Sign In
    Wisconsin Lawyer
    October 01, 1998

    Wisconsin Lawyer October 1998: Computerized Lawyer

    Invasions of Computer Privacy

    By Michael K. McChrystal, William C. Gleisner III, and Michael J. Kuborn

    In the Information Age, the issue of privacy is being discussed with more passion than ever before. Americans have always cherished their privacy, perhaps because we also have respected the power of information. What the Information Age has changed is the ease with which information can be gathered and stored and then used to threaten privacy. As collectors, purveyors, and repositories of information, lawyers need to know the general lay of the land concerning computer privacy law. Just as importantly, we need to advise our clients about the law as it relates to protecting and gathering information.

    Possessors vs. subjects of information

    The law provides one set of protections for possessors of computerized information and a different set for the subjects of the information and ne'er the twain shall meet.

    One crucial point must be recognized at the outset: The law provides one set of protections for possessors of computerized information and a different set of protections for the subjects of the information. This distinction is important because much of the information about ourselves that we rightly regard as most private is stored in the computers of others, such as lawyers, doctors, employers, insurers, financial institutions, government agencies, friends, and coworkers.

    With respect to possessors, computer information receives expansive statutory protection in Wisconsin. It is a crime knowingly to access, modify, or destroy computer data, programs, or supporting documentation without authorization.1 In a sense, this provides a wildly expansive form of privacy protection specific to the computer as a medium. Imagine similar privacy protection being afforded paper documents such that it would be a crime "willfully, knowingly, and without authorization" to "access" a piece of paper containing data of any kind.2 One would have to be very careful in picking up someone else's newspaper.

    Saw/ComputerNotwithstanding the sweep of Wisconsin's computer crimes statute, the extent of computer privacy remains very much in doubt. Although the statutory language is sweeping, it may be so sweeping as to be unenforceable and, in some respects, unreliable as a method of protecting privacy. Moreover, while the statute creates computer privacy rights, it is unclear whether it provides a private remedy when those rights are violated. The statute does not, in its own terms, establish a private cause of action for a violation, and no reported Wisconsin decision directly addresses the issue. On the other hand, the statute does define data as property, and tort law typically provides a remedy for intentional, nonconsensual, and harmful interference with another's property.3

    The statute is most limited, however, in that its protection seems to run only to the owner or possessor of the data, computer, or program. While data may be property and protectible as such, data about me often will not be my property. This is because the computer crimes statute appears to protect the possessors of data, and not necessarily the subjects of the data.

    It should be emphasized that the subjects of computer information do receive protection in varied branches of the law. Duties of confidentiality can arise by statute or contractual agreement or by virtue of a professional relationship, so that some possessors of information owe a duty to some subjects of the information they possess. In many circumstances, tort remedies may be available in addition to any breach of contract remedy.

    A recent federal district court decision in Missouri4 provides a good compendium of the issues that can arise. In that case, two lawyers left a law firm in which they had participated in the defense of Chrysler Corp. against class actions alleging certain defects in Chrysler vehicles. Before leaving the firm, the lawyers copied various computer files relating to the actions against Chrysler, allegedly in violation of a state computer crimes statute similar to the one in Wisconsin.5 The lawyers thereafter were involved in a class action against Chrysler alleging defects different from those alleged in the cases that they had helped defend. Chrysler brought suit against the lawyers for breach of the fiduciary duties of loyalty and confidentiality, violation of the computer "tampering" statute (which specifically allowed a private action for damages),6 and breach of written confidentiality agreements. The court found that triable issues existed as to all such claims.

    Persons who provide professional services and who elicit private information to do so usually have a duty to protect the confidentiality of the information they receive. In fields such as health care and financial services, state and federal statutes and regulations elaborate these duties. Privacy duties also may arise by contract. For example, many Web sites announce privacy policies that may contractually bind the site's sponsor if a transaction is entered into and the protections promised by the policy aren't delivered.

    If someone intentionally steals corporate or business secrets over the Internet, a host of federal criminal and civil laws also come into play. These remedies are rather comprehensively cataloged in a recent article.7 Assuming the culprits can be identified, criminal remedial responses might include prosecution pursuant to:

    a) the Economic Espionage Act of 1996, 18 U.S.C. § 670;

    b) the National Stolen Property Act, 18 U.S.C. § 2311, et seq.;

    c) the Wire Fraud Act, 18 U.S.C. § 1343, et seq.;

    d) the Intercepted Wire & Electronic Communications Act, 18 U.S.C. § 2510-1521;

    e) the Stored Wire & Electronic Communications Act, 18 U.S.C. § 2701-2711; or

    f) the Computer Fraud and Abuse Act, 18 U.S.C. § 1030.8

    Civil remedies might include an action:

    a) for the intentional and wrongful copying or control of trade secrets;

    b) for Civil RICO, 18 U.S.C. § 1964 (a); and

    c) under theIntercepted Wire & Electronic Communications Act, the Stored Wire & Electronic Communications Act, and the Computer Fraud and Abuse Act.9

    Authors

    Michael McChrystal, top, Marquette 1975, is a professor of law at the Marquette University Law School.

    William Gleisner, middle, Marquette 1974, both a practicing attorney and computer consultant, maintains a law firm-based litigation support service bureau in Milwaukee.

    Michael Kuborn, bottom, Marquette 1998, is with Olsen, Kloet, Gundersen & Conway, and is trained in computer recovery and computer search and seizure techniques. Products and services mentioned in this article should not be construed as an endorsement.

    As you can see, computer privacy can be thought of as involving two separate spheres. The first sphere is the protection afforded to one's own computer, programs, and data. The other sphere is the subject's protection from wrongful transfer of private computer information by a possessor of that information, usually a service provider.

    It is clear that wrongful disclosure of private information may be actionable by the subject of that information (for example, a client, a patient, or in some cases, a customer). It is less clear that the subject of private information has an action against one who wrongly acquires the information from a third party. Suppose, for example, that a hacker unlawfully accesses my file on my lawyer's computer system. If my lawyer failed to use reasonable care to protect the information, I may have a claim against the lawyer. But do I have rights against the hacker?

    In Wisconsin, the right of privacy statute,10 which generally comports with the invasion of privacy torts recognized in the Restatement (Second) of Torts,11 provides the starting point for analysis. With respect to computer privacy, the statute raises at least two important (and quite separate) questions:

    1) Does an invasion of computer privacy involve intrusion "in a place that a reasonable person would consider private" or "in a manner which is actionable for trespass"? It is not a great stretch to consider that computers are places that occupy physical space and so a computer is a "place that a reasonable person would consider private." It also seems plausible to conclude that unauthorized access to a computer is a trespass in the nature of trespass to chattel. While these views may not have formed part of the legislative intent behind the statute, the statute directs that it is to be "interpreted in accordance with the developing common law of privacy."12

    2) Is dissemination of information by computer "publicity" for purposes of the statute? It seems clear that private facts may be publicized at a Web site that receives thousands of hits each day or even by an email that goes out one message at a time. What is less clear is whether "publicizing" a private fact to a small number of individuals gives rise to a cause of action.

    These questions, however, await dispositive treatment by Wisconsin courts. Indeed, perhaps the answers will be forthcoming first from the United States Congress.13

    Conclusion

    Just as many of the technical aspects of protecting (and violating) the privacy of computer information rapidly change, the law is in a state of constant development. Much of that development is taking the form of targeted legislation addressing specific abuses. At the same time, the law continues to provide a broader structure to analyze the rights and liabilities involved, such as the Wisconsin computer and privacy statutes discussed above.

    Endnotes


    1Wisconsin Statute section 943.70(2)(a)(2) provides:

    "Offenses Against Computer Data and Programs: (a) Whoever willfully, knowingly and without authorization does any of the following may be penalized as provided in par. (b):

    "1. Modifies data, computer programs, or supporting documentation.

    "2. Destroys data, computer programs, or supporting documentation.

    "3. Accesses data, computer programs, or supporting documentation.

    "4. Takes possession of data, computer programs, or supporting documentation.

    "5. Copies data, computer programs, or supporting documentation.

    "6. Discloses restricted access codes or other restricted access information to unauthorized persons."

    This statute establishes a form of privacy protection specific to the medium of computers. "Data" is statutorily defined as "a representation of information, knowledge, facts, concepts, or instructions that has been prepared or is being prepared in a formalized manner and has been processed, is being processed, or is intended to be processed in a computer system or computer network. Data may be in any form including computer printouts, magnetic storage media, punched cards and as stored in the memory of the computer. Data is property." Wis. Stat. § 943.70(1)(f) (1995-97).

    2It may be that paper records receive loosely analogous protection in that they are typically stored in locations from which others can be effectively excluded.

    3See, Restatement (Second) of Torts § 158 (liability for Intentional Intrusions on Land). See also, Restatement (Second) of Torts § 217 (Ways of Committing Trespass to Chattels).

    4Chrysler Corp. v. Carey, 1998 U.S. Dist. LEXIS 7878 (E.D. Mo. May 26, 1998).

    5Mo. Rev. Stat. § 569.095.

    6Mo. Rev. Stat. § 537.525(1).

    7See, Ian C. Ballon, Alternative Corporate Responses to Internet Data Theft, 471 PLI/P at 737 (1997).

    8Id. at 746.

    9Id. at 748.

    10Wisconsin Statute section 895.50 provides in part:

    "(2) In this section, 'invasion of privacy' means any of the following:

    "(a) Intrusion upon the privacy of another of a nature highly offensive to a reasonable person, in a place that a reasonable person would consider private or in a manner which is actionable for trespass."

    "(c) Publicity given to a matter concerning the private life of another, of a kind highly offensive to a reasonable person, if the defendant has acted either unreasonably or recklessly as to whether there was legitimate public interest in the matter involved, or with actual knowledge that none existed. It is not an invasion of privacy to communicate any information available to the public as a matter of public record."

    11See Restatement (Second) of Torts § 652B-652D.

    12Wis. Stat. § 895.50(3) (1995-97).

    13See, S. 1368, 105th Cong., 1st Sess. (1997) (Medical Information Privacy and Security Act); H.R. 1813, 105th Cong., 1st Sess. (1997) (Personal Information Privacy Act); S. 909, 105th Cong., 1st Sess. (1997) (Secure Public Networks Act); S. 771, 105th Cong., 1st Sess. (1997) (Unsolicited Commercial Electronic Mail Choice Act); H.R. 3785, 104th Cong., 2nd Sess. (1996) (Background Security Records Act); H.R. 1964, 105th Cong. 1st Sess. (1997) (Communications Privacy and Consumer Empowerment Act); H.R. 1367, 105th Cong., 1st Sess. (1997) (Federal Internet Privacy Protection Act); H.R. 2372, 105th Cong., 1st Sess. (1997) (Internet Protection Act); H.R. 695, 105th Cong., 2nd Sess. (1998) (Security and Freedom through Encryption Act).


Join the conversation! Log in to comment.

News & Pubs Search

-
Format: MM/DD/YYYY