stored, and when it is destroyed.” Some businesses are facing lawsuits over biometrics in the workplace, which has prompted law firms to specialize in biometric privacy litigation. Innovators in the biometric technology fields are likely to skip states that have broad regulations, which will no doubt have economic implications. Projections show the biometrics system market growing from about $42 billion in 2022 to almost $83 billion by 2027.

OTHER STATE LEVEL LEGISLATION

The main reason for an excess of state legislation in the realm of data privacy is that it passes more easily. This also means States’ Attorneys General are more able to enforce consumer protection laws when it comes to data privacy. The most influential privacy law overseeing data-collection is California’s Consumer Privacy Act. The law, passed in June 2018 and in effect as of January 1, 2020, is expected to heavily impact California’s digital economy; consumers’ rights to delete their data will affect companies that earn revenue through targeted advertising or by collecting and selling data to third parties. Such companies that operate nationally but have customers in California may need to change their business paradigm or develop a “patchwork data regime” to comply with the California law.

On the other hand, voters in California approved a follow-up measure in November 2020. The California Privacy Rights Act, set to go into effect on January 1, 2023, will create a consumer privacy agency to take responsibility for privacy law violations. Nevada and Maine have followed suit, passing their own personal data protection laws, and a number of states including New York, New Jersey, Maryland, Oregon, and Texas have also passed data breach notification laws. As more states look to pass legislation, it may provide more protections for consumers but also raise additional questions for businesses. See this data privacy legislation tracker for legislation in your state.

FRAMEWORK FOR A SINGLE NATIONAL LAW

Many believe these state endeavors, particularly California’s law, could be the turning point that spurs lawmakers into action to create a national law for data privacy and security, similar to the European Union’s General Data Protection Regulation. What would such a law look like in the U.S.? Many believe it should focus on protecting the personal data of everyday citizens; providing consumers with transparency and control; and ensuring proper governance and enforcement of safety measures. In doing so, it would:

  • Champion consumer privacy and promote accountability to enhance customer trust;
  • Foster innovation and competitiveness to demonstrate U.S. leadership in the realm of privacy for the purpose of innovation and economic competitiveness;
  • Harmonize regulations to eliminate the existing patchwork system;
  • Achieve global interoperability to cooperate with the international economy and e-commerce transfers of personal data.

Could a national tech policy boost America’s internet? The WSJ podcast explores (start at 7:25). See ideas on tech policy agendas for the U.S. from Future of Tech Commission and Business Roundtable.

Other countries from Argentina to Singapore have legislation protecting data. Some laws require businesses and companies to have privacy policies, others require that users are informed of the purposes of data collection, and some even require users to consent to data collection and use before companies have access. In some cases, this creates some tensions and unprecedented policies; for example, the U.S. and Europe have to agree to a deal that allows some data about Europeans to be stored on U.S. soil so Europeans can still use American companies (like Meta and Alphabet) in a manner that respects the EU’s data privacy laws. See a full list of countries with national privacy policies here.

“Remember, conducting intelligence in a democratic society means we are going to have restrictions placed on us that serve the broader interest of our nation. We are not China, we are not Russia, we’re not going to unilaterally do whatever we want – that’s just not the way we are structured as a society.”

ADMIRAL MIKE ROGERS

Meanwhile, in other countries like China, data privacy is almost non-existent. On the one hand, a lack of data privacy paves the way for practically limitless innovation; in the U.S. and Europe, data privacy regulations can often stifle creativity. On the other hand, these types of laws also protect citizens from government control, and in China many are afraid of “the endless demands of the state power for personal information of citizens, and the use of this information to combat and control all acts of resistance.” In the last few years, uproar from Chinese consumers has prompted the Cyberspace Administration of China to issue data protection guidelines, but how these will be enforced remains to be seen. For more on China’s surveillance methods and its role in building infrastructure around the world as part of its Belt and Road initiative, see The Policy Circle’s Digital Landscape Brief or Foreign Policy: Asia Pacific Brief.

There is strong bipartisan support for an act to address national data security, although no particular legislation has gained momentum in Congress.

 

Conclusion

Healthcare. Banking. Government. Today’s digital world is inundated with data across almost all sectors. The U.S. needs to keep pace with technological advances to be at the forefront of global digital innovations and protect national security. At the same time, citizens cannot sit idly by and let the government or the private sector run the show. The combination of educated citizens and proper oversight mechanisms in line with democratic values will protect the rights of individuals from excessive government or private sector control and empower individuals to take responsibility for their data.

 

Ways to Get Involved/What You Can Do

The purpose of this brief is to prompt you to think about your own data. How much do you value your privacy? How do you define privacy? It is a national issue, a state issue and a local issue because your schools and your cities are all targets for cyberattacks.

You can:

  • Find out what your local and state  government institutions are doing to protect your data.
  • Find how your health data is protected and shared.
  • Consider your data protection and practices at home and at work. Take a look at this Data Detox Kit for ideas.
  • Review the list of legislation presented above and invite your representatives in Congress to discuss their position on the topic with your Policy Circle.  By voicing your interest, you draw their attention to the topic.

This is a topic that could be presented in the context of a community forum. Data security poses a threat to our well-being, and data privacy laws can also clamp down on innovation. Additionally, it’s important to keep in mind that in other countries, data privacy is handled very differently by the government and the private sector.

Newest Policy Circle Briefs

Faith and Civic Life

Faith and Civic Life

Community, civic life, and faith all work together to form society. Social capital and groups have been declining since the late 20th century, forcing…
Read
The First-Time Voter Handbook

The First-Time Voter Handbook

It is your first time voting. You are participating in a special civic right helping determine the leadership at the federal, state, and local levels.…
Read
Assessing Candidate Guide

Assessing Candidate Guide

Educating yourself and others on candidates’ policies allows you to assess government leaders and make a meaningful impact on your community and…
Read
Women and Economic Freedom

Women and Economic Freedom

This Brief is a collaboration with The Bridwell Institute for Economic Freedom, a research institute in the SMU Cox School of Business. The mission of…
Read

About the policy Circle

The Policy Circle is a nonpartisan, national 501(c)(3) that informs, equips, and connects women to be more impactful citizens.